Saturday, August 31, 2019

Hh Holmes

H. H. Holmes A. Introduction: On May 16, 1861 Herman Webster Mudgett was born. His home town was Gilmanton, New Hampshire and he soon would become the notorious Dr. H. H. Holmes, Americas’ first Serial Killer. He was a small white male born into a devout Methodist family. Holmes’ mother Theodate Page Price forced strict religious studies while his father, Levi Horton Mudgett handed out the harsh, strong discipline. Holmes had one brother and sister. B. Intelligence, Social achievement, social adjustment in school: Holmes was thought to be unusually intelligent at an early age.With his great ambition and drive he excelled in school. He attended Gilmanton Acade3my High School, University of Vermont for one year, and in 1882 attending University of Michigan Medical School and graduates from medical school in 1884. It is his time spent at University of Michigan that he develops his lust for blood and becoming immune from death and dismemberment. This is also where he develo ps and masters the art of scamming and because of this he changes his name to Dr. H. H. Holmes in 1886 to elude former acquaintances from coming forth with accusations of fraud or death.C. Family structure and environment: Holmes was the son of Levi Horton Mudgett and Theodate Page Price and had a very privileged childhood. The environment of the household was that of any family of this era, the 1800’s. They raised their children to be good people, never lie, work hard, pray for everything good and bad, and always show respect. Holmes had a brother and sister but there is no information on them which makes it difficult to explain birth order. D. Emotional adjustment in the family: Herman Webster Mudgett (Dr. H. H.Holmes) was raised in a very privileged home but under strict and very structured circumstances. His relationship with his family was typical of any young boy. He had respect for his family and says that he â€Å"was well trained by loving and religious parents†. E. Social/emotional adjustment outside the family: H. H. Holmes did have friends and acquaintances but was very specific about who he would allow to be close. His deceptions started at the age of eight but all were just childish lies that seemed like the simple acts of a young boy.He was disciplined for them but they seemed to be harmless in nature and out of boredom. He befriended his first true friend in college. This friend was a classmate form Canada who he describes as â€Å"one of the very few intimate friends I have ever allowed myself. † Holmes did marry in 1878 to Clara Lovering, then in 1887 married Myrta Belking who he had a daughter with and his last wife Georgina Yoke in 1894. He managed to be married to all three without any of them knowing and handled a few mistresses in between. F. Employment history, adjustment, work habits:During a school vacation Holmes takes a job as a book agent which turns out to be a fraud and was paid no money at all. He them after graduation he takes numerous jobs in numerous states serving as drug store clerk, asylum attendant, teacher, and doctor to name a few. He opened a practice in Mooers Forks, NY and stayed for one year doing â€Å"good and conscientious work† with lots of gratitude but little money as a physician. He seemed to get either bored with a job or just did not make the amount of money he required so he kept his options open moving from state to state to make money however he could.G. Personality style/characteristics: Throughout Holmes’ life he seemed to be more and more unsettled. He could not stay in one place for long and his relationships were short but there was always someone there whether it be one of his wives, an employee, or a mistress. He was extroverted in the sense that he could hold regular relationships with women and made friends but did not keep them around for long and did not allow too many people to get close at one time. H. Demeanor, appearance and groomin g: Holmes was always very well groomed and had a very sophisticated appearance.Coming from a very privileged, hard working, religious family he kept himself very clean. He was very charming and very attractive so he had no problems with he ladies. He always wore a hat and tie and came across as a well like, trusted businessman. I. Pathological behavior characteristics: H. H. Holmes’ pathological problems started at the age of eight with him starting to lie. His lies and scams grew along with his age and by the age of 25 he changed his name to H. H. Holmes to elude accusations from those he lied to and scammed.He continued to con and manipulate using his trusting looks and medical degree swindling thousands of dollars from insurance companies by taking cadavers from medical school, taking insurance policies out on them and telling the insurance that he was a family member to collect the money. Holmes was such a pathological liar and has given so many accounts about the number of people he has killed that to this day the true number is unknown. He always needed stimulation and a proneness to boredom, and was conning and very manipulative. He had numerous wives and had promiscuous sexual behavior by having several mistresses.J. Geographic Profiling: Holmes was considered to be a geographically transient serial killer. He moved from state to state killing in almost each one. He would move through the states because this was his way to elude capture or being suspected of the crimes he committed. After he changed his name in 1886 he settled in Chicago for a while and found a drugstore he worked at that was owned by a husband and wife. The husband owner passed away mysteriously and after the wife signed over the store to Holmes she mysteriously disappeared. H. H. hen built a hotel eventually called the â€Å"Castle† across the street from the store that he turned into his killing chambers. The entire second floor was dedicated and designed with rooms th at he put people into and killed. Even though he traveled he always killed close to home or where he worked. The patrons of this hotel would check into the hotel but would never check out. He had full access to victims that came to him of their own free will out of trust. This type of victim search is called the trapper method, and once they arrived he had full control over them and did not let them leave this is called the ambusher attack method.The Castle (H. H. Holmes Hotel) K. Psychological Profiling: Offender Typologies: As an organized offender he was very much in control of what he did to his victims. His crimes were planned out and he was a highly competent individual. The murders that took place at the â€Å"Castle†, for instance each room was designed specifically to kill the individuals he placed inside. He had gas lines placed into some of the rooms with controls in his room, which was on the third floor, so he could turn the gas on and through a peep hole in the wall of the room watch the victim being gassed to death and plead for their lives.Holmes was known to be very good looking, very charming, and geographically and occupationally mobile which allowed him more opportunity to continue to scam and murder. L. Psychological Profiling: C/S Typologies: Being in control of how he killed his victims is a characteristic of an organized offender. None of his killings were sexually motivated which would also make him a comfort-oriented serial killer, someone who kills specifically for personal gain. None of his crime scenes were chaotic and not only would Holmes plan out how his victim would expire but he also planned out very carefully how this victim would be disposed of.M. Psychological Profiling: Offense Characteristics: H. H. was completely fascinated with death and the human body. He was also very driven by money and used this drive to kill to obtain it. As a comfort-oriented serial killer he would con his victims into giving him their mone y, property, or business then kill them after his profit. The conning of his victims would become his M. O. and his signature would be the way he dismembered and incinerated his victims. Holmes did not take trophies from his victims and the souvenirs he would take from the victim would be their money.He would not keep or take any personal items from the at all. Most of the murders took place in Chicago at the â€Å"Castle† during the world’s fair in 1893. It started in May of 1893 and ended in October of 1983 and it is estimated that over 20 million people visited the world’s fair from all over the world. As they left their homes to visit Chicago not knowing where to stay their family members did not know their whereabouts either. This made them an easy target because they would not be missed. These people would rent rooms at his hotel and some would stay and leave and others would never be heard from again.He would not need to stage the scene of the crime becau se no one knew they were there at his hotel. After killing them he would dump them into a chute that lead to the basement where he would dismember them, skin them clean, and sell their skeletons to medical schools for money. Some of them he would make up to $200 a skeleton which in those times was a fortune. Because acid vats, and a crematorium disguised as a glass blowing furnace were Holmes’ favorite way to dispose of his victims the identification of those bones at the scene was very difficult.The medical examiner could not identify whether they were animal or human bones because the bone fragments were so small. The bones, hair, and teeth found at the scene of where the three children (Alice, Nellie, and Howard Pitezel) he murdered were identifiable by the medical examiner and did lead to Holmes being charged for those with that evidence. There are only a few crime scene photos found: N. Victimology: It is truly unknown as to how many people Holmes has killed. There are a t least 50 missing people from the world’s fair that were eventually traced back to Holmes and the â€Å"Castle. He was not particular about the age or the race of his victims although quite a few of them were female assuming that he used his good looks and charm to earn their trust, con and kill them. All of his mistresses were killed but oddly all of his legitimate wives lived out their lives in full. In 1890 Julia Connor with her daughter Pearl answered a newspaper add to work for Holmes. Julia became his mistress and when she found out she was pregnant she confronted Holmes and demanded marriage. He agreed on the condition that he perform an abortion which she agreed to.Julia and her daughter pearl were never heard from again. In 1892 yet another employee and mistress of Holmes, Emiline Cigard, was asked to go into the volt to retrieve papers and was locked in and suffocated to death. Two women that were easy targets, did not have family close, and needed work. Then Benj amin Pitezel came along to work for Holmes. Benjamin had a wife, Carrie, and five children. He could not hold down a job for long and was an alcoholic. He needed the job that Holmes provided to take care of his family.Pitezel was Holmes’ right hand man and was more that aware of his scams. Holmes’ and Pitezel thought up a life insurance scam that required Pitezel to take out a life insurance policy and then he would disappear and be classified as dead so his wife could collect on it. He told Carrie all about it and she begged him not to do it. After the policy was taken out Ben Pitezel was dead. Holmes made his death look like suicide by the use of chloroform. At that time there was nothing to find the chloroform so there was no proof.Three of his children, Alice, Nellie, and Howard, met Holmes to identify the body and traveled with him, the children were never seen again. Obviously from the murders at the castle not all of the victims were acquaintances. The common th eme with all of the victims is that they were all easy targets. Some were not in their own cities and not close to family, some were women alone and needy, some were emotionally unstable, and they were all killed for money. O. Motive: The question why is always asked when these types of crimes are committed. In H. H. Holmes case the motive was financial gain.The criminology theory that best describes Holmes is the choice theory. He used at fee will a rational, intelligent decision to commit the acts of fraud and murder to dispose of his victims the way he did to continue his fantasies of working on cadavers. P. Conclusion: Holmes’ one mistake is not paying a fellow inmate that was in on the Pitezel insurance scheme the $500 he owed him from when Holmes was briefly incarcerated for fraud. The inmate, Hedgepeth, read in the paper that Pitezel had been killed and immediately told the warden who advised the insurance company.The insurance company contacted Pinkerton Detective Age ncy and the case began. Holmes was found and arrested by the Pinkerton Detectives on November 17, 1894 in Boston. He was then taken to Moyamensing Prison in Philadelphia and tried for conspiracy to defraud the Fidelity Mutual Life Insurance Company. Holmes pleads guilty and insists that Ben Pitezel committed suicide and made numerous conflicting statements as to where the Pitezel children were located. Soon suspicion grew that Holmes had killed the children which were later found dead and buried.After this was discovered detectives searched Holmes’ hotel only to find the basement where he dismembered and burned his victims. Once this information got out amongst the public that Holmes was a murderer he quickly became sensationalized. His case was the case of the century and he was then known at H. H. Homes Americas First Serial Killer. After all of the press the castle was burned to the ground with no reason or no ideas as to who torched it to the ground. While Holmes was inca rcerated he wanted to be remembered as being innocent so he wrote his own autobiography called â€Å"Holmes’ Own Story. His trial started on September 23rd, 1895 and was found guilty some months later by a jury of first degree murder and sentenced to death. Holmes would be hanged on May 7, 1896 only nine days short of his 35th birthday. For fear that his brain might go to medicine men for study he requested he be buried in concrete so no one could dig him up, and he was buried in concrete. To date there is no concrete evidence as to how many people Holmes did actually murder. Profiling Presentation H. H. Holmes Americas First Serial Killer By Traci McCann

