Saturday, August 31, 2019

Ethnography

AN ETHNOGRAPHY â€Å"When used as a method, ethnography typically refers to fieldwork (alternatively, participant-observation) conducted by a single investigator who ‘lives with and lives like' those who are studied, usually for a year or more. † –John Van Maanen, 1996. â€Å"Ethnography literally means ‘a portrait of a people. ‘ An ethnography is a written description of a particular culture – the customs, beliefs, and behavior – based on information collected through fieldwork. † –Marvin Harris and Orna Johnson, 2000. â€Å"Ethnography is the art and science of describing a group or culture.The description may be of a small tribal group in an exotic land or a classroom in middle-class suburbia. † –David M. Fetterman, 1998. Ethnography is a social science research method. It relies heavily on up-close, personal experience and possible participation, not just observation, by researchers trained in the art of et hnography. These ethnographers often work in multidisciplinary teams. The ethnographic focal point may include intensive language and culture learning, intensive study of a single field or domain, and a blend of historical, observational, and interview methods.Typical ethnographic research employs three kinds of data collection: interviews, observation, and documents. This in turn produces three kinds of data: quotations, descriptions, and excerpts of documents, resulting in one product: narrative description. This narrative often includes charts, diagrams and additional artifacts that help to tell â€Å"the story† (Hammersley, 1990). Ethnographic methods can give shape to new constructs or paradigms, and new variables, for further empirical testing in the field or through traditional, quantitative social science methods. Ethnography has it roots planted in the fields of anthropology and sociology.Present-day practitioners conduct ethnographies in organizations and communitie s of all kinds. Ethnographers study schooling, public health, rural and urban development, consumers and consumer goods, any human arena. While particularly suited to exploratory research, ethnography draws on a wide range of both qualitative and quantitative methodologies, moving from â€Å"learning† to â€Å"testing† (Agar, 1996) while research problems, perspectives, and theories emerge and shift. Ethnographic methods are a means of tapping local points of view, households and community â€Å"funds of nowledge† (Moll & Greenberg, 1990), a means of identifying significant categories of human experience up close and personal. Ethnography enhances and widens top down views and enriches the inquiry process, taps both bottom-up insights and perspectives of powerful policy-makers â€Å"at the top,† and generates new analytic insights by engaging in interactive, team exploration of often subtle arenas of human difference and similarity. Through such findings ethnographers may inform others of their findings with an attempt to derive, for example, policy decisions or instructional innovations from such an analysis.VARIATIONS IN OBSERVATIONAL METHODS Observational research is not a single thing. The decision to employ field methods in gathering informational data is only the first step in a decision process that involves a large number of options and possibilities. Making the choice to employ field methods involves a commitment to get close to the subject being observed in its natural setting, to be factual and descriptive in reporting what is observed, and to find out the points of view of participants in the domain observed.Once these fundamental commitments have been made, it is necessary to make additional decisions about which particular observational approaches are appropriate for the research situation at hand. VARIATIONS IN OBSERVER INVOLVEMENT: PARTICIPANT OR ONLOOKER? The first and most fundamental distinction among observationa l strategies concerns the extent to which the observer is also a participant in the program activities being studied. This is not really a simple choice between participation and nonparticipation.The extent of participation is a continuum which varies from complete immersion in the program as full participant to complete separation from the activities observed, taking on a role as spectator; there is a great deal of variation along the continuum between these two extremes. Participant observation is an omnibus field strategy in that it â€Å"simultaneously combines document analysis, interviewing of respondents and informants, direct participation and observation, and introspection. In participant observation the researcher shares as intimately as possible in the life and activities of the people in the observed setting.The purpose of such participation is to develop an insider's view of what is happening. This means that the researcher not only sees what is happening but â€Å"fe els† what it is like to be part of the group. Experiencing an environment as an insider is what necessitates the participant part of participant observation. At the same time, however, there is clearly an observer side to this process. The challenge is to combine participation and observation so as to become capable of understanding the experience as an insider while describing the experience for outsiders.The extent to which it is possible for a researcher to become a full participant in an experience will depend partly on the nature of the setting being observed. For example, in human service and education programs that serve children, it is not possible for the researcher to become a student and therefore experience the setting as a child; it may be possible, however, for the research observer to participate as a volunteer, parent, or staff person in such a setting and thereby develop the perspective of an insider in one of these adult roles.It should be said, though, that many ethnographers do not believe that understanding requires that they become full members of the group(s) being studied. Indeed, many believe that this must not occur if a valid and useful account is to be produced. These researchers believe the ethnographer must try to be both outsider and insider, staying on the margins of the group both socially and intellectually. This is because what is required is both an outside and an inside view.For this reason it is sometimes emphasized that, besides seeking to â€Å"understand†, the ethnographer must also try to see familiar settings as â€Å"anthropologically strange†, as they would be seen by someone from another society, adopting what we might call the Martian perspective. METHODOLOGICAL PRINCIPLES Following are three methodological principles that are used to provide the rationale for the specific features of the ethnographic method.They are also the basis for much of the criticism of quantitative research for failing to capture the true nature of human social behavior; because it relies on the study of artificial settings and/or on what people say rather than what they do; because it seeks to reduce meanings to what is observable; and because it reifies social phenomena by treating them as more clearly defined and static than they are, and as mechanical products of social and psychological factors (M. Hammersley, 1990). The three principles can be summarized under the headings of naturalism, understanding and discovery: 1.Naturalism. This is the view that the aim of social research is to capture the character of naturally occurring human behavior, and that this can only be achieved by first-hand contact with it, not by inferences from what people do in artificial settings like experiments or from what they say in interviews about what they do elsewhere. This is the reason that ethnographers carry out their research in â€Å"natural† settings, settings that exist independently of the resea rch process, rather than in those set up specifically for the purposes of research.Another important implication of naturalism is that in studying natural settings the researcher should seek to minimize her or his effects on the behavior of the people being studied. The aim of this is to increase the chances that what is discovered in the setting will be generalizable to other similar settings that have not been researched. Finally, the notion of naturalism implies that social events and processes must be explained in terms of their relationship to the context in which they occur. 2.Understanding. Central here is the argument that human actions differ from the behavior of physical objects, and even from that of other animals: they do not consist simply of fixed responses or even of learned responses to stimuli, but involve interpretation of stimuli and the construction of responses. Sometimes this argument reflects a complete rejection of the concept of causality as inapplicable to the social world, and an insistence on the freely constructed character of human actions and institutions.Others argue that causal relations are to be found in the social world, but that they differ from the â€Å"mechanical† causality typical of physical phenomena. From this point of view, if we are to be able to explain human actions effectively we must gain an understanding of the cultural perspectives on which they are based. That this is necessary is obvious when we are studying a society that is alien to us, since we shall find much of what we see and hear puzzling. However, ethnographers argue that it is just as important when we are studying more familiar settings.Indeed, when a setting is familiar the danger of misunderstanding is especially great. It is argued that we cannot assume that we already know others' perspectives, even in our own society, because particular groups and individuals develop distinctive worldviews. This is especially true in large complex soci eties. Ethnic, occupational, and small informal groups (even individual families or school classes) develop distinctive ways of orienting to the world that may need to be understood if their behavior is to be explained.Ethnographers argue, then, that it is necessary to learn the culture of the group one is studying before one can produce valid explanations for the behavior of its members. This is the reason for the centrality of participant observation and unstructured interviewing to ethnographic method. 3. Discovery. Another feature of ethnographic thinking is a conception of the research process as inductive or discovery-based; rather than as being limited to the testing of explicit hypotheses.It is argued that if one approaches a phenomenon with a set of hypotheses one may fail to discover the true nature of that phenomenon, being blinded by the assumptions built into the hypotheses. Rather, they have a general interest in some types of social phenomena and/or in some theoretica l issue or practical problem. The focus of the research is narrowed and sharpened, and perhaps even changed substantially, as it proceeds. Similarly, and in parallel, theoretical ideas that frame descriptions and explanations of what is observed are developed over the course of the research.Such ideas are regarded as a valuable outcome of, not a precondition for, research. ETHNOGRAPHY AS METHOD In terms of method, generally speaking, the term â€Å"ethnography† refers to social research that has most of the following features (M. Hammersley, 1990). (a) People's behavior is studied in everyday contexts, rather than under experimental conditions created by the researcher. (b) Data are gathered from a range of sources, but observation and/or relatively informal conversations are usually the main ones. c) The approach to data collection is â€Å"unstructured in the sense that it does not involve following through a detailed plan set up at the beginning; nor are the categories us ed for interpreting what people say and do pre-given or fixed. This does not mean that the research is unsystematic; simply that initially the data are collected in as raw a form, and on as wide a front, as feasible. (d) The focus is usually a single setting or group, of relatively small scale. In life history research the focus may even be a single individual. (e) The analysis of the data involves interpretation of the eanings and functions of human actions and mainly takes the form of verbal descriptions and explanations, with quantification and statistical analysis playing a subordinate role at most. As a set of methods, ethnography is not far removed from the sort of approach that we all use in everyday life to make sense of our surroundings. It is less specialized and less technically sophisticated than approaches like the experiment or the social survey; though all social research methods have their historical origins in the ways in which human beings gain information about th eir world in everyday life.SUMMARY GUIDELINES FOR FIELDWORK It is difficult, if not impossible, to provide a precise set of rules and procedures for conducting fieldwork. What you do depends on the situation, the purpose of the study, the nature of the setting, and the skills, interests, needs, and point of view of the observer. Following are some generic guidelines for conducting fieldwork: 1. Be descriptive in taking field notes. 2. Gather a variety of information from different perspectives. 3. Cross-validate and triangulate by gathering different kinds of data.Example: observations, interviews, program documentation, recordings, and photographs. 4. Use quotations; represent program participants in their own terms. Capture participants' views of their own experiences in their own words. 