Friday, August 30, 2019

Personal Imaginative Coursework – Conflict

Conflict Marion had always got on with Sinead, but I'd noticed that recently things hadn't been as peachy. She was in a room, her room, flicking through old magazines. It was starting to get dark and she hadn't yet shut the curtains. ‘Knock knock'. Silence. ‘Knock knock'. â€Å"Mum?† Creak. â€Å"Why's it so dark in here? I'm going out, I'll be back later.† â€Å"I said I'd meet Mary at seven.† Sinead went over and pulled the curtains shut, tutting as she did so. â€Å"Well you can't, I'm going out.† â€Å"I told you earlier, I can still go, we're seeing ‘The Fruit Picker', you know, the one with Bobby Clampton.† Marion sat down, tucking her skirt under her as she always did. â€Å"I don't think so, fruitcake. I don't want you to OK?† Sinead said, facing her daughter. â€Å"But you didn't tell me you were going out and I've already made plans.† â€Å"Enough. I've said no.† Sinead made an annoying emphasis on the word no with her hands like she usually did before she lost her temper. â€Å"Then tell me why.† Marion was starting to get impatient but didn't want Sinead to go into one, so tried to be rational. â€Å"Because I've said so.† â€Å"I have no problem in doing what you say as long as you give me a good reason, and so far I haven't seen one so I assume I'm still going out.† As she said this, Marion went over to Sinead, noticing a helicopter circling the sky outside. â€Å"The reason is that I want you to stay home in case your father rings.† â€Å"No it's not, you made that up. I'll be back around ten.† â€Å"You'll be here at ten because you won't be going out. Ever.† â€Å"What, even school?† she said sarkily. â€Å"Don't be a smart little cow. Yeah, even school.† â€Å"Don't be stupid. You can't be serious?† The worried expression on her face showed that calm composure wasn't the first thing on her mind at the moment. â€Å"I'm deadly serious. See you later.† Sinead left the door open as she left the room and a few seconds later let the front door slam. I knew she'd be OK, so I stayed with Marion. Marion punched the bed with anger and let out a few reluctant sobs. She stood up jerkily and banged her head against the wall a few times to gather her thoughts. She stood for a moment then I followed her out of the room. I waited at the top of the stairs while she went down. She came back up with a knife from the kitchen. We went back into her room. She sat down on the bed. As I stayed by the door I watched her pull up her sleeve. She put the knife to her wrist and winced. I wanted to do something but I was only there to watch. â€Å"That'll show her.† she muttered. She reached over to get a tissue and smeared some of the blood over the rest of her arm. â€Å"Run† BANG. BANG. â€Å"Now† BANG. The light was making him see in flashes, like strobing. The night was closing in on him but everything else was breaking up. As he turned the corner he tripped on a dustbin. Him and Mark had gone in opposite directions. â€Å"The Brits are on our tail.† â€Å"Down here† Voices from all directions were clouding his mind. The sirens were deafening. All he could do was think about his wife and daughter back home and know they'd be OK. It was quite a slow process as they dragged him, with a few of the others, into the back of the van, with the gunshots still roaring through the sky. Late at night, in the depths of the Irish countryside, a man knelt down beside his bed in a dorm, alongside many other men, some only boys, and prayed. Prayed that the Lord could give him strength to stand by his country and make him a martyr for freedom. But above all that the Lord might send someone to watch over his young wife and child in times when he could not be there. Because for him, knowing that God was watching over them meant knowing that they'd be safe even when he was too distant for his love to reach them. Many other men had prayed that night, for the next day was the day they'd first gone out and fought what would be the beginning of an even longer war. But O'Brien's was the prayer I heard and the prayer I answered. And when he was caught, then lined up and shot by a British Army Officer and it was my turn to move on, I couldn't help staying just a little longer to make sure Sinead and Marion got through it alright. A few hours later Marion was back with the magazines, the blood having crusted into a nice little scar. She heard a clunk from downstairs and quickly switched off the light and jumped into bed with her clothes still on. I went downstairs to check on Sinead. She'd got back later than she normally did. She took off her coat and hung it over the banister. She walked down the hall into the kitchen and put her keys down on the table. As she scanned the contents of the fridge, forest fruits gateau, cheese, orange juice, the phone started to ring. She shut the fridge door and picked it up after three rings. â€Å"Hello?† â€Å"Yes, that's me.† The person on the end of the receiver was too muffled for me to hear. Sinead began fiddling with the only ring on her fingers. She paled and her shoulders tensed up. Her breathing became shallow and her chest heaved. â€Å"I understand.† â€Å"No thank you, I'll be fine.† She put down the handset and lent on the worktop for support. She stood straight and walked through the hall and up the stairs trembling. I followed closely behind. â€Å"Can I come in, darlin'?† her voice didn't come out as intended, it sounded too high, false. The door opened away from us, and Marion stood, looking unusually small. Sinead walked through and sat on the bed, her eyes were sunken and red. Marion stayed by the door too. â€Å"Are you OK mum? Has something happened?† â€Å"Come over here, love.† She gestured by patting the space next to her. Marion walked slowly over, looking stiff and uncomfortable. â€Å"What is it?† she asked. Sinead didn't look her in the eye. She gestured again and Marion sat down. â€Å"I've just had a call from Mark. He had some news about your father.† As her eyes started pricking Marion wished she hadn't turned on the light before opening the door. â€Å"He was caught on a job and he's been, he's been killed.† Marion lifted up her arm to wipe her eye, â€Å"What on earth have you done to yourself?† Sinead's voice was trembling and cracking and her eyes shot with blood. â€Å"Nothing. I – I didn't mean to.† â€Å"Oh come here, my baby.† And she pulled her to her, and as they both sat there sobbing out loud, clutching each other, I went over and put my arms round them both, gently rocking them from side to side into the night, softly singing an old Irish song my mother used to sing to me: The Minstrel Boy to the war is gone In the ranks of death you will find him His father's sword he hath girded on And his wild harp slung behind him â€Å"Land of Song!† said the warrior bard â€Å"Tho' all the world betrays thee One sword, at least, they rights shall guard One faithful harp shall praise thee!† The Minstrel fell! But the foeman's chain Could not bring that proud soul under The harp he lov'd ne'er spoke again For he tore its chords asunder And said â€Å"No chains shall sully thee Thou soul of love and brav'ry! Thy songs were made for the pure and free, They shall never sound in slavery!†

Coca-Cola Market Opportunity

The Coca-Cola Company has long been a worldwide business. The first soda fountain sales to Canada and Mexico were recorded in 1897 with the first international bottler established in Panama in 1906. Coca-Cola entered China in 1927 and the 100th country, Sierra Leone, in 1957. Today, the Coca-Cola Company is the largest beverage company with the most extensive distribution system in the world. In the first two decades of the twentieth century, the international growth of Coca-Cola had been rather haphazard. It began in 1900, when Charles Howard Candler, eldest son of Asa Candler, took a jug of syrup with him on vacation to England. A modest order for five gallons of syrup was mailed back to Atlanta. The same year, Coca-Cola travelled to Cuba and Puerto Rico, and it wasn't long before the international distribution of syrup began. Through the early 1900s, bottling operations were built in Cuba, Panama, Canada, Puerto Rico, the Philippines, and Guam (western Pacific island). In 1920, a bottling company began operating in France as the first bottler of Coca-Cola on the European continent. In 1926, Robert W. Woodruff, chief executive officer and chairman of the board, committed the company to organized international expansion by establishing the Foreign Department, which in 1930 became a subsidiary known as the Coca-Cola Export Corporation. By that time, the number of countries with bottling operations had almost quadrupled, and the company had initiated a partnership with the Olympic Games that transcended cultural boundaries. Coca-Cola and the Olympic Games began their association in the summer of 1928, when an American freighter arrived in Amsterdam carrying the United States Olympic team and 1,000 cases of Coca-Cola. Forty thousand spectators filled the stadium to witness two firsts: the first lighting of the Olympic flame and the first sale of Coke at an Olympiad. Dressed in caps and coats bearing the Coca-Cola trademark, vendors satisfied the fans' thirst, while outside the stadium, refreshment stands, cafes, restaurants, and small shops called ‘winkles' served Coke in bottles and from soda fountains. The company began a major push to establish bottling operations outside the USA. Plants were opened in France, Guatemala, Honduras, Mexico, Belgium, Italy, and South Africa. By the time the Second World War began, Coca-Cola was being bottled in forty-four countries, including those on both sides of the conflict. Far from devastating the business, the war simply presented a new set of challenges and opportunities for the entire Coca-Cola system. The entry of the United States into the war brought an order from Robert Woodruff in 1941 ‘to see that every man in uniform gets a bottle of Coca-Cola for 5 cents, wherever he is and whatever it costs the Company. This effort to supply the armed forces with Coke was being launched when an urgent cablegram arrived from General Dwight Eisenhower's Allied Headquarters in North Africa. Dated 29 June 1943, it requested shipment of materials and equipment for ten bottling plants. Prefaced by the directive that the shipments were not to replace other military cargo, the cablegram also requested shipment of 3 million filled bottles of Coca-Cola, along with supplies for producing the same quantity twice monthly. Within six months, a company engineer had flown to Algiers and opened the first plant, the forerunner of sixty four bottling plants shipped abroad during the Second World War. The plants were set up as close as possible to combat areas in Europe and the Pacific. More than 5 billion bottles of Coke were consumed by military service personnel during the war, in addition to countless servings through dispensers and mobile, self-contained units in battle areas. But the presence of Coca-Cola did more than just lift the morale of the troops. In many areas, it gave local people their first taste of Coca-Cola. When peace returned, the Coca-Cola system was poised for unprecedented worldwide growth. From the mid-1940s until 1960, the number of countries with bottling operations nearly doubled. As the world emerged from a time of conflict, Coca-Cola emerged as a worldwide symbol of friendship and refreshment. The Coca-Cola Company is now operating in more than 200 countries and producing nearly 400 brands; the Coca-Cola system has successfully applied a simple formula on a global scale: provide a moment of refreshment for a very small amount of money-a billion times a day. The Coca-Cola Company and its network of bottlers comprise the most sophisticated and pervasive production and distribution system in the world. From Boston to Beijing, from Montreal to Moscow, Coca-Cola, more than any other consumer product, has brought pleasure to thirsty consumers around the globe. 1. Trace the Internationalisation / Globalisation model of coco cola. 2. What were the Triggers & Motives for coco cola to global? 3. Why do you think coco cola was so successful despite the fact that ‘food & drinks’ preferences are highly local like in case of tea/ coffee?

Thursday, August 29, 2019

Financial Report Case Study Example | Topics and Well Written Essays - 1500 words

Financial Report - Case Study Example rn on equity output with the industry ratio, the company’s 28 percent ratio is favourably higher than the average industry return on equity ratio of 19 percent. b) Gross profit margin. Both years generated a similar 30 percent output. Comparing the 2013 28 percent gross profit ratio output with the industry ratio, the company performed financially better than the 10 percent average industry gross profit ratio. c) Net profit margin. The 2013 net profit ratio output is 6 percent. On the other hand, the 2012 net profit ratio performance an unfavourably lower 3 percent output. Comparing the 2013 6 percent net profit ratio output with the industry ratio, the company performed financially better than the 3 percent average industry net profit ratio output. d) Current ratio. The 2013 current ratio output is unfavourable at 0.47. On the other hand, the 2012 current ratio shows a more unfavourably lower 0.37. Comparing the 2013 current ratio output with the industry current ratio, the industry average current ratio is better than the company’s 0.47current ratio. The industry average current ratio is company’s 1.70. The ratio indicates there are not enough current assets reserved for the payment of currently maturing debts. e) Inventory (stock) turnover period. In terms of number of days converting inventory into cash, the company’s inventory turnover period for 2013 is 7.53 days. The 2012 annual period’s inventory turnover period, 10 days, is financially less favourable than the 2013 accounting period’s output. Comparing the 2013 inventory turnover ratio of 7.53 days, the company’s turnover ratio is far better than the average industry, 50 days inventory turnover ratio. f) Trade payables’ (creditors’) turnover period. The payables turnover ratio during both years is similarly pegged at 3 days. Comparing the 2013 return on equity output with the industry payables turnover ratio, the industry average’s 20 days payables turnover ratio is favourably

Wednesday, August 28, 2019

Pricing Strategies of Tiger Airways Research Paper

Pricing Strategies of Tiger Airways - Research Paper Example The Tiger Airways is divided into services and brands such as the marketing and customer services which comprise the in flight services, the marketing service and cabin crew (Albers, Auerbach, & Baum, 2005, p. 154). Furthermore, the operational services comprise flight operations, catering, aviation services, and operation planning and control services. The other section of the airline is the commercial service section. The airline has operations in countries like China, Hong Kong, Thailand, and Australia. Amongst all its destinations mentioned above, Thailand stands out as its major market. The company has a well-established website that enables passengers and other clients to book tickets cheaply online. This and other pricing strategies will be discussed in subsequent sections. This project, therefore, aims to explore the pricing strategies used to sell the Tiger airways tickets as well as other products. To successfully explore its pricing strategies, the discussion will also capture the factors influencing tiger airway’s pricing strategies and the positive and negative impacts of the pricing strategies used by Tiger airways. The pricing strategies used to sell the Tiger airways tickets and other product Tiger Airways employs a mix of pricing strategies coupled with unbeatable deals on airfares aimed at helping passengers to reach their destinations safely and cheaply. In addition to their competitive airfares, they also offer superb deals on hotels. Some of these strategies are discussed below. 2.1 Low-fare pricing Strategy Tiger Airways employ a low-fare pricing strategy. By definition, according to Graham (2008) the low-fare airlines also employ low cost strategies lowering their costs in relation to the pricing and cost strategies of their rivals. The business model of Tiger airways is primarily characterized by the simplicity of products and services, low costs of operation as well as a specific positioning, allowing them to offer their customers prices that are low, without offering many of extra services. The low prices provided by Tiger Airways have been appealing and attracting new clients in the market and even the airports such as Changi Airport in Singapore have adapted and transforming relative to the growth of the airline (Carrilho, 2010). Based on the fact that low cost air companies require reduced or lower airfares, airports are also assigned to this particularly segment by paying close attention to the income generated by activities that are non aeronautica l in nature as commercial services due to the income gen