5. Select key informants wisely and use them carefully. Draw on the wisdom of their informed perspectives, but keep in mind that their perspectives are limited. 6. Be aware of and sensitive to the different stages of fieldwork. (a) Build trust and rapport at the entry stage. Remember that the researcher-observer is also being observed and evaluated. b) Stay alert and disciplined during the more routine middle-phase of fieldwork. (c) Focus on pulling together a useful synthesis as fieldwork draws to a close. (d) Be disciplined and conscientious in taking detailed field notes at all stages of fieldwork. (e) Be as involved as possible in experiencing the observed setting as fully as possible while maintaining an analytical perspective grounded in the purpose of the fieldwork: to conduct research. (f) Clearly separate description from interpretation and judgment. (g) Provide formative feedback as part of the verification process of fieldwork.Time that feedback carefully. Observe its impact. (h) Include in your field notes and observations reports of your own experiences, thoughts, and feelings. These are also field data. Fieldwork is a highly personal experience. The meshing of fieldwork procedures with individual capabilities and situational variation is what makes fieldwork a highly personal experience. The validity and meaningfulness of the results obtained depend directly on the observer's skill, discipline, and perspective. This is both the strength and weakness of observational methods. SUMMARY GUIDELINES FOR INTERVIEWINGThere is no one right way of interviewing, no single correct format that is appropriate for all situations, and no single way of wording questions that will always work. The particular evaluation situation, the needs of the interviewee, and the personal style of the interviewer all come together to create a unique situation for each interview. Therein lie the challenges of depth interviewing: situational responsiveness and sensitivity to get the best data possible. There is no recipe for effective interviewing, but there are some useful guidelines that can be considered.These guidelines are summarized below (Patton, 1987). 1. Through out all phases of interviewing, from planning through data collection to analysis, keep centered on the purpose of the research endeavor. Let that purpose guide the interviewing process. 2. The fundamental principle of qualitative interviewing is to provide a framework within which respondents can express their own understandings in their own terms. 3. Understand the strengths and weaknesses of different types of interviews: the informal conversational interview; the interview guide approach; and the standardized open-ended interview. . Select the type of interview (or combination of types) that is most appropriate to the purposes of the research effort. 5. Understand the different kinds of information one can collect through interviews: behavioral data; opinions; feelings; knowledge; sensory data; and background information. 6. Think about and plan how these different kinds of questions can be most appropriately sequenced for each interview topic, including past, present, and futur e questions. 7. Ask truly open-ended questions. 8. Ask clear questions, using understandable and appropriate language. . Ask one question at a time. 10. Use probes and follow-up questions to solicit depth and detail. 11. Communicate clearly what information is desired, why that information is important, and let the interviewee know how the interview is progressing. 12. Listen attentively and respond appropriately to let the person know he or she is being heard. 13. Avoid leading questions. 14. Understand the difference between a depth interview and an interrogation. Qualitative evaluators conduct depth interviews; police investigators and tax auditors conduct interrogations. 5. Establish personal rapport and a sense of mutual interest. 16. Maintain neutrality toward the specific content of responses. You are there to collect information not to make judgments about that person. 17. Observe while interviewing. Be aware of and sensitive to how the person is affected by and responds to different questions. 18. Maintain control of the interview. 19. Tape record whenever possible to capture full and exact quotations for analysis and reporting. 20. Take notes to capture and highlight major points as the interview progresses. 1. As soon as possible after the interview check the recording for malfunctions; review notes for clarity; elaborate where necessary; and record observations. 22. Take whatever steps are appropriate and necessary to gather valid and reliable information. 23. Treat the person being interviewed with respect. Keep in mind that it is a privilege and responsibility to peer into another person's experience. 24. Practice interviewing. Develop your skills. 25. Enjoy interviewing. Take the time along the way to stop and â€Å"hear† the roses. SITE DOCUMENTSIn addition to participant observation and interviews, ethnographers may also make use of various documents in answering guiding questions. When available, these documents can add additional insi ght or information to projects. Because ethnographic attention has been and continues to be focused on both literate and non-literate peoples, not all research projects will have site documents available. It is also possible that even research among a literate group will not have relevant site documents to consider; this could vary depending on the focus of the research.Thinking carefully about your participants and how they function and asking questions of your informants helps to decide what kinds of documents might be available. Possible documents include: budgets, advertisements, work descriptions, annual reports, memos, school records, correspondence, informational brochures, teaching materials, newsletters, websites, recruitment or orientation packets, contracts, records of court proceedings, posters, minutes of meetings, menus, and many other kinds of written items.For example, an ethnographer studying how limited-English proficient elementary school students learn to acquire English in a classroom setting might want to collect such things as the state or school mandated Bilingual/ESL curriculum for students in the school(s) where he or she does research, and examples of student work. Local school budget allocations to language minority education, specific teachers' lesson plans, and copies of age-appropriate ESL textbooks could also be relevant.It might also be useful to try finding subgroups of professional educators organizations which focus on teaching elementary school language arts and join their listservs, attend their meetings, or get copies of their newsletters. Review cumulative student records and school district policies for language minority education. All of these things could greatly enrich the participant observation and the interviews that an ethnographer does. Privacy or copyright issues may apply to the documents gathered, so it is important to inquire about this when you find or are given documents.If you are given permission to incl ude what you learn from these documents in your final paper, the documents should be cited appropriately and included in the bibliography of the final paper. If you are not given permission, do not use them in any way. ETHICS IN ETHNOGRAPHIC RESEARCH Since ethnographic research takes place among real human beings, there are a number of special ethical concerns to be aware of before beginning. In a nutshell, researchers must make their research goals clear to the members of the community where they undertake their research and gain the informed consent of their consultants to the research beforehand.It is also important to learn whether the group would prefer to be named in the written report of the research or given a pseudonym and to offer the results of the research if informants would like to read it. Most of all, researchers must be sure that the research does not harm or exploit those among whom the research is done. ANALYZING, INTERPRETING AND REPORTING FINDINGS Remember that the researcher is the detective looking for trends and patterns that occur across the various groups or within individuals (Krueger, 1994).The process of analysis and interpretation involve disciplined examination, creative insight, and careful attention to the purposes of the research study. Analysis and interpretation are conceptually separate processes. The analysis process begins with assembling the raw materials and getting an overview or total picture of the entire process. The researcher's role in analysis covers a continuum with assembly of raw data on one extreme and interpretative comments on the other. Analysis is the process of bringing order to the data, organizing what is there into patterns, categories, and basic descriptive units.The analysis process involves consideration of words, tone, context, non-verbals, internal consistency, frequency, extensiveness, intensity, specificity of responses and big ideas. Data reduction strategies are essential in the analysis (Kru eger, 1994). Interpretation involves attaching meaning and significance to the analysis, explaining descriptive patterns, and looking for relationships and linkages among descriptive dimensions. Once these processes have been completed the researcher must report his or her interpretations and conclusions QUALITATIVE DESCRIPTIONReports based on qualitative methods will include a great deal of pure description of the program and/or the experiences of people in the research environment. The purpose of this description is to let the reader know what happened in the environment under observation, what it was like from the participants' point of view to be in the setting, and what particular events or activities in the setting were like. In reading through field notes and interviews the researcher begins to look for those parts of the data that will be polished for presentation as pure description in the research report.What is included by way of description will depend on what questions the researcher is attempting to answer. Often an entire activity will be reported in detail and depth because it represents a typical experience. These descriptions are written in narrative form to provide a holistic picture of what has happened in the reported activity or event. REPORTING FINDINGS The actual content and format of a qualitative report will depend on the information needs of primary stakeholders and the purpose of the research. Even a comprehensive report will have to omit a great deal of the data collected by the researcher.Focus is essential. Analysts who try to include everything risk losing their readers in the sheer volume of the presentation. This process has been referred to as â€Å"the agony of omitting†. The agony of omitting on the part of the researcher is matched only by the readers' agony in having to read those things that were not omitted, but should have been. BALANCE BETWEEN DESCRIPTION AND ANALYSIS In considering what to omit, a decision has to be made about how much description to include. Detailed description and in-depth quotations are the essential qualities of qualitative accounts.Sufficient description and direct quotations should be included to allow readers to understand fully the research setting and the thoughts of the people represented in the narrative. Description should stop short, however, of becoming trivial and mundane. The reader does not have to know absolutely everything that was done or said. Again the problem of focus arises. Description is balanced by analysis and interpretation. Endless description becomes its own muddle. The purpose of analysis is to organize the description in a way that makes it manageable. Description is balanced by analysis and leads into interpretation.An interesting and readable final account provides sufficient description to allow the reader to understand the analysis and sufficient analysis to allow the reader to understand the interpretations and explanations presente d. Try It Yourself Why do people see things differently? The importance of ethnographic research Apple Example Thomas Kuhn suggests that what people see depends on what â€Å"previous visual and conceptual experience has taught† them. This suggests that what we look at and what we see are two different things. Anthropologists Anne Campbell of Washington State University and Patricia C.Rice of West Virginia University give an excellent example of how what we look at and what we see can be different things, depending on who perceives a situation or thing. Try this: * gather two to three people and mentally place an apple on a table in front of the group. * Without any prior discussion, each group member should take a moment to individually write down what it is he or she sees. * After a few minutes, compare notes. What do you find? Did everyone see the same thing? What color was the apple? Are there specific colors given to the apple?What about the type of apple on the table, d id anyone acknowledge if there was a difference between a golden delicious and a Macintosh? What about the size of the apple? Did anyone include size as a characteristic of the apple? What this example shows is that no two people see the same thing. We may understand what an apple is, but in terms of describing it and â€Å"seeing† it much of our sight comes from pervious â€Å"visual-conceptual† experiences. Someone knowledgeable in produce may know that there are many types of apples, just as someone interested in quantities of food may take note of the size of the apple.

Friday, August 30, 2019

Car sales Solution Essay

My task is to imagine my friend is setting up a car locating business and wants to install a computer system. The system must have the power to store different car information and have the function to search for desired car information be stored and searched for easily .The system must also be easy to use and I have been asked to find a solution to carry this out. Two ways that I could solve the problem is by (1). Putting the information in a table using Microsoft Word, information would be easy to store, but a disadvantage would be that it is, hard and time consuming to search for a desired car. Another way would be storing the information in Microsoft Access. Microsoft Access is a program that contains databases. I think this would be the most efficient method to solve the problem, because information could be stored and searched for easily, using fields. To do this you need to use a query. Firstly you must make a query table, to it you need to add as many field options as you need such as type model, below each field type what you are looking. Save the table, open it and you should have some results. The car data type I need to put into the databases to solve the problem are Model, Make, Year, Type, Mileage, Mot, Colour, Extra features and history of owners. These will become the titles of the fields (fields are the tables in which you add all the information in the databases. I need to collect each of these items of data because this will give easy access to search for the customers desired feature of a car. For example if a customer wanted a red car I could just type red next to colour when searching. I have designed a data capture form, which shows all the details of a certain car. The car information I have entered comes from an ad in the local paper Herald and Post. The car information is taken from a Stanground Autos ad. I have decided to create a way of validating data. The data type that needed validating was Mileage and Price. For the Price field the validation rule is; >0 and 0 and

Thursday, August 29, 2019

Beowulf Vs. Gilgamesh

Beowulf Vs. Gilgamesh Essay Beowulf Vs. GilgameshThe two cultures I chose to compare heroic values for are the ancient Mesopotamia and ancient Anglo-Saxon cultures. The texts I used in the comparison are Gilgamesh for Mesopotamia and Beowulf for Anglo-Saxon. Although they posses many similar heroic characteristics they also differ greatly. Beowulf is the earliest surviving epic poem written in a modern European language. It was written in Old English sometime before the tenth century A.D. The poem describes the adventures of Beowulf, a Scandinavian warrior of the sixth century. Beowulf is described as a perfect hero who fights for his people and vanquishes evil with his extraordinary abilities to bring peace and justice. Three of Beowulfs traits that support this are his amazing physical strength, his ability to put his peoples welfare before his own, and the fact that he does not fear death. Beowulf is a hero in the eyes of his fellow men through his amazing physical strength and courage. He fought in numerous battles and returned victorious in all but his last. Beowulf was powerful enough to kill the monster Grendel, who had been terrorizing the Danes for twelve years, with his bare hands. When the two squared off Beowulf grabbed Grendals arm and ripped it off at the shoulder. Beowulf then fought Grendels mother, an even deadlier monster who was seeking revenge against Beowulf for her sons death. Beowulf was able to slay her by slashing her neck with a Giants sword that can only be lifted by a person as strong as Beowulf. When he chopped off her head, he carried it from the ocean with ease, but it took four men to lift the monsters head and carry it back to Herot. This strength is a key trait of Beowulfs heroism. Another heroic value Beowulf possessed was his tendancy to put the welfare of others before his own. Beowulf was asked by the Danes to help rid them of an evil monster that was terrorizing their city. Beowulf obliged and traveled far to face an awesome force that he did not know he could defeat. He realized the dangers of his battles but feared nothing for his own life. Beowulf risked his own life to save the Danes from Grendal then once again when Grendals mother came for revenge. Fifty years after slaying Grendals mother a fierce dragon began terrorizing Beowulfs people. Beowulf was old and tired but he still set out to fight the dragon to protect his people. As an old man Beowulf soon realized he was no match for the dragon, but he didnt run. With the help of one of his followers Beowulf fought hard and finally killed th e dragon, losing his own life in the process. Even in death he wished for the safety of his people. The most heroic of traits within Beowulf is that he was not afraid to die. He always explained his death wishes before going into battle and requested to have all his wealth and belongings distributed between his people. Beowulf was not afraid to die because he lived a heroic life and he felt it was his duty as a hero to defeat any evil or die trying. When we crossed the sea, my comrades and I, I already knew that all my purpose was this: to win the good will of your people or die in battle, pressed in Grendels fierce grip. Let me live in greatness and courage, or here in this hall welcome my death! (22) Beowulf knew that by battling evil monsters such as Grendal he would achieve immortality. The stories of his unconquerable courage would be retold again and again, forever. In life or in death a hero is glorified for their actions. READ: Essay about Cyber Security as an International Security Threat Essay. His strength, his ability to put his peoples welfare before his own, and the fact that he does not fear death makes him revered by all, especially those of his time. These are prime examples that support the idea that Beowulf was an epic hero that served as an example to those of his time. The second text I will be using for this comparison is The Epic of Gilgamesh. The Epic of Gilgamesh was one of the first pieces of literature known to man. The epic was found among ruins in Ninevah in the form of twelve large tablets, dating to 2,000 B.C. The epic is believed to be based on the Archaic Sumerian king Gilgamesh who ruled the city of Uruk around 2700 B.C. The main character in The Epic of Gilgamesh is a very powerful man who is two-thirds immortal and one-third man. He too is thought to be a hero and possesses many of Beowulfs heroic values, but he also possesses many differences. Like Beowulf, Gilgamesh possessed great physical strength unmatched by any man. He also had insurmountable courage. Gilgamesh fought numerous battles that were considered impossible to win. Gilgamesh first destroys an evil monster known as Humbaba. Humbaba is feared by all who enter his cedar forest. Gilgamesh arrives and kills Humbaba with a sword given to him by the god Shamash. After killin g Humbaba the goddess Ishtar sends The Bull of Heaven to destroy Gilgamesh. After the bull killed many of the townspeople Gilgamesh grabbed it by its tail and stabbed it in the back of its head. On his final quest for everlasting life Gilgamesh is attacked by a pack of lions. He takes an axe in one hand and a sword in the other and kills many of the lions, sending the rest fleeing in fear. Gilgameshs strength and courage is much like that of Beowulf. Gilgamesh did not put his people before him. He was an evil king. Gilgamesh sounds of tocsin for his amusement, his arrogance has no bounds by day or night. No son is left with his father, for Gilgamesh takes them all, even the children; yet the king should be a Shepard to his people. His lust leaves no virgin to her lover, neither the warriors daughter nor the wife of the noble In this way Gilgamesh did not display the same heroic values as Beowulf. Even when Gilgamesh set out on his first adventure to kill Humbaba his people and councilors pleaded with Gilgamesh not to go. But Gilgamesh was obsessed with becoming a hero. He set out to destroy Humbaba, his only ambition being to leave an enduring name. The one thing Gilgamesh feared was death. After his friend and companion, Enkidu, died Gigamesh became obsessed with death. He wept for seven days and seven nights before starting a great journey to find everlasting life. He searchers for a man named Utnapishtim, who was given eternal life by the gods, to find out how he escaped death. In both cultures the heros possessed god-like strength and defeated many evil beings. Both were courageous and feared no man or creature. Anglo-saxon heros stick to a stricter code of ethics.Beowulf is the prime example of an epic hero, and he embodies the conduct that the Anglo-Saxons of that time admired and also used as a model of perfection

Wednesday, August 28, 2019

Should minors who commit violent crimes be tried as adults Research Paper

Should minors who commit violent crimes be tried as adults - Research Paper Example but before a concrete decision is made there are a few hurdles that are to be crossed and issues to be looked at, and only after the examination of these issues the pros and cons of such hurdles are discussed one can reach a decision that would not only benefit the minor but also the society as a whole. This paper would look at some of these issues and cater to solutions of those issues by highlighting the advantages of those solutions. The first problem that arises in the decision of treating a minor as an adult in a trial is to know whether a minor has the intellectual and moral capacity to judge the consequences of his crime. In this fast paced modern world where almost everyone has access to media of some sort let it be movies or internet, which makes people aware of crimes and there consequences. I believe that it is one of the most basic things a child learns in his early years that for every bad action there will be consequences and it’s through this idea a child learns what is right and what is wrong. A child who is aware of the fact that a crime is a bad deed he must then be aware of the consequences it will bring. Now a days with the increase in violence around everyone it is just hard to believe that a child not matter how young he is, is unable to understand the effects of violence. It would be childish on our part to assume that a minor who is willing to commit a crime as heinous as murder is in nocent. A child who knows how to use a gun or any weapon to kill someone or use it for violence is fully aware of the consequences it will bring on himself, victim and the society, Reaves (2001). At what age then children develop that moral sense and understand the consequences of their actions? The solution to this problem would be to find a way to know whether a minor under question has developed that moral sense or not. Before the decision is made of

Tuesday, August 27, 2019

O&PM Assignment Essay Example | Topics and Well Written Essays - 500 words

O&PM Assignment - Essay Example Below describes how the 4Vs are involved in the business process in the supermarket. Ordering and delivery of goods from suppliers depends on volume of goods that were sold. The amount of goods ordered (volume) usually depends the amount present and the sales records. There can be a situation where the ordered volume of products is high but with a low variety of the same products. An example is when a large volume but small variety of fruits are ordered from suppliers. The demand for each product in a supermarket varies and is very hard to predict, and with not enough inventory space, what the management does is stock less volume of the products with more variety. This is to make sure that there is each variety of a product available for customers as each customer has different preference. It is crucial for a competitive supermarket to make sure they do not run out of each of the variety of products available. Another ‘V’ which is crucial to a supermarket is variation of demand as supermarkets have to cope with changing customer needs during different seasons. Therefore it is ultimately important to have large variety of products. Merchandising or displaying of products in shelves is also important. This is known as visibility. Products should be displayed in a manner that they are highly visible to the customer in order to make it easier for them to find the products. The main idea is to attract customers have many variety of products which are easily visible. Therefore the shelves should be designed in a way that there is a large variety of a certain product in its category on the shelf. Also fast- moving goods should be placed in shelves next to the entrance for convenience of customers (Samson and draft, 2012,56). Retail store orders for goods from warehouse according to need and preference of local customers. Periodically, the store