Tuesday, August 27, 2019

TRAVEL ESSAY Example | Topics and Well Written Essays - 750 words

TRAVEL - Essay Example It also gave me the opportunity to meet new friends. After spending hours in school, most children who lived close to the street of our apartment were expected to stroll around the community area. Around 4 to 5 p.m. each day, children around my age who live in nearby places would gather to play in the park. Some children would run around the park while other children would simply gather in one place to talk about what they had encountered in school the entire day. One thing that attracted me most in the park is an old acacia tree that was surrounded by colorful flowers. Instead of playing with other children, I remember that I used to carry a book which I normally read as I sat down on one of the benches close to that huge old tree. Culture pertains to the way a group of people live their lives (South African History Online, 2014). Since I grew up in East Africa, a significant part of my family culture practice a close family ties. Basically, the structure of my family is nuclear. It means that my ancestral house is composed of my father, my mother, and my siblings. Therefore, each weekend, my parents would convince my sister and I to spend a few hours at my grandparents’ house. Life indeed is a never ending journey. Even though I had to continue my higher studies in the United States, I had to travel back to my parents’ house to attend my sister’s wedding celebration. In Africa, marriage is considered as something sacred. In fact, matrimonial ceremony is considered as one of the most important family affairs. It is a common practice for African wedding preparation to last for months (Dyrness & Karkkainen, 2008: 520). When I had a one-on-one talk with my sister, she told me that the wedding preparation lasted for six (6) weeks. The entire wedding celebration went as smooth as planned. Our religious belief is Christian. Therefore, the wedding celebration has to take

Monday, August 26, 2019

World history and american history Assignment Example | Topics and Well Written Essays - 500 words

World history and american history - Assignment Example They emerged around 900 BCE. They had a long lasting culture in Peru, for about 100 years. They contributed artefact like the cast bronze artwork that spread around Peru. They used bronze for artwork and not for making weapons. The Chavan never lasted for a longer period as the Olmec (Rosenswig, Robert 167) The Operation was developed by the U.S government to transport the Vietnamese orphans out of the war-torn country. The first flight was to leave Saigon on 4th April 1974. During the last days of the war, the United States began boarding the Vietnamese children into the military transport. The aim was to let the children adopted by American, European, Canadian and Australian families. The first plane crashed and killed approximately 138 Vietnam children. Other children, transported by McDonald and other volunteers, succeeded to reach the destination safely (Wise, Phillip 223). The mechanics or logistics of the operation was by the airlifting of the children who were believed to be orphans. The process was through a seated cargo plane. Inside the plane, the children sat in small cardboard boxes lined with blankets (Wise, Phillip 251). The plane had caretakers with volunteers inside. Babylift operation was seen as the last desperate attempt to get sympathy for the war. As the war was towards its end, food became inadequate, and gasoline became very expensive as one moved towards the north. Therefore, the children’s lives were at risk. So they had to be taken to America so as to seek help. The outcome of the operation was successful to some level. The first plane that left Saigon crashed several minutes after its takeoff and killed 138 people, most of which included the children. Despite the crash, the operation managed to remove more than 3300 children out of Vietnam. It appeared that most of the children had families and were not orphans. The rumors were that most of the children’s parents got desperate to

Sunday, August 25, 2019

Microsoft, Tesco, Google.com Market Segments Essay - 13

Microsoft, Tesco, Google.com Market Segments - Essay Example According to the study market segments in terms of promotion ergo become imperative. Market segmentation basically refers to specialising and specifically focusing on one kinds of consumers. Segments can be based on a variety of factors some of which include gender, geography, industry, age groups; or they can be a little bit more specific e.g. democrats in the USA or soccer fans etc. As the paper outlines by concentrating on one particular part of the market the producers are not just able to market their product better, they can even improvise and enhance their goods in a way which makes them the most appealing for their customers. Geoffery Yeo further defines market segments as, â€Å"Market segmentation is a technique widely used in he market research industry. It can be defined as ‘the process of splitting customers into different groups, or segments; within which customers with similar characteristics have similar needs†. How does one segment the market for food? E veryone needs food, however, if that was the only thing that crossed a producers mind then he would end up with a burden of a segment which consists of not just people from the UK, but the whole world. Focusing on what kind of food one is selling is extremely important, in our case we will be focusing on fast-food. Segments for this market will be created based on a number of factors: they can either be demographic or psychographic. Demographic factors take into account the age, sex, gender, income etc of the consumers, where as the psychographic factors look into what attracts and appeals to consumers the most. For a fast-food organisation to function properly in the UK it would have to focus primarily on psychographic factors.  

Saturday, August 24, 2019

Molucca Term Paper Example | Topics and Well Written Essays - 1250 words

Molucca - Term Paper Example The great international interest on these islands brought about varied mixture of religions such as Protestants, Muslim, and Catholic. These religions brought their powerful local customs in the islands. Dutch exercised a huge influence over the islands until the Indonesia war of late 1940s. The Dutch enlisted Ambonese Christians to be solders in order to appease the Indonesian. In addition, the Dutch offered the Indonesians education. The Ambonese protected the Dutch against Java-based independence movement. After Indonesia gained independence in 1949, Ambonese strongly believed they would form and own their state. Therefore, they continued fighting for a Republic of South Moluccas before facing defeat in the year 1950. The defeat made thousands of Ambonese soldiers in the Dutch colonial army to flee to Netherlands (BBC 1). Location The location of these islands is highly tectonic Halmahera Plate within the Moluccas Sea Collision Zone in Indonesia. Moluccas islands lies east of Sula wesi (Celebes), west of New Guinea, and east and North of Timor. The islands cover about 74,505 square kilometers of land. Moluccas are located in the southeastern region of the Indonesian archipelago. This location is near equator and its north of Australia and West of West Papua. The provincial city for these islands is the Ambon. Ambon is a hub of communication, trade, and other crucial services (Laksito 1). Web. http://www.awesomestories.com/images/user/3e1994f4c5.gif. These islands experience many volcanic eruptions. The soils of these islands are fertile with humid climate, which is beneficial for cultivation of spices such as cloves and nutmeg. Moluccas islands consist of two provinces. These include North Maluku (Maluku Utara) and Maluku. The main islands of North Maluku comprise of Halmahera, Bacan, Morotai, and Obi. Many of the Moluccas islands are mountainous. However, Tanimbar and Aru islands lie in swampy and low areas. Earthquakes are very frequent in Moluccas islands (Laksito 3). Place Moluccas lies Southeast Asia at a coordinates of 3Â ° 9’S 129Â ° 23’E. Astronomical location of Moluccas encompasses 6Â °08’north and 11Â °15’ south latitude. Similarly, the island lies 94Â °45’ to 141Â °05’ east longitude. Moluccas have an area about 32,000 square miles. Most of these islands have thick forests with active volcanoes. Seram is among distinctive islands in the Moluccas with 16 of more than 200 bird species endemic. This island is important habitant of biggest birds such as the two-watted cassowary. The Halmahera rain forests have large number of endemic species. Some of species include Bisa rat, masked flying fox, wild goats, parrots, and three species of cuscus. Moluccas’s flora comprise of meranti trees and varieties of orchids. The average population is less than 1.7 million people. This represents a 19 people per square kilometer. However, the distribution of people in this island is uneven (Laksito 2). Movement The main mode of movement in Moluccas islands comprise of air and sea transport. These mode of transport link different regions of the island together. Sea transport has been the hub of sea transport since ancient times. This has enabled the islands to trade with overseas countries such as Middle East, China, and India. Sea transport in Moluccas islands is very crucial because it is not only beneficial to the region itself, but also it benefits neighboring countries such ad Australia. Australia uses Moluccas as a heart for sea transport. The bulk of transport in