Monday, August 26, 2019

EXPLORING ACCESS AND MOBILITY IN BUILT ENVIRONMENT Essay

EXPLORING ACCESS AND MOBILITY IN BUILT ENVIRONMENT - Essay Example On the other hand, permits should be issued to operators with genuine need to drive on walkways. The campus pedestrain system needs to be adjusted so that the functional image that the university wishes as a pedestrian-oreinted campus. This system will assist the campus a great deal. The plan establishes the college grounds elements, including the major parking lots that produce the highest level of pedestrian traffic on an everday basis. These places of highest utilization are connected to a key walkway system that features adeqautely broad primary walks. On the other hand, areas with the lowest rates of pedestrian traffic must be linked through tertiary walks. These tertiary walks will serve low traffic demand, offer essential links between building, open spaces, parking, service areas. The lack of shared-used paths also hampers access and mobility for students who come to campus with bicycles. These shared use passageways will accommodate both bicycles and pedestrains. They also w ill serve as key transportation corridors and offer an optional to on-road facilities for less skilled cyclists within the campus. Patterned post-and chain bollards may be used to regulate pedestrian movement in fields of open lawn, front lawn within the campus. ... Next, disability is a purposeful restriction within a person cuased by physical, mental or sensoroy impairment. While handicap means the restriction or loss of chances to engage in the community on a balanced level with others due to physical or social fronts. Project A.B.L.E also increased my knowledge of dyslexia. Dyslexia cuases undue misery at school and at work. Many adults are hindered at work because they struggle with reading. I also got to learn about cerebral palsy which is a neurologic disorder caused by brain damage, normally sustained during fetal growth or delivery. The seminar, in addition, also expanded my knowledge about the symptoms of attention deficit disorder. Morever, I also learnt that there are three different subtypes of attention deficit disorders, including; combined ADHD characterized with symptoms of both inattentiveness and impulsivity; Inattetive ADHD, which is characterized by impaired attention and focus; Hyperactive-impulsive ADHD.1 Some speakers in the project also talked about the various disabilty rights laws that disabled people are entitled to. The disability rights laws ban any prejudice when it comes to employment. For instance, employees with fifteen or more workers are required to offer persons with disabilities who are competent for a position. This will then promote a spirit of equal opportunity. The mission for equality amid all sphere of social strata level is one essential cause to ensure that everyone is offered an equal opportunity at living life. Per se, this project use of an array of disability awareness strategies is important in teaching others the value of acknowledging people with disabilities as eqauls. Work Cited Melillo, Robert,

Life in Thailand Essay Example | Topics and Well Written Essays - 1250 words

Life in Thailand - Essay Example Since that time I wanted to write a book myself. When I turned five years old, I and my family moved back to Bangkok. So I know two dialects of Thai language. At the age of nine, my parents sent me to Singapore for my education. There Singapore, I was taught English that followed the British System. I didn’t get that British accent but got used to it. People in Singapore have a unique accent called â€Å"Sing-lish†. There are many people of different races and cultures in the city of Singapore. Most of them are Chinese, Malay, and Indian. So I even studied the Chinese language when I was in Singapore and that also influenced my speech. So now have something like English-British-Singlish-Thai accent and a mix of languages in my mind. After that, I moved to Los Angeles for studying in Junior High. When I began living in the USA I also heard and adopted the American accent and because of that, I have had a hard time speaking and understanding. It felt like all the language s and dialects were mixed up in my head. It was a difficult time not only for me but also for my new friends and teachers, it was hard for them to understand what I was trying to say. And even now I still have an echo of this problem in my life. Sometimes I still feel that it is difficult for people to understand my speech. But, unfortunately, I cannot do anything with that. The name of my native country is the word, which sounds like â€Å"Thai† in our language, means â€Å"freedom† and we call our country â€Å"Prathet Thai† while the name that all the people got used to Thailand appeared only in 1930th. Speaking about the culture of Thailand I should mention that Buddhism and other religions and beliefs greatly influenced Thai art and way of life.  Ã‚  

Sunday, August 25, 2019

Oppression Essay Example | Topics and Well Written Essays - 750 words

Oppression - Essay Example This paper then aims to discuss the elements and the faces of oppression in order to draw a sound conclusion whether or not a man really oppresses another man and whether or not the society can advance without necessarily oppressing any other person or group of persons. I have learned that oppression can be seen as a social concept and as a structural concept. According to the article of Young (1990) oppression is a structural phenomenon that "immobilizes or diminishes a group" and structurally, oppression is "the tyranny by a ruling group." It is a description that has long been used through the centuries of pains and struggle of people from different kinds of bondage. However and whoever defines the term to me oppression has been witnessed to be a very powerful tool that can really be utilized by those who are in control to preserve the present structure of the society. It is used as a weapon by the ruling class to stay in their power and control not only the political affairs but most especially the economy of the country. This means that in this society, the struggle for more power and greed of money has turned many individuals as oppressors of other men. This society has shaped men only in to two kinds: the predator and the prey. The predator oppresses and eats the weaker men and the prey is eaten and devoured by the more cunning oppressors. I have read from the article of Young that there are five faces of oppression: (1) exploitation of labor; (2) gender exploitation were women are treated less powerful that men; (3) racial exploitation where cultural groups are not given the same rights and privileges; (4) marginalization where a social group are deprived to participate in a social life; and (5) cultural imperialism which is describes as involving " the universalization of a dominant group's experience and culture and its establishment as the norm." We can recall what we have learned in our history and looked at the plight of the Africans who were victimized of the Trans-Atlantic Slavery. The experiences of this social group do not speak only of one face of oppression but they have suffered the five faces of oppression. The Africans were sold to be slaves of wealthy men and nations. They were harassed and maltreated, and if they showed resistance they were killed. We can recall how the Africans men and women alike suffered in the plantations in the South where they have to withstand economic deprivation and the rapacity of their masters. Their lives were always threatened and they live not only wallowing in extreme poverty but in extreme fear. Their women were raped and abused by their masters. Who indeed can say that man cannot oppress his fellowman The history of the African Americans and the suffering of other minority tribes are glaring reality that men are oppressors of weaker men. So many times we have witnessed death and destruction because of labor unrest, or subversion. Men are imprisoned or killed unable to defend their homes and their families as they result to violence because of starvation. Oppression of men must be cruel but it happened and it still happening. Until now many are affected by the cruelty suffered by the poor natives of Africa who

Saturday, August 24, 2019

The Conflict Resolution Process in Teams Research Paper

The Conflict Resolution Process in Teams - Research Paper Example Of all resources an organization has in its disposal none is perhaps as relevant and important to the success of the organization than the human resources. Human resources if managed well hold the key to the success of the organization. According to (Cranny, Smith, & Stone, 1992) human resources output is higher when the employee's function as a team than it is the case when employees do not work as teams. A synergetic effect is what results when organizations embrace team spirit. However, creating functional and efficient teams calls for expertise, tolerance and a lot of motivation on the part of the organization. Teams enable employees to exploit their potential and therefore increase job performance. A team consists of members with diverse experience, skills and qualification, cultures and business backgrounds. To an organization, this translates into the potential for success. However, as (Cranny, Smith, & Stone, 1992) notes team building process is a challenging process that can present numerous challenges to the management. However, teams have disadvantages such as reduced independence of talented and capable workers, social loafing as well as bureaucracy hence time wastage (Schermerhorn, Hunt, & Osborn, 2005).      Tajfel and Turner, (1979) classifies teams into functional teams which consist only of members drawn from various departments, self-managed teams which are formed to meet some specific goals and objectives and function with little or no supervision, task forces are teams constituted to oversee completion of specific projects, while process improvement teams are comprised of experts as well as technocrats in a given field. Formation of working teams presents the following challenges to leaders; establishing strong team leadership, difficulty in establishing positive interpersonal relationships, fear of the teams failing to meet set goals which translate to wasted resources as well as the possibility of members of the team failing to adapt well into the team. These challenges lead to conflicts in the group. As (Cote, & Morgan, 2002) notes, conflicts are not necessarily detrimental to the success of the organization. If well-resolved conflicts have numerous advantages and disadvantages alike. If well-managed conflicts serve as a bonding experience and an opportunity for the team members to learn and reunite something which results in the team emerging more strong, and ready for the challenges ahead. According to (Sims, & Manz, 1995) in modern business organizations, teams are indispensable something which explains the reasons for meetings and committees in most modern organizations.   