Friday, August 23, 2019

Bus law Essay Example | Topics and Well Written Essays - 250 words

Bus law - Essay Example Frank can only have an enforceable security interest if three conditions are fulfilled: the written agreement includes the value of the car that has been given as collateral, Eddie has rights over the car or has the ability to have rights over that car and also Eddie must have authenticated the security agreement with a description of the car or Frank is in control of the car. If the above three conditions have been included in the agreement, then Frank can say that he has security interests and this is enforceable by law, if not, then he has no security interests and just have to depend on Eddie to pay back the loan as per their agreement. If Frank has an enforceable security interest under the Uniform Commercial Code (UCC) article 9, then he can be granted perfection of the security agreement. This means that he can file a notice in the public office. This notice is for other creditors to be notified of the security interest Frank has in that car. In order for this notice to be enforceable, Frank has to provide Eddie’s name, description of the car and his name or the name of his representatives (if he has security interests already). This notice (also called a financial statement) is valid for a period of five years from the time it is filed, but that period can be extended (Sepinuck

Thursday, August 22, 2019

The Effect of Incentive Plans in attaining the Organizational Essay

The Effect of Incentive Plans in attaining the Organizational Objectives - Essay Example Basically the organizational objectives are intended by group of people who belong to the organization. The incentive planning is one of the strategies of the organizations. The incentive is a sort of gainsharing, which is promoted with the intension of encouraging the employees so that they extend their cooperation and work. The incentive is nothing but sharing a certain amount of profit to the employees. This is expected to help reaching the organizational objectives. Let us consider a model incentive planning. The total amount decided to be shared as incentive per year is 1 million dollar. This should be paid as a compensation for the work done by the employee. This might include a group or team that has been considered under the bonus scheme. The over all percentage that has been left to be distributed among the selected group or team would cover some 10% from the total profit. Incentive should be divided according to the responsibilities carried by the employee. The employees who deserve the incentives are managers and middle managers, under whom they control a group of employees. For example managers of various departments such as accounts, marketing, production, maintenance etc. are required to reach the strategic level, in order to do that they manage the group of workers who work in their concerned department under them. Members of the organization keep these objectives in mind and work accordingly. An incentive planning help the objective keep going in its way uninterrupted by any kind of break in running the organization. The incentive could be defined in other words as proposing a deadline for the concerned employees, expecting them to reach specific or given milestones in the particular area or department.

IT Governance Essay Example for Free

IT Governance Essay A governance view that consists of the business governance of IT – ensuring that IT supports and enables the business strategy – and the functional governance of IT – ensuring that the IT function itself runs efficiently and effectively (http://www.takinggovernanceforward.org). Executive Summary Successful enterprises recognize the benefits of information technology and use it to drive their stakeholders’ value. These enterprises also understand and manage the associated risks, such as increasing regulatory compliance and critical dependence of many business processes on information technology (IT). The need for assurance about the value of IT, the management of IT-related risks and increased requirements for control over information are now understood as key elements of enterprise governance. Value, risk and control constitute the core of IT governance. Control Objectives for Information and related Technology (COBIT ®) provides good practices across a domain and process framework and presents activities in a manageable and logical structure. COBIT’s good practices represent the consensus of experts. They are strongly focused more on control, less on execution. These practices will help optimize IT-enabled investments, ensure service delivery and provide a measure against which to judge when things do go wrong. For IT to be successful in delivering against business requirements, management should put an internal control system or framework in place. The COBIT control framework contributes to these needs by: * Making a link to the business requirements * Organizing IT activities into a generally accepted process model * Identifying the major IT resources to be leveraged * Defining the management control objectives to be considered An answer to these requirements of determining and monitoring the appropriate IT control and performance level is COBIT’s definition of: * Benchmarking of IT process performance and capability, expressed as maturity models, derived from the Software Engineering Institute’s Capability Maturity Model (CMM) * Goals and metrics of the IT processes to define and measure their outcome and performance based on the principles of Robert Kaplan and David Norton’s balanced business scorecard * Activity goals for getting these processes under control, based on COBIT’s control objectives The assessment of process capability based on the COBIT maturity models is a key part of IT governance implementation. After identifying critical IT processes and controls, maturity modeling enables gaps in capability to be identified and demonstrated to management. Action plans can then be developed to bring these processes up to the desired capability target level. Thus, COBIT supports IT governance by providing a framework to ensure that: * IT is aligned with the business * IT enables the business and maximizes benefits * IT resources are used responsibly * IT risks are managed appropriately Figure 1 Adopted for this study Governance Focus Areas * Strategic alignment focuses on ensuring the linkage of business and IT plans; defining, maintaining and validating the IT value proposition; and aligning IT operations with enterprise operations. * Value delivery is about executing the value proposition throughout the delivery cycle, ensuring that IT delivers the promised benefits against the strategy, concentrating on optimizing costs and proving the intrinsic value of IT. * Resource management is about the optimal investment in, and the proper management of, critical IT resources: applications, information, infrastructure and people. Key issues relate to the optimization of knowledge and infrastructure. * Risk management requires risk awareness by senior corporate officers, a clear understanding of the enterprise’s appetite for risk, understanding of compliance requirements, transparency about the significant risks to the enterprise and embedding of risk management responsibilities into the organization. * Performance measurement tracks and monitors strategy implementation, project completion, resource usage, process performance and service delivery, using, for example, balanced scorecards that translate strategy into action to achieve goals measurable beyond conventional accounting. COBIT Framework A control framework for IT governance defines the reasons IT governance is needed, the stakeholders and what it needs to accomplish. Why? Increasingly, top management is realizing the significant impact that information can have on the success of the enterprise. Management expects heightened understanding of the way IT is operated and the likelihood of its being leveraged successfully for competitive advantage. In particular, top management needs to know if information is being managed by the enterprise so that it is: * Likely to achieve its objectives * Resilient enough to learn and adapt * Judiciously managing the risks it faces * Appropriately recognizing opportunities and acting upon them Successful enterprises understand the risks and exploit the benefits of IT and find ways to deal with: * Aligning IT strategy with the business strategy * Assuring investors and shareholders that a ‘standard of due care’ around mitigating IT risks is being met by the organization * Cascading IT strategy and goals down into the enterprise * Obtaining value from IT investments * Providing organizational structures that facilitate the implementation of strategy and goals * Creating constructive relationships and effective communication between the business and IT, and with external partners * Measuring IT’s performance Enterprises cannot deliver effectively against these business and governance requirements without adopting and implementing a governance and control framework for IT to: * Make a link to the business requirements * Make performance against these requirements transparent * Organize its activities into a generally accepted process model * Identify the major resources to be leveraged * Define the management control objectives to be considered Furthermore, governance and control frameworks are becoming a part of IT management good practice and are an enabler for establishing IT governance and complying with continually increasing regulatory requirements. IT good practices have become significant due to a number of factors: * Business managers and boards demanding a better return from IT investments, i.e., that IT delivers what the business needs to enhance stakeholder value * Concern over the generally increasing level of IT expenditure * The need to meet regulatory requirements for IT controls in areas such as privacy and financial reporting (e.g., the US Sarbanes-Oxley Act, Basel II) and in specific sectors such as finance, pharmaceutical and healthcare * The selection of service providers and the management of service outsourcing and acquisition * Increasingly complex IT-related risks, such as network security * IT governance initiatives that include adoption of control frameworks and good practices to help monitor and improve critical IT activities to increase business value and reduce business risk * The need to optimize costs by following, where possible, standardized, rather than specially developed, approaches * The growing maturity and consequent acceptance of well-regarded frameworks, such as COBIT, IT Infrastructure Library (ITIL), ISO 27000 series on information security-related standards, ISO 9001:2000 Quality Management Systems—Requirements, Capability Maturity Model ® Integration (CMMI), Projects in Controlled Environments 2 (PRINCE2) and A Guide to the Project Management Body of Knowledge (PMBOK) * The need for enterprises to assess how they are performing against generally accepted standards and their peers (benchmarking) Who? A governance and control framework needs to serve a variety of internal and external stakeholders, each of whom has specific needs: * Stakeholders within the enterprise who have an interest in generating value from IT investments: * Those who make investment decisions * Those who decide about requirements * Those who use IT services * Internal and external stakeholders who provide IT services: * Those who manage the IT organization and processes * Those who develop capabilities * Those who operate the services * Internal and external stakeholders who have a control/risk responsibility: * Those with security, privacy and/or risk responsibilities * Those performing compliance functions * Those requiring or providing assurance services What? To meet the requirements listed in the previous section, a framework for IT governance and control should: * Provide a business focus to enable alignment between business and IT objectives * Establish a process orientation to define the scope and extent of coverage, with a defined structure enabling easy navigation of content * Be generally acceptable by being consistent with accepted IT good practices and standards and independent of specific technologies * Supply a common language with a set of terms and definitions that are generally understandable by all stakeholders * Help meet regulatory requirements by being consistent with generally accepted corporate governance standards (e.g., COSO) and IT controls expected by regulators and external auditors IT Resources The IT organization delivers against these goals by a clearly defined set of processes that use people skills and technology infrastructure to run automated business applications while leveraging business information. The IT resources identified in COBIT can be defined as follows: * Applications are the automated user systems and manual procedures that process the information. * Information is the data, in all their forms, input, processed and output by the information systems in whatever form is used by the business. * Infrastructure is the technology and facilities (i.e., hardware, operating systems, database management systems, networking, multimedia, and the environment that houses and supports them) that enable the processing of the applications. * People are the personnel required to plan, organize, acquire, implement, deliver, support, monitor and evaluate the information systems and services. They may be internal, outsourced or contracted as required. Processes To govern IT effectively, it is important to appreciate the activities and risks within IT that need to be managed. They are usually ordered into the responsibility domains of plan, build, run and monitor. The four interrelated domains of COBIT are: * Plan and Organize (PO)—Provides direction to solution delivery (AI) and service delivery (DS) * Acquire and Implement (AI)—Provides the solutions and passes them to be turned into services * Deliver and Support (DS)—Receives the solutions and makes them usable for end users * Monitor and Evaluate (ME)—Monitors all processes to ensure that the direction provided is followed Plan and organize (PO) This domain covers strategy and tactics, and concerns the identification of the way IT can best contribute to the achievement of the business objectives. The realization of the strategic vision needs to be planned, communicated and managed for different perspectives. A proper organization as well as technological infrastructure should be put in place. This domain typically addresses the following management questions: * Are IT and the business strategy aligned? * Is the enterprise achieving optimum use of its resources? * Does everyone in the organization understand the IT objectives? * Are IT risks understood and being managed? * Is the quality of IT systems appropriate for business needs? Acquire and implement (AI) To realize the IT strategy, IT solutions need to be identified, developed or acquired, as well as implemented and integrated into the business process. In addition, changes in and maintenance of existing systems are covered by this domain to make sure the solutions continue to meet business objectives. This domain typically addresses the following management questions: * Are new projects likely to deliver solutions that meet business needs? * Are new projects likely to be delivered on time and within budget? * Will the new systems work properly when implemented? * Will changes be made without upsetting current business operations? Deliver and support (DS) This domain is concerned with the actual delivery of required services, which includes service delivery, management of security and continuity, service support for users, and management of data and operational facilities. It typically addresses the following management questions: * Are IT services being delivered in line with business priorities? * Is IT costs optimized? * Is the workforce able to use the IT systems productively and safely? * Are adequate confidentiality, integrity and availability in place for information security? Monitor and evaluate (ME) All IT processes need to be regularly assessed over time for their quality and compliance with control requirements. This domain addresses performance management, monitoring of internal control, regulatory compliance and governance. It typically addresses the following management questions: * Is IT’s performance measured to detect problems before it is too late? * Does management ensure that internal controls are effective and efficient? * Can IT performance be linked back to business goals? * Are adequate confidentiality, integrity and availability controls in place for information security? Processes need Controls Control is defined as the policies, procedures, practices and organizational structures designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and corrected. IT control objectives provide a complete set of high-level requirements to be considered by management for effective control of each IT process. They: * Are statements of managerial actions to increase value or reduce risk * Consist of policies, procedures, practices and organizational structures * Are designed to provide reasonable assurance that business objectives will be achieved and undesired events will be prevented or detected and corrected Enterprise management needs to make choices relative to these control objectives by: * Selecting those that are applicable * Deciding upon those that will be implemented * Choosing how to implement them (frequency, span, automation, etc.) * Accepting the risk of not implementing those that may apply The control objectives are identified by a two-character domain reference (PO, AI, DS and ME) plus a process number and a control objective number. In addition to the control objectives, each COBIT process has generic control requirements that are identified by PCn, for process control number. They should be considered together with the process control objectives to have a complete view of control requirements. PC1 Process Goals and Objectives Define and communicate specific, measurable, actionable, realistic, results-oriented and timely process goals and objectives for the effective execution of each IT process. Ensure that they are linked to the business goals and supported by suitable metrics. PC2 Process Ownership Assign an owner for each IT process, and clearly define the roles and responsibilities of the process owner. Include, for example, responsibility for process design, interaction with other processes, accountability for the end results, measurement of process performance and the identification of improvement opportunities. PC3 Process Repeatability Design and establish each key IT process such that it is repeatable and consistently produces the expected results. Provide for a logical but flexible and saleable sequence of activities that will lead to the desired results and is agile enough to deal with exceptions and emergencies. Use consistent processes, where possible, and tailor only when unavoidable. PC4 Roles and Responsibilities Define the key activities and end deliverables of the process. Assign and communicate unambiguous roles and responsibilities for effective and efficient execution of the key activities and their documentation as well as accountability for the process end deliverables. PC5 Policy, Plans and Procedures Define and communicate how all policies, plans and procedures that drive an IT process are documented, reviewed, maintained, approved, stored, communicated and used for training. Assign responsibilities for each of these activities and, at appropriate times, review whether they are executed correctly. Ensure that the policies, plans and procedures are accessible, correct, understood and up to date. PC6 Process Performance Improvement Identify a set of metrics that provides insight into the outcomes and performance of the process. Establish targets that reflect on the process goals and performance indicators that enable the achievement of process goals. Define how the data are to be obtained. Compare actual measurements to targets and take action upon deviations, where necessary. Align metrics, targets and methods with IT’s overall performance monitoring approach. Effective controls reduce risk, increase the likelihood of value delivery and improve efficiency because there will be fewer errors and a more consistent management approach. In addition, COBIT provides examples for each process that are illustrative, but not prescriptive or exhaustive, of: * Generic inputs and outputs * Activities and guidance on roles and responsibilities in a Responsible, Accountable, Consulted and Informed (RACI) chart * Key activity goals (the most important things to do) * Metrics Business and it controls The enterprise’s system of internal controls impacts IT at three levels: * At the executive management level, business objectives are set, policies are established and decisions are made on how to deploy and manage the resources of the enterprise to execute the enterprise strategy. The overall approach to governance and control is established by the board and communicated throughout the enterprise. The IT control environment is directed by this top-level set of objectives and policies. * At the business process level, controls are applied to specific business activities. Most business processes are automated and integrated with IT application systems, resulting in many of the controls at this level being automated as well. These controls are known as application controls. However, some controls within the business process remain as manual procedures, such as authorization for transactions, separation of duties and manual reconciliations. Therefore, controls at the business process level are a combination of manual controls operated by the business and automated business and application controls. Both are the responsibility of the business to define and manage, although the application controls require the IT function to support their design and development. * To support the business processes, IT provides IT services, usually in a shared service to many business processes, as many of the development and operational IT processes are provided to the whole enterprise, and much of the IT infrastructure is provided as a common service (e.g., networks, databases, operating systems and storage). The controls applied to all IT service activities are known as IT general controls. The reliable operation of these general controls is necessary for reliance to be placed on application controls. For example, poor change management could jeopardize (accidentally or deliberately) the reliability of automated integrity checks. Summary Establishing an effective governance framework includes defining organizational structures, processes, leadership, roles, and responsibilities to ensure that enterprise IT investments are aligned and delivered in accordance with enterprise strategies and objectives. Control over the process of providing IT governance that satisfies the business requirements for IT of integrating IT governance with corporate governance objectives and complying with laws, regulations and contracts. By focusing on preparing board reports on IT strategy, performance and risks, and responding to governance requirements in line with board directions. Achieved by * Establishing IT governance framework integrated into corporate governance * Obtaining independent assurance over the IT governance status. Measured by * Frequency of board reporting on IT to stakeholders (including maturity) * Frequency of reporting from IT to the board (including maturity) * Frequency of independent reviews of IT compliance References * Cobit 4.1 http://www.itgi.org * IT Governance Harvard University March 31, 2008 * Governance Objective and Governance views of IT (Mapping) http://www.takinggovernanceforward.org