Friday, August 23, 2019

The use of HR Service Centers Term Paper Example | Topics and Well Written Essays - 2500 words

The use of HR Service Centers - Term Paper Example Frederick Taylor and his followers introduced the first formal monitoring system prior to World War I. In the year 1950, it was recognized that appraisal is a useful tool for motivation as well as development of the employees. In the year 1970, the term performance management was introduced by Beer and Ruh. The later section of the project deals with the literature review of performance appraisal where previously conducted research has been taken into consideration in order generate to ideas and to make the base stronger. The last two section deals with the problems as well as recommendations for performance appraisal. Human resource management is one of the most important functions for any organization. It deals with matters relating to staffing, skill management, performance management, payroll, training and development, recruitment and selection among others. HRM is a management driven activity, focused on the values of the business, commitment oriented, with diverse strategic scope which gives strong stress on incorporation. This paper deals with the discipline of performance management which is one of the most important aspects of HRM (Armstrong, 2006). Performance management is one of the most important developments in the areas of human resource management. It is a tool which helps to measure the performance of the employees as well as improve their way of working so that the goals of the organization are achieved in an effective and efficient manner. It is very often found that whenever one thinks of performance in an organization, the first thing that comes to our mind is performance of the employees. Infact the performance management must deal with the products or services, programs, processes, departments, organization, teams and groups, etc. 360 degree feedback method is the modern appraisal method which includes feedback from everyone including self ratings, peer review and upward assessment. It helps in

Thursday, August 22, 2019

Checkout and Settlement Essay Example for Free

Checkout and Settlement Essay Check out and settlement are part of the final stages of the guest cycle. It is the final phase of the guest cycle and examines the various activities involved in checkout and settlement. Check out involves the front desk as also other departments such as housekeeping, bell desk, cashier’s desk, Point of sales etc. Main areas for a checkout are the belldesk and the cashier. The FO performs at least 3 important functions during the checkout and settlement process. †¢ It resolves outstanding guest account balances. †¢ It updates room status information †¢ It creates guest history records. Guest account settlement depends on effective FO accounting system that maintains accurate guest folios, verifies and authorizes a method of settlement and resolves discrepancies in account balances. Hotels find it most effective to settle a guest account while the guest is still in the hotel. Guest can settle the bill by paying cash, charging the balance to a credit card, deferring payment to an approved direct billing entity or using a combination of payment methods. Most hotels require a guest to specify during registration an eventual method of settlement. FO should verify or confirm guest credit card or direct billing information before he/she arrives at the desk for check out. Pre settlement verification activities ensure that the hotel will be paid for accommodation and services. DEPARTURE ACTIVITIES AT VARIOUS DESKS: 1) At the Bell Desk: During checkout a luggage outpass has to be obtained from the cashier stating that the guest has settled his account and returned the room key. Once this is received a departure errand card is made and filled out by the bell boy and will got to the guest room to bring down the luggage. The bell captain will also make an entry regarding this in the bell captain’s control sheet. On reaching the guest room the bell boy will announce himself, knock on the door enter the room on gaining permission. The bellboy will also ensure the following: 1. Collect room keys from the guest 2. Check the room for any possible damage to the property. 3. Draws the curtains, locks the balcony. 4. Checks bathroom and fittings. 5. The guest is escorted by him to the front desk 6. He puts a â€Å"room to be cleaned tag† card on the door after switching of the lights and air conditioner. The departure room is then inspected by a housekeeping supervisor/ Room attendant to ensure that nothing is left behind by the guest. The housekeeping/ In room dining department will also check the minibar for anything consumed by the guest to be charged to the bill. At the lobby the bell boy will: Keep the guest’s luggage at the bell desk Put hotel stickers and mark the luggage with â€Å"D† indicating departure luggage. Collect the luggage out clearance slip from the reception and loads the luggage in the car/taxi. Return the errand card to the bell captain which will then be entered onto the bell captain’s control sheet. 2) At the Reception desk: The Front desk receptionist checks the list of expected checkouts for the day and will confirm with the guest his date and time of checkout. Departure notification slips are printed to inform the other departments of the guest’s checkout. In a manual system the room racks are updated. The departure register is also updated. Checking for the mail messages and faxes. Checking for safe deposit box or in room safe keys. 3) At the cashier’s desk: 1. Verifying account information. 2. Posting any remaining charges to the guest’s folio. 3. Presenting the guest folio. 4. Verifying the method of payment. 5. Processing the account payment. 6. Securing the room key. 7. Updating the room status. The procedures used will vary among Front Offices depending upon hotels level of service and degree of automation. Some Front Offices offer automated or express check out. Traditionally at check out guest is presented a final copy of his/her account folio for review and settlement. FOA should confirm how the guest intends to settle the account. Guest may establish credit by presenting a credit card but may choose to settle his bill by cash or travelers cheques. VIP or special guests or corporate accounts should not be asked for settlement if their account is marked that all charges are to be Direct Billed. FOA should bring the guest account balance to zero, called zeroing out. When guest pays by cash or credit card, hotels assume that the payment is full and close the folio. If the account is to be paid through Direct Billing by the hotel, however the account is not brought to a zero balance because it must be transferred to the city ledger and billed through the account receivable system. METHODS OF SETTLEMENT A guest account can be brought to a zero balance in several ways. Methods of settlement include cash payment, credit card or Direct Billing transfer or combined settlement method. I. CASH PAYMENT IN FULL Cash payment in full at check out will bring a guest account balance to zero. A cash receipt has to be issued to the guest by the cashier. The cashier should mark the folio paid. If the guest has produced a credit card at check in, the cashier should destroy the guest credit card voucher imprinted at registration when the guest pays the account in full with cash. Guests paying in foreign currency should convert their money to local currency (some international currencies like $ are accepted). Hotels often charge a fee to convert currencies as banks charge the fee from the hotels. Currency conversion rates are displayed at the Cashiers counter or it can also be taken from business sections of newspapers. Guests can also use traveler’s cheques to settle their bills. Traveler’s cheques are issued by banks and avoid the risk of carrying cash. At the time of settlement the cashier should confirm the identity of the guest from the safety and security point of view. Also there is no danger of them being stolen as they can be encashed only when the signature of the holder tallies with the signature signed at the time of issue. A foreign traveler’s cheque should be treated as foreign currency and the necessary records, statements and certificates must be maintained like in the case of foreign currency and should be sent to the Reserve Bank of India. Difference between an ordinary cheque and a traveler’s cheque |Ordinary cheque |Travelers cheque | |For issuing a person should have a bank account (either |No need of any bank account for purchasing and encashing of | |current or saving). |traveler’s cheque. | |Any amount can be filled in the cheque as they are blank. |Have a fixed amount printed on its face and available in different | | |denominations. | |Only one signature is needed of the holder. |Two signatures are required (one in the presence of the issuing | | |authority and second in the presence of encashing authority). | |Ordinary cheques are valid only for 3-6 months. |Valid for indefinite period of time unless dated. | |These cheques can be crossed for account payee. |No such provision. | |No slip/list of lost, damaged or stolen cheques is issued by |Many banks issue a stop list for stolen and damaged cheques. | |the bank. | | |Cheque may bounce as the balance in the account may be less |No such possibility as the amount is already printed on the face of | |than the cheque |the cheque. | |Not safe as someone might force the owner to sign the cheque. |Quite safe because the second signature have to be put in front of | | |the encashing authority. | Procedure for accepting foreign currency: †¢ Request guest passport and determine the credentials such as name and photo identification place of issue and date of expiry of the passport. †¢ Confirm that the guest is a resident of the hotel by asking his room no. If the guest is a non-resident the permission of the lobby manager is obtained who will extend this facility to VIP’s and regular guests. †¢ Receive the cash or traveler’s cheque in foreign currency. †¢ Calculate the total amount of ocal currency to be paid by multiplying the foreign currency by the exchange rate displayed. †¢ Fill in details of the foreign currency encashment certificate. †¢ Request the guest to sign the foreign currency encashment certificate and compare the signature with the passport. †¢ Request the guest to sign the traveler’s cheque if it is an instrument of exchange. †¢ Give the total amount of local currency with the encashment certificate to the guest †¢ Second copy of the certificate is attached to the notes or traveler’s cheques received †¢ Third copy remains in the encashment certificate book. †¢ Fill in details in the record of foreign currency transactions. †¢ Fill in details of the foreign currency transaction in the cashier’s report. II. CREDIT CARD TRANSFER Even though credit card transfer settlement brings a guest account to zero, the amount of the charge must be tracked until payment is actually received from the credit card Co. Credit card settlement creates a transfer of credit on the guest folio and moves an account balance from the guest ledger to a credit card account in the city ledger (non- guest ledger). (Procedure). Guest signature completes this transaction. In some hotels computer system sends the settlement transactions directly to the credit card Co. guest only signs on the voucher present at FO. There is no need to sign on imprinted voucher. When foreign guests pay by credit card, credit card Co. payment is in local currency. III. DIRECT BILLING TRANSFER Like credit card settlement, direct billing transfers a guest account balance from the guest ledger to the city ledger. Unlike credit card settlement responsibility for billing and collecting a direct billing lies with the hotel rather than an outside agency. Billing should be arranged and approved by hotel’s credit department. Guest signs the folio and accepts the responsibility to pay the bill should direct billing account not pay the bill. IV. COMBINED SETTLEMENT METHOD A guest may elect to use more than one settlement method to bring the folio balance to zero. E.g., guest may make partial cash payment and charge the reminder of the account balance to an acceptable credit card. FOA must accurately record the combined settlement methods and take care that all required paper work is properly completed. Once the guest has settled the account the FOA should provide the guest with a copy of the folio. Good evaluation and follow up should be there as it is the last chance to make an impression. LATE CHECK OUTS Guests do not always check out by the hotels posted check out time. To minimise late check outs, the front office should post check out time notices in conspicuous places such as back of the guest room door, FO, in departure material etc. some hotels charge late check out fee. Explain to the guest why the fee is charged (management policy, HK can prepare room for other guests arriving that day). CHECK OUT OPTIONS Advance in technology with special guest service to expedite departure activities. 1. Express check out Guests may encounter line at front desk when checking out during the peak hours (e.g., between 7.30 and 9.30 am). To ease front desk volume, some FO initiate check out activity before the guest is actually ready to leave. A common pre departure activity involves producing and distributing guest folios to guests expected to check out. FO, HK or Security staff can quietly slip the folio into the guestroom, while they go for their rounds. By completing such a form, guest authorises the front office to transfer his or her outstanding folio to the credit card voucher created during registration. Procedure for express check-out: The receptionist should inform the guest about the express check out facility in the hotel If the guest wishes to use this facility obtain his card during check in Take the impression of the card on a charge slip and on the express check out slip. The charge slip is signed by the guest. One copy of the express check out slip is given to the guest. Explain to the guest that he needs to wrap his room key in the copy and drop it in the express check out drop box located in the lobby at the time of his departure. Attach a copy of the charge slip and express check out sip to the registration card The lobby manager/duty manager files his copy of express check out slip as per the check out date. A day prior to the guests check out the copy of the guest bill is sent to the room with an ECO sticker attached An ECO rooms list should be printed every morning which is necessary for monitoring the entire system. The second copy of this list is given to the bell desk. This system is available only for credit card paying guests and is a facility given to those guests who avoid going physically to the cashier’s desk at the time of check out for considerable time saving. 2. Self check out In some hotels guests can check themselves out of the hotel by accessing self check out terminals in the lobby or in room system interfaced with front office computer intended to reduce check out time and front desk traffic. Some resemble automatic bank teller machines while others posses video and audio capability. Credit card has to be used (number or magnetic strip). Check out is complete when the guest’s balance is transferred to a credit card account and an itemised account statement is printed and dispersed to the guest. This system sends an updated room status to front office computer. In room folio review and check out usually relies on an in room television or guestroom telephone access via an in room TV. Guests can pick up a printed folio at the front desk on his way out. In room self check out automatically updates room status and creates Guest History records. Another advantage is guests can look at their folios at any time during their stay. UNPAID ACCOUNT BALANCES No matter how carefully the front office monitors guest’s stay there is always possibility that the guest will leave without settling his account. Guest may forget to check out or front office may discover late charges for a guest who has already checked out. After departure charges or outstanding balances represent unpaid account balances. LATE CHARGES may be a major concern in guest account settlement. Restaurant, telephone, room service charges etc are the examples of some potential late charges. Sometimes additional cost of postage, stationary, labor, etc is more than the late charge itself. It is important in maximising the profitability. FOLLOWING STEPS CAN BE TAKEN TO REDUCE LATE CHARGES: In automated and semi automated system front office can- †¢ Post transactional vouchers as soon as they arrive at the front desk. †¢ Survey front office equipment and voucher and folio racks for unposted charges. E.g., local telephone, in room movie charge meters may posses information not recorded in a voucher. †¢ Ask departing guests whether they have incurred any charge purchase or long distance calls that do not appear on the folio. Front may appoint runners to collect vouchers or get information on phone at peak hours. Front office computer system that interfaces with revenue center outlets is often the most effective means of reducing or even eliminating late charges. Room key deposits at reception counter help in reducing unpaid balances. ACCOUNT COLLECTION Late charges that are billed to departed guests should not be classified as un- collectible until the front office has exhausted all billing and collection procedures. A registration card should contain guest address, phone number etc. Procedures for collection of late charges will be different for cash and credit card depending on company policy for late charges. Guest account not settled at check out regardless of the credit established or prepayments processed during registration are transferred from the guest ledger to the city ledger, from front office to hotels accounting division. TYPICAL CITY LEDGER ACCOUNT INCLUDE: 1. Credit card billing- to authorised credit card billing. 2. Direct billing–to approved company and individual account. 3. Travel agency account- for authorised tours and groups. 4. Bad cheque account- resulting from departed guests whose personal cheques were returned unpaid. 5. Skipper account- guests who left the hotel without settling their account. 6. Disputed bills account- for guests who refuse to settle their account (in part or in full) because of a discrepancy. 7. Guaranteed reservation account- for billing and tracing no show guests. 8. Late charges account- for guests who checked out before some charges were posted to their account. 9. House accounts- for non-guest business and promotional activities. To be effective, the front office must establish a policy for billing departed guests with overdue account. Account receivable billing include determining: 1. When outstanding account balances are payable. 2. The number of days between billing. 3. How to control departed guests whose accounts are overdue. Collection schedules can range from aggressive (short cycle) to lenient (long cycle) depending on the hotels financial needs, clientele profile, history of collection patterns and so on. †¢ Firm in any encounters involving deferred payment. †¢ Documented procedure for collecting overdoes. †¢ Credit for tour group to be established well before they arrive. †¢ Uncollectible accounts to be sent back to the departments that originally accepted the uncollectible charge. FRONT OFFICE RECORDS Front office usually makes two copies of each guest account folio. 1 copy – guest receipt 2 copy – hotels permanent record Front office that uses three part folio, file the third copy with credit card voucher or direct billing statement in case the guest later needs a summary of charges. Registration cards are filed alphabetically whereas guest folios are filed numerically. GUEST HISTORIES Front office management can better understand its clientele and determine guest trends when it develops and maintains a guest history file. It contains personal and financial data of the guest hence it is confidential and proprietary. It is the last step in check out and account settlement. Many hotels build guest history cards from expired registration cards. It has information about the guest’s spouse, family etc. the information may help develop ads that appeal to the types of clientele the hotel is attempting to attract. Guest histories may also point out the need for new, supplementary or enhanced services. MARKETING FOLLOW THROUGH Hotels marketing department may rely in part on guest history files to develop new marketing strategies. Also, a property-marketing programme may depend on the front office performance and follow through at check out. E.g., marketing department creates a program to reward frequent guests with a free stay. Front office may be responsible for tracking the number of stays. Frequent travelers clubs are designed to encourage brand loyalty. Here airlines work as co marketers. GROUP DEPARTURE: At the Bell desk: Sufficient number of bell boys are arranged to handle luggage of the group. Baggage down time and wake up calls times are important and must be checked and followed strictly. Allocate floors and rooms to bell boys to bring down the luggage down to the lobby. If on the day of departure the guests are not in the room the bell boys go to each group member’s rooms and â€Å"pull† each group members baggage out of the room and bring it down to the lobby until the group is ready to leave. This process is called as â€Å"bag pull† Baggage is brought down to the lobby and counted. Bell captain obtains a baggage outpass. Room keys are handed to reception After clearance from the cashier and reception Finally the baggage is loaded onto the vehicle by the bellboys. At the reception: Departure notification sips are issued half an hour prior to actual departure by the receptionist to telephones, housekeeping, room service, and food and beverage etc. to avoid any late charges. At the cashier: Cashier prints out the master folio and individual folios {if any}. Makes a room wise summary for easy collection Master folio given to the tour leader and the individual bills are collected with the assistance of tour leader.

Wednesday, August 21, 2019

Aristotle - Short Essay Essay Example for Free

Aristotle Short Essay Essay Throughout his life, Aristotle paid particularly close attention to the notion of happiness. In Aristotle’s opinion, happiness is achieved by obtaining the highest good by living a good life. However, living a good life in accordance with Aristotle’s views can be difficult. He believes that in order to live a good life, one must constantly seek to fulfill the bodily needs. To do so, one must live with moral and intellectual virtues at all times. Aristotle believed that living with moral and intellectual virtues is accomplished by developing a keen sense of rationality. He says that rational judgment is the result of living within the appropriate mean of two extremes. There are several examples he gives to illustrate this conception. One example he provides is the appropriate mean between acting bravely and acting cowardly. He proceeds to explain that if he was to act overly brave then when he was in battle he would act overzealously and cause himself harm. However, if he was to act without enough aggression then he would appear cowardly. Aristotle explains that it is reasonable to be confused with this explanation. He further explains that it is not finding the exact mean between two extremes that one must endeavor, but to assess each situation individually. He says that with each situation that arises, one must analyze it and determine to what degree of one extreme or another one must respond with. Each person, he believes, will react differently and no situation will be exactly the same. It is through one’s intelligence and practical wisdom that will allow them to live with moral and intellectual virtues. By following this conception, Aristotle believes happiness can be achieved. Although Aristotle’s conception of happiness is a sensible argument, it fails to account for a number of situations. Aristotle’s primary thesis concerns the application of the appropriate mean of two extremes. However, there are several situations which do not have an appropriate mean between two extremes. For example, there is no mean found on the issue of murder. If Aristotle’s conception was applied, would someone have to determine the mean between excessively murdering and only slightly murdering another person? In such a case as this, Aristotle argues that there are some actions which do not need any application of the mean of two extremes because some actions are always wrong. With this explanation raises the question why the concept of a mean between extremes is given if it cannot account for all situations? Furthermore, it also brings into question when to apply a mean between extremes or how to determine that a particular action is an exception because it is just simply wrong. Therefore, because Aristotle’s conception of happiness fails to account for all practicalities, it is not a good model to define happiness.