Wednesday, August 21, 2019

Online Examination Management System

Online Examination Management System Online Examination Management System CHAPTER- 1: Introduction 1.1 Topic of the system Now a day, the use of information technology in educational institutes and private organization is very common. In educational institutes you will find presentation software, course websites, Intranet facility and online homework assignments and the automation of organization have been found very commonly with the rapid development in information technology. Now a day, in organization due to automation all the works is done by computers. It makes work easier, faster reliable as compare to the previous way of working. Information technology is growing day by day still we fail to provide proper IT assistance to education industry. At the time of Exam, Still we follow the same old method of collecting questions from different teachers , then arranging them in proper order and then setting up a questionnaire and even at the places where we are following online or automated examination system we are not able to prevent the drawback of same or repeated question paper. The system which developer is going to propose is an â€Å"Online Examination Management System†. This system is used to solve many problems faced by education organization or any other organization (who are conducting an exam for any purpose). This system is used to conduct objective based/multiple choice based online exam; it will also generate the question paper for an online exam and written exam (which is a common method of conducting an exam). It will generate random question in online exam for each candidate, it will also assess online exam generate a result for the candidate at the same time after completing an exam. This system will generate all the required report to keep the record in files. 1.2 Purpose of the Situation As the Information technology is growing day by day still we fail to provide proper IT assistance to education industry. Still we follow the same old method of collecting questions from different teachers, then arranging them in proper order and then setting up a questionnaire and even at the places where we are following online or automated examination system we are not able to prevent the drawback of same or repeated question paper. With the help of proposed system user can solve all the problems and make work easier, faster, and reliable. 1.3 Target Reader The main target readers of the proposed system are stake holder of educational or other institute/organization, who conducts exams for admission purpose, exam preparations or jobs. Candidates those are willing to appear in exams for any purpose like admission, preparation etc. 1.4 Topic Background Online Examination Management System is a system which is used by any educational institute or any organization who are conducting exam for job or any other purpose. This system will help them to conduct an online exam. This system is used to conduct an aptitude paper for admission or job purpose and it will also help to generate a question paper for educational institute. The most important feature of proposed system is that this system is not only a web based application it is a combination of web-based and stand alone application. So that user can take the benefit of proposed system in any situation. User never depends on the net connectivity for his work user can do his work with the help of standalone module. Proposed system will help to keep the record of students/candidates who are willing to give exams. It will also store the records of members of the institute/organization. It will store all the data related to examination like Question, Exams Detail, and Exam Schedule etc. Proposed system will also help to conduct an online exam so that user can take exam at any time and candidate can also participate in exam from any part of this world. Online exam consist mainly two type of question multiple choice and multiple response. At the time of online exam random question will generate for exam so that no one candidate will get the same question at the same time if questions are available in database. Proposed system will also help to assess paper at the same time after the completion of exam. This will also help to generate a question for free format question which is very commonly used in any educational institute. This can only assess by the examination authorities. Another important thing in proposed system is that it can save data at real time if any problem will take place it store all the data at the same time, so that there is no lose of data. 1.5 Problem Context and Rational Tangible benefit The use of â€Å"Online Examination Management System† will also help in institute organization to achieve many objectives. They are†¦. 1. Frequently you can assess student learning: With the help of online exam you can take exam any time to check the learning of the candidate. 2. Elimination of grading requirement and cost:- All the things will done with the help of computer like taking an exam of the candidate, generating a question paper for online exam written paper, assessment of online exam paper generating the result of candidate. So that there is a less requirement of manpower time. So that it will reduce the cost requirement to take an exam. 3. Immediate feedback of student performance: With the help of this system you can give feedback to the student at the same time because paper of online exam will assess at the same time by the system. So that there is no need to wait the candidate for there result. 4. Elimination of paper copying cost: Online exam will help to eliminate the requirement of paper work. With the help of this system all the work will done with the help of computers so that, it will reduce usage of paper. Certain statistic quote that 18% of corporate printed material becomes outdated after 30 days. Imagine that what happened after a year what. Now, imagine if that material were always online or on your system. So that there is no requirement of buying the paper for paper work it will also reduce storage problem for storing bundles of paper. 5. It will help to save time: This system will help to save the time of the people who are involved in exam. Already question where stored in database of the system. No need to set the paper many days before the exam you can generate the paper at the same time of exam. There is no need to check the paper. All the paper will be checked with the help of system. There is no need to wait for result candidate can see result after completing the exam. Intangible benefit 1. Access is possible from any where: You can give an exam from any centre in the world there is no restriction of borders to give an exam. 2. It gives more security as compare to present system: -If you come to know that exam paper is hacked so that you can change the paper at the same time. But we are generating random question so there is no use of hacking the paper. 3. It will make work consistence: With the help of this software you can assure that your exam paper or result will not be modified by any person without your permission. There is no chance of paper leak. If you come know that exam paper is hacked then you can change the paper at the same time. Then there is no partiality in checking of paper the entire candidate will get marks according to their caliber. This will help to generate a randomly question in question paper. So that each candidate will get different paper in the same exam, so there is no chance of cheating. 1.6 Objective of the System In the proposed system â€Å"ONLINE EXAMINATION MANAGEMENT SYSTEM†, people will find solutions for all their queries and loopholes in the existing exam assessment methodology. The system which developer is going to develop will help in institutes organizations to take an exam, for admission in colleges for placement in companies. This system will work on both side client side as well as server side. It means its a combination of web application stand alone application. So that with the help of this system people can take online exam with the help of web technology with the help of standalone application you can save questions any time there is no need of internet connection. This system will help to take an online exam so that candidate can access the exam from any one of the exam centre in the world. This system will help them to store the question in database of the system for exam. This system will help to generate the question paper from the database with the different level of difficulties grades. Now if you want to take a written paper of the candidates then this system will generate the question paper for return paper also. The questions for written exam are randomly generated so that there is very less chance to repeat the question in the question paper. It will happen only if there is less amount of question in database. This system will help them to assess the exam paper of the online exam. This system will automatically generate the result of the exam. You can export a question paper in â€Å".doc† format for written paper. 1.7 Functionality of the System Modules of the system Candidate/Student Information: This module will help to keep the record of the entire candidate of exam.Teacher Information: This module is used to keep the record of the entire faculties in institute.Generate Question Bank: This module will help to insert the question in the database.Generate Question Paper: This module will help to generate the question paper which includes all types wattage of question for the candidate. It will export the paper in â€Å".doc† format for written exam.Online Examination: This module is used to take an online exam.Reports: This module will help to generate all the reports. 1.8 Deliverables of the system v Creating data bank 1. Question can be categorized according to topic, types etc. 2. Exam can be created random basis per student. 3. System can automatically add the marks allocated in each question to determine the total mark for the exam. v Control Mechanism in the Exam 1. Time limit can be set for the exam. 2. The sequence of question can be randomized. 3. Student can navigate within a exam (i.e. backward forward) can be set navigation tool/button can be selected for a exam these button can be switched. 4. Student can be allowed to exit the exam before completing the entire question. 