Tuesday, August 20, 2019

Handwritten Character Recognition Using Bayesian Decision Theory

Handwritten Character Recognition Using Bayesian Decision Theory Abstract: Character recognition (CR) can solve more complex problem in handwritten character and make recognition easier. Handwriting character recognition (HCR) has received extensive attention in academic and production fields. The recognition system can be either online or offline. Offline handwritten character recognition is the sub fields of optical character recognition (OCR). The offline handwritten character recognition stages are preprocessing, segmentation, feature extraction and recognition. Our aim is to improve missing character rate of an offline character recognition using Bayesian decision theory. Keywords: Character recognition, Optical character recognition, Off-line Handwriting, Segmentation, Feature extraction, Bayesian decision theory. Introduction The recognition system can be either on-line or off-line. On-line handwriting recognition involves the automatic conversion of text as it is written on a special digitized or PDA, where a sensor picks up the pen-tip movements as well as pen-up/pen-down switching. That kind of data is known as digital ink and can be regarded as a dynamic representation of handwriting. Off-line handwriting recognition involves the automatic conversion of text in an image into letter codes which are usable within computer and text-processing applications. The data obtained by this form is regarded as a static representation of handwriting. The aim of character recognition is to translate human readable character to machine readable character. Optical character recognition is a process of translation of human readable character to machine readable character in optically scanned and digitized text. Handwritten character recognition (HCR) has received extensive attention in academic and production fields. Bayesian decision theory is a fundamental statistical approach that quantifies the tradeoffs between various decisions using probabilities and costs that accompany such decision. They divided the decision process into the following five steps: Identification of the problem. Obtaining necessary information. Production of possible solution. Evaluation of such solution. Selection of a strategy for performance. They also include a sixth stage implementation of the decision. In the existing approach missing data cannot be recognition which is useful in recognition historical data. In our approach we are recognition the missing words using Bayesian classifier. It first classifier the missing words to obtain minimize error. It can recover as much error as possible. Related Work The history of CR can be traced as early as 1900, when the Russian scientist Turing attempted to develop an aid for the visually handicapped [1]. The first character recognizers appeared in the middle of the 1940s with the development of digital computers. The early work on the automatic recognition of characters has been concentrated either upon machine-printed text or upon a small set of well-distinguished handwritten text or symbols. Machine-printed CR systems in this period generally used template matching in which an image is compared to a library of images. For handwritten text, low-level image processing techniques have been used on the binary image to extract feature vectors, which are then fed to statistical classifiers. Successful, but constrained algorithms have been implemented mostly for Latin characters and numerals. However, some studies on Japanese, Chinese, Hebrew, Indian, Cyrillic, Greek, and Arabic characters and numerals in both machine-printed and handwritten cas es were also initiated [2]. The commercial character recognizers were available in the 1950s, when electronic tablets capturing the x-y coordinate data of pen-tip movement was first introduced. This innovation enabled the researchers to work on the on-line handwriting recognition problem. A good source of references for on-line recognition until 1980 can be found in [3]. Studies up until 1980 suffered from the lack of powerful computer hardware and data acquisition devices. With the explosion of information technology, the previously developed methodologies found a very fertile environment for rapid growth addition to the statistical methods. The CR research was focused basically on the shape recognition techniques without using any semantic information. This led to an upper limit in the recognition rate, which was not sufficient in many practical applications. Historical review of CR research and development during this period can be found in [4] and [3] for off-line and on-line cases, respectively. The real progress on CR systems is achieved during this period, using the new development tools and methodologies, which are empowered by the continuously growing information technologies. In the early 1990s, image processing and pattern recognition techniques were efficiently combined with artificial intelligence (AI) methodologies. Researchers developed complex CR algorithms, which receive high-resolution input data and require extensive number crunching in the implementation phase. Nowadays, in addition to the more powerful computers and more accurate electronic equipments such as scanners, cameras, and electronic tablets, we have efficient, modern use of methodologies such as neural networks (NNs), hidden Markov models (HMMs), fuzzy set reasoning, and natural language processing. The recent systems for the machine-printed off-line [2] [5] and limited vocabulary, user-dependent on-line handwritten characters [2] [12] are quite satisfactory for restricted applications. However, there is still a long way to go in order to reach the ultimate goal of machine simulation of fluent human reading, especially for unconstrained on-line and off-line handwriting. Bayesian decision Theory (BDT), one of the statistical techniques for pattern classification, to identify each of the large number of black-and-white rectangular pixel displays as one of the 26 capital letters in the English alphabet. The character images were based on 20 different fonts and each letter within 20 fonts was randomly distorted to produce a file of 20,000 unique instances [6]. Existing System In this overview, character recognition (CR) is used as an umbrella term, which covers all types of machine recognition of characters in various application domains. The overview serves as an update for the state-of-the-art in the CR field, emphasizing the methodologies required for the increasing needs in newly emerging areas, such as development of electronic libraries, multimedia databases, and systems which require handwriting data entry. The study investigates the direction of the CR research, analyzing the limitations of methodologies for the systems, which can be classified based upon two major criteria: 1) the data acquisition process (on-line or off-line) and 2) the text type (machine-printed or handwritten). No matter in which class the problem belongs, in general, there are five major stages Figure1 in the CR problem: 1) Preprocessing 2) Segmentation 3) Feature Extraction 4) Recognition 5) Post processing 3.1. Preprocessing The raw data, depending on the data acquisition type, is subjected to a number of preliminary processing steps to make it usable in the descriptive stages of character analysis. Preprocessing aims to produce data that are easy for the CR systems to operate accurately. The main objectives of preprocessing are: 1) Noise reduction 2) Normalization of the data 3) Compression in the amount of information to be retained. In order to achieve the above objectives, the following techniques are used in the preprocessing stage. Preprocessing Segmentation Splits Words Feature Extraction Recognition Post processing Figure 1. Character recognition 3.1.1 Noise Reduction The noise, introduced by the optical scanning device or the writing instrument, causes disconnected line segments, bumps and gaps in lines, filled loops, etc. The distortion, including local variations, rounding of corners, dilation, and erosion, is also a problem. Prior to the CR, it is necessary to eliminate these imperfections. Hundreds of available noise reduction techniques can be categorized in three major groups [7] [8]: a) Filtering b) Morphological Operations c) Noise Modeling 3.1.2 Normalization Normalization methods aim to remove the variations of the writing and obtain standardized data. The following are the basic methods for normalization [4] [10][16]. a) Skew Normalization and Baseline Extraction b) Slant Normalization c) Size Normalization 3.1.3 Compression It is well known that classical image compression techniques transform the image from the space domain to domains, which are not suitable for recognition. Compression for CR requires space domain techniques for preserving the shape information. a) Threshold: In order to reduce storage requirements and to increase processing speed, it is often desirable to represent gray-scale or color images as binary images by picking a threshold value. Two categories of threshold exist: global and local. Global threshold picks one threshold value for the entire document image which is often based on an estimation of the background level from the intensity histogram of the image. Local (adaptive) threshold use different values for each pixel according to the local area information. b) Thinning: While it provides a tremendous reduction in data size, thinning extracts the shape information of the characters. Thinning can be considered as conversion of off-line handwriting to almost on-line like data, with spurious branches and artifacts. Two basic approaches for thinning are 1) pixel wise and 2) nonpareil wise thinning [1]. Pixel wise thinning methods locally and iteratively process the image until one pixel wide skeleton remains. They are very sensitive to noise and may deform the shape of the character. On the other hand, the no pixel wise methods use some global information about the character during the thinning. They produce a certain median or centerline of the pattern directly without examining all the individual pixels. In clustering-based thinning method defines the skeleton of character as the cluster centers. Some thinning algorithms identify the singular points of the characters, such as end points, cross points, and loops. These points are the source of problems. In a nonpareil wise thinning, they are handled with global approaches. A survey of pixel wise and nonpareil wise thinning approaches is available in [9]. 3.2. Segmentation The preprocessing stage yields a clean document in the sense that a sufficient amount of shape information, high compression, and low noise on a normalized image is obtained. The next stage is segmenting the document into its subcomponents. Segmentation is an important stage because the extent one can reach in separation of words, lines, or characters directly affects the recognition rate of the script. There are two types of segmentation: external segmentation, which is the isolation of various writing units, such as paragraphs, sentences, or words, and internal segmentation, which is the isolation of letters, especially in cursively written words. 1) External Segmentation: It is the most critical part of the document analysis, which is a necessary step prior to the off-line CR Although document analysis is a relatively different research area with its own methodologies and techniques, segmenting the document image into text and non text regions is an integral part of the OCR software. Therefore, one who works in the CR field should have a general overview for document analysis techniques. Page layout analysis is accomplished in two stages: The first stage is the structural analysis, which is concerned with the segmentation of the image into blocks of document components (paragraph, row, word, etc.), and the second one is the functional analysis, which uses location, size, and various layout rules to label the functional content of document components (title, abstract, etc.) [12]. 2) Internal Segmentation: Although the methods have developed remarkably in the last decade and a variety of techniques have emerged, segmentation of cursive script into letters is still an unsolved problem. Character segmentation strategies are divided into three categories [13] is Explicit Segmentation, Implicit Segmentation and Mixed Strategies. 3.3. Feature Extraction Image representation plays one of the most important roles in a recognition system. In the simplest case, gray-level or binary images are fed to a recognizer. However, in most of the recognition systems, in order to avoid extra complexity and to increase the accuracy of the algorithms, a more compact and characteristic representation is required. For this purpose, a set of features is extracted for each class that helps distinguish it from other classes while remaining invariant to characteristic differences within the class[14]. A good survey on feature extraction methods for CR can be found [15].In the following, hundreds of document image representations methods are categorized into three major groups are Global Transformation and Series Expansion, Statistical Representation and Geometrical and Topological Representation . 3.4. Recognition Techniques CR systems extensively use the methodologies of pattern recognition, which assigns an unknown sample into a predefined class. Numerous techniques for CR can be investigated in four general approaches of pattern recognition, as suggested in [16] are Template matching, Statistical techniques, and Structural techniques and Neural networks. 3.5. Post Processing Until this point, no semantic information is considered during the stages of CR. It is well known that humans read by context up to 60% for careless handwriting. While preprocessing tries to clean the document in a certain sense, it may remove important information, since the context information is not available at this stage. The lack of context information during the segmentation stage may cause even more severe and irreversible errors since it yields meaningless segmentation boundaries. It is clear that if the semantic information were available to a certain extent, it would contribute a lot to the accuracy of the CR stages. On the other hand, the entire CR problem is for determining the context of the document image. Therefore, utilization of the context information in the CR problem creates a chicken and egg problem. The review of the recent CR research indicates minor improvements when only shape recognition of the character is considered. Therefore, the incorporation of contex t and shape information in all the stages of CR systems is necessary for meaningful improvements in recognition rates. The proposed System Architecture The proposed research methodology for off-line cursive handwritten characters is described in this section as shown in Figure 2. 4.1 Preprocessing There exist a whole lot of tasks to complete before the actual character recognition operation is commenced. These preceding tasks make certain the scanned document is in a suitable form so as to ensure the input for the subsequent recognition operation is intact. The process of refining the scanned input image includes several steps that include: Binarization, for transforming gray-scale images in to black white images, scraping noises, Skew Correction- performed to align the input with the coordinate system of the scanner and etc., The preprocessing stage comprise three steps: (1) Binarization (2) Noise Removal (3) Skew Correction Scanned Document Image Feature Extraction Bayesian Decision Theory Training and Recognition Pre-processing Binarization Noise Removal Skew correction Segmentation Line Word Character Recognition o/p Figure 2. Proposed System Architecture 4.1.1 Binarization Extraction of foreground (ink) from the background (paper) is called as threshold. Typically two peaks comprise the histogram gray-scale values of a document image: a high peak analogous to the white background and a smaller peak corresponding to the foreground. Fixing the threshold value is determining the one optimal value between the peaks of gray-scale values [1]. Each value of the threshold is tried and the one that maximizes the criterion is chosen from the two classes regarded as the foreground and back ground points. 4.1.2 Noise Removal The presence of noise can cost the efficiency of the character recognition system; this topic has been dealt extensively in document analysis for typed or machine-printed documents. Noise may be due the poor quality of the document or that accumulated whilst scanning, but whatever is the cause of its presence it should be removed before further Processing. We have used median filtering and Wiener filtering for the removal of the noise from the image. 4.1.3 Skew Correction Aligning the paper document with the co-ordinate system of the scanner is essential and called as skew correction. There exist a myriad of approaches for skew correction covering correlation, projection, profiles, Hough transform and etc. For skew angle detection Cumulative Scalar Products (CSP) of windows of text blocks with the Gabor filters at different orientations are calculated. Alignment of the text line is used as an important feature in estimating the skew angle. We calculate CSP for all possible 50X50 windows on the scanned document image and the median of all the angles obtained gives the skew angle. 4.2 Segmentation Segmentation is a process of distinguishing lines, words, and even characters of a hand written or machine-printed document, a crucial step as it extracts the meaningful regions for analysis. There exist many sophisticated approaches for segmenting the region of interest. Straight-forward, may be the task of segmenting the lines of text in to words and characters for a machine printed documents in contrast to that of handwritten document, which is quiet difficult. Examining the horizontal histogram profile at a smaller range of skew angles can accomplish it. The details of line, word and character segmentation are discussed as follows. 4.2.1 Line Segmentation Obviously the ascenders and descanters frequently intersect up and down of the adjacent lines, while the lines of text might itself flutter up and down. Each word of the line resides on the imaginary line that people use to assume while writing and a method has been formulated based on this notion shown fig.3. Figure 3. Line Segmentation The local minima points are calibrated from each Component to approximate this imaginary baseline. To calculate and categorize the minima of all components and to recognize different handwritten lines clustering techniques are deployed. 4.2.2 Word and Character Segmentation The process of word segmentation succeeds the line separation task. Most of the word segmentation issues usually concentrate on discerning the gaps between the characters to distinguish the words from one another other. This process of discriminating words emerged from the notion that the spaces between words are usually larger than the spaces between the characters in fig 4. Figure 4. Word Segmentation There are not many approaches to word segmentation issues dealt in the literature. In spite of all these perceived conceptions, exemptions are quiet common due to flourishes in writing styles with leading and trailing ligatures. Alternative methods not depending on the one-dimensional distance between components, incorporates cues that humans use. Meticulous examination of the variation of spacing between the adjacent characters as a function of the corresponding characters themselves helps reveal the writing style of the author, in terms of spacing. The segmentation scheme comprises the notion of expecting greater spaces between characters with leading and trailing ligatures. Recognizing the words themselves in textual lines can itself help lead to isolation of words. Segmentation of words in to its constituent characters is touted by most recognition methods. Features like ligatures and concavity are used for determining the segmentation points. 4.3 Feature Extraction The size inevitably limited in practice, it becomes essential to exploit optimal usage of the information stored in the available database for feature extraction. Thanks to the sequence of straight lines, instead of a set of pixels, it is attractive to represent character images in handwritten character recognition. Whilst holding discriminated information to feed the classifier, considerable reduction on the amount of data is achieved through vector representation that stores only two pairs of ordinates replacing information of several pixels. Vectorization process is performed only on basis of bi-dimensional image of a character in off-line character recognition, as the dynamic level of writing is not available. Reducing the thickness of drawing to a single pixel requires thinning of character images first. Character before and after Thinning After streamlining the character to its skeleton, entrusting on an oriented search process of pixels and on a criterion of quality of represe ntation goes on the vectorization process. The oriented search process principally works by searching for new pixels, initially in the same direction and on the current line segment subsequently. The search direction will deviate progressively from the present one when no pixels are traced. The dynamic level of writing is retrieved of course with moderate level of accuracy, and that is object of oriented search. Starting the scanning process from top to bottom and from left to right, the starting point of the first line segment, the first pixel is identified. According to the oriented search principle, specified is the next pixel that is likely to be incorporated in the segment. Horizontal is the default direction of the segment considered for oriented search. Either if the distortion of representation exceeds a critical threshold or if the given number of pixels has been associated with the segment, the conclusion of line segment occurs. Computing the average distance between the l ine segment and the pixels associated with it will yield the distortion of representation. The sequence of straight lines being represented through ordinates of its two extremities character image representation is streamlined finally. All the ordinates are regularized in accordance to the initial width and height of character image to resolve scale Variance. 4.4 Bayesian Decision Theories The Bayesian decision theory is a system that minimizes the classification error. This theory plays a role of a prior. This is when there is priority information about something that we would like to classify. It is a fundamental statistical approach that quantifies the tradeoffs between various decisions using probabilities and costs that accompany such decisions. First, we will assume that all probabilities are known. Then, we will study the cases where the probabilistic structure is not completely known. Suppose we know P (wj) and p (x|wj) for j = 1, 2à ¢Ã¢â€š ¬Ã‚ ¦n. and measure the lightness of a fish as the value x. Define P (wj |x) as the a posteriori probability (probability of the state of nature being wj given the measurement of feature value x). We can use the Bayes formula to convert the prior probability to the posterior probability P (wj |x) = Where p(x) P (x|wj) is called the likelihood and p(x) is called the evidence. Probability of error for this decision P (w1 |x) if we decide w2 P (w2|x) if we decide w1 P (error|x) = { Average probability of error P (error) = P (error) = Bayes decision rule minimizes this error because P (error|x) = min {P (w1|x), P (w2|x)} Let {w1. . . wc} be the finite set of c states of nature (classes, categories). Let {ÃŽÂ ±1. . . ÃŽÂ ±a} be the finite set of a possible actions. Let ÃŽÂ » (ÃŽÂ ±i |wj) be the loss incurred for taking action ÃŽÂ ±i when the state of nature is wj. Let x be the D-component vector-valued random variable called the feature vector. P (x|wj) is the class-conditional probability density function. P (wj) is the prior probability that nature is in state wj. The posterior probability can be computed as P (wj |x) = Where p(x) Suppose we observe x and take action ÃŽÂ ±i. If the true state of nature is wj, we incur the loss ÃŽÂ » (ÃŽÂ ±i |wj). The expected loss with taking action ÃŽÂ ±i is R (ÃŽÂ ±i |x) = which is also called the conditional risk. The general decision rule ÃŽÂ ±(x) tells us which action to take for observation x. We want to find the decision rule that minimizes the overall risk R = Bayes decision rule minimizes the overall risk by selecting the action ÃŽÂ ±i for which R (ÃŽÂ ±i|x) is minimum. The resulting minimum overall risk is called the Bayes risk and is the best performance that can be achieved. 4.5 Simulations This section describes the implementation of the mapping and generation model. It is implemented using GUI (Graphical User Interface) components of the Java programming under Eclipse Tool and Database storing data in Microsoft Access. For given Handwritten image character and convert to Binarization, Noise Remove and Segmentation as shown in Figure 5(a). Then after perform Feature Extraction, Recognition using Bayesian decision theory as shown in Figure5(b). Figure 5(a) Binarization, Noise Remove and Segmentation Figure 5(b) Recognition using Bayesian decision theory 5. Results and Discussion This database contains 86,272 word instances from an 11,050 word dictionary written down in 13,040 text lines. We used the sets of the benchmark task with the closed vocabulary IAM-OnDB-t13. There the data is divided into four sets: one set for training; one set for validating the Meta parameters of the training; a second validation set which can be used, for example, for optimizing a language model; and an independent test set. No writer appears in more than one set. Thus, a writer independent recognition task is considered. The size of the vocabulary is about 11K. In our experiments, we did not include a language model. Thus the second validation set has not been used. Table1. Shows the results of the four individual recognition systems [17]. The word recognition rate is simply measured by dividing the number of correct recognized words by the number of words in the transcription. We presented a new Bayesian decision theory for the recognition of handwritten notes written on a whiteboard. We combined two off-line and two online recognition systems. To combine the output sequences of the recognizers, we incrementally aligned the word sequences using a standard string matching algorithm. Evaluation of proposed Bayesian decision theory with existing recognition systems with respect to graph is shown in figure 6. Table 1. Results of four individuals recognition systems System Method Recognition rate Accuracy 1st Offline Hidden Markov Method 66.90% 61.40% 1st Online ANN 73.40% 65.10% 2nd Online HMM 73.80% 65.20% 2nd Offline Bayesian Decision theory 75.20% 66.10% Figure 6 Evaluation of Bayesian decision theory with existing recognition systems Then each output position the word with the most occurrences has been used as the  ¬Ã‚ nal result. With the Bayesian decision theory could statistically signi ¬Ã‚ cantly increase the accuracy. 6. Conclusion We conclude that the proposed approach for offline character recognition, which fits the input character image for the appropriate feature and classifier according to the input image quality. In existing system missing characters cant be identified. Our approach using Bayesian Decision Theories which can classify missing data effectively which decrease error in compare to hidden Markova model. Significantly increases in accuracy levels will found in our method for character recognition