5. A specific date for a exam to be active can be set. v Question Types Multiple Choices: This allows the user to select one correct answer.Multiple Responses: This allows the users to select more than one answer.Free Format: This type of question will used to take a written exam of the student which is very often used by educational institute to conduct an exam. v Other Essential Requirements Negative marking should be possible in all the question types.Remaining time can be displayed.Free format question can be saved in Data Bank.A paper for written exam can be generated with the help system Data Bank.Answer can be saved at real time. v Security Only registered student are able to access the exam.Exam can be made available on special dates. v Reporting The following results on the exam performance can be obtained. Student number, name mark in word format.Average time used by the studentTime taken for each individual student to complete the test. CHAPTER- 2: PROBLEM DESCRIPTION Introduction to problem area Isnt it an irony that the agent which is solely responsible for the development of these technologies, itself has not been served fully? Examination is one such component of educational system which has always held a very high importance. Since time immemorial examinations are held to separate the best out of rest. The formal examination system is a very long procedure to conduct an examination. From the respect of the recruiter, they should give extra effort on the examination to select employees for the organization. This is a huge responsibility and extra load to the recruiter to conduct an examination. This is very costly and extremely tedious to conduct an examination. Side by side online examination is a very sophisticated examination conducting system. Nowadays, almost all of the organizations or companies are using computerized system to manage their organizations data. At the same time most of the universities or campuses are using computerized system for storing and managin g their education data excluded the examination data (exam question, exam answer and so on). Therefore, lecturers have to create new exam papers manually, it will bring a lot of troublesome while they want to retrieve back previous exam question or answer for references purpose. In this process, still a lot of messy work is involved such as manually clicking or searching the old set of questions. Even they have a common hardcopy or softcopy without systemisation. Furthermore, the admin is always busy in arranging the exam papers and headache of managing a flexible exam time schedule. Also without the computerized system, the examinee cheating issue and the security issue (sneaked out the exam paper before the exam) cannot be controlled well.Internet connectivity often gets lost which is another problem being faced by the examinees. Nature of challenge The main challenge in developing this system will be to understand the concepts and fundamentals behind managing examinations online. As I am not one of the administrative staff it will be quite an uphill task to get to the basic functionalities of this system. The main challenge that would be required for building this system is that it will generate the random question paper to each student so as to avoid cheating. It would evaluate the answers very instantly. It would have a time limitation for each and every section of the questions and would be ideal for the competitive exams like GRE, CAT etc. The notification of results would be sent to the candidate by email or text message. The generation of admit card is another challenge which would require a lot of effort as a huge crowd would be attempting the exam. We can also save the current exam and would rather provide facilities to both the examiner and students. Another serious challenge is to handle the power failure. It is requi red to for me to learn how to generate the questions papers and the admit cards randomly. I also need to learn how to handle the power failure and the advanced features of ASP.NET which includes the report generation, session management and all the security features that needs to be incorporated in the system so as the system may be hack proof. I need to learn how to generate different sets of questions from a set of questions. Maintaining the database is another challenge which needs a lot of efforts. CHAPTER- 3: PROJECT PLANNING Development Plan The Development Plan is the essential part as it provides the action plan for developing the â€Å"Online Examination Management System†. The development plan will show what will be done and in what time. Since the methodology selected is RUP methodology, the development plan is developed by concerning the stages of RUP methodology. Project Duration: 30 weeks 1. Inception phase (Estimated Time =41 Days) 1.1 Iteration 1: [Task: Pre-proposal and planning] (Duration: 25 Days) 1.1.1 Project Identification 1.1.2 PPF discussion with supervisor 1.1.3 Preparation of PPF 1.1.4 Online submission of PPF 1.1.5 Finalization of project title 1.2 Iteration 2: [Task: Development Plan] (Duration: 17 Days) 2.1.1 Specification research of the project 2.1.2 Identification of project module 2.1.3 Limitation of project scope 2.1.4 Identification of resources 2.1.5 Identification of required techniques to be learned 2.1.6 Methodology used 2.1.7 Preparation of development plan 2.1.8 Preparation of test plan 2.1.9 Submission of PSF 2.1.10 Gantt chart 2. Elaboration Phase (Estimated Time= 67 Days) 2.1 Iteration 1: [Tasks: System Investigation and Research] (Duration :14 Days) 2.1.1 Collect user requirements 2.1.1.1 Primary research 2.1.2.1.1 Questionnaire 2.1.2.1.2 Interviews 2.1.2.1.3 Observation 2.1.2 Research on the functional areas of the system 2.1.3 Identification of modules 2.2 Iteration 2: [Tasks: System Analysis] (Duration: 41 Days) 2.2.1 Analysis of user requirements 2.2.2 UML diagrams 2.2.3 Screen design 2.2.4 Database design 2.2.5 Evaluation of the screen and database design 2.3 Iteration 3: [Tasks: Technical language learning and research] (Duration: 12 Days) 2.3.1 Secondary research 2.3.2 Finalization of language 2.3.3 Finalization of development methodology 2.3.4 Learn technical skills 3. Construction Phase (Estimated Time= 58 Days) 3.1 Iteration 1: [Tasks: Interface Design and Database Design] (Duration: 26 Days) 3.1.1 Database Design 3.1.2 Prototype design 3.1.3 Documentation of the system 3.2 Iteration 2: [Tasks: System Modules] (Duration: 32 Days) 3.2.1 Analysis of the system 3.2.2 Identification of modules 3.2.3 Implementation of modules 3.2.4 Documentation of modules 4. Transition Phase (Estimated Time= 45 Days) 4.1 Iteration 1: [Tasks: Testing] (Duration: 27 Days) 4.1.1 Integration of all the modules 4.1.2 Preparation of test plan 4.1.3 Finding the target users 4.1.4 Testing and debugging the entire system 4.2 Iteration 2: [Tasks: Documentation] (Duration: 15 Days) 4.2.1 Completion of system documentation 4.3 Iteration 3: [Tasks: Luck Iteration] (Duration: 3 Days) 4.3.1 Finishing tips CHAPTER- 3: LITERATURE REVIEW 3.1 Domain Research 3.1.1 Online Examination As a change in model world all the things are going to be automated know a day all work done with the help of computer. Which makes our work more easy, fast (time consuming) reliable. Same in education field also examination is also will taken with the help of computer it means the process of online examination will help the education institute to take an exam online which can help them to take an exam from anywhere in this world. Online examination is completely objective based exams which assume simple answers that can be formally checked and easily evaluated online. The typical type of questions are 1) one word answer, 2) multiple choice, 3) free format Question in this type of question system need to grade manually by the instructor. System Architecture Online Examination system has four major components. 1) Examination Preparation, 2) Examination System, 3) Examination Monitoring, 4) The Auto Grading System. Examination Preparation This component is used to manage the data bank of the question answer of the question, Assign the test Id, Schedule the test. Data base is opened to the teacher to add the question for the exam. Examination System This component is used to control all the functionality of the system. Like client side Control, Time Control, Security of the system. This component is very important because it used to keep the control on the security time. Examination Monitoring This component is used for real time monitoring which can help to keep the track of exam processing, test ID statistic and collect all the answers. The Auto Grading System This Component is used to grade the exam automatically with the help of this system. All the answer of the exam is graded with the help of this system automatically. Component of Online Examination It is a multi-layer system composite of Web Server, Database Server and Middleware Server, Such as Internet browser. In this developer using Microsoft .Net Frame Work 2.0 and Internet Information Server (IIS) 6.0 as the Web Server, The Database Server is My SQL. Multi Layer System Middleware Server and the client Module which is designed according to the Microsoft DCOM (Distributed Component Object Model Standard) standard is the kernel of the Examination System. DCOM is the binary objects extension jointing LAN, WAN and Internet, which can instance and bind objects over different network. It is an advanced network protocol used to co-operate with COM based components of two processes in different locations. Server-side component is middle ware of the system which provides communication interface between clients and the web server or database server. Client is a client-side component which is called by the browser to control the client computer and submit or receive information from the server. This technology guarantees the flexibility and the potential for extension of the test system. In addition, it allows access to local files, whereas in conventional systems, the IE security prevents such access. Communication of Client and Server (http://fie.engrng.pitt.edu/fie2003/papers/1300.pdf Retrieved on Aug, 16, 2007) 3.1.2 Exam Assessment Exam Assessment is also known as Auto-Grading System. This will help to assess an exam paper of the exam. It helps teacher to assess the paper which are collected from examination system. There are two type of grading: 1) Objective Question 2) Operational Question. Objective question such as Choice question, True/False etc can be graded efficiently by accurate matching or fuzzy matching. But to grade an Operational question is not an easy task with the help of a simple matching algorithm. To check operational question there are two possible solutions. First way to grade an operational question is reading the answer file directly and comparing it to key file. But it is not practical because of Microsoft office file is very complicated to read the question file and another way to grade the operational question is with the help of office OLE object. This is method is convenient and efficient but it have big disadvantage practically not possible. The source code of the system is closely related to concrete question so it will create problems at the time of question are changed which result large amount of work. (http://fie.engrng.pitt.edu/fie2003/papers/1300.pdf Retrieved on Aug, 16, 2007) and (http://www.iacis.org/iis/2005_IIS/PDFs/Davidrajuh_Tharmalingam.pdf Retrieved on Aug, 7, 2007) So developer decided that the grading of operational questions is not possible because to grade an operational question we have to create complete dictionary which contain thousands of words. 3.1.3 Distributed Computing- As the technology changed many things become easier which make our work more efficient and easy. Distributed computing is also very helpful to do all this work. As we all know the power of computer. What he can do for us to make our work efficient. Know assume all the work is done with the help of single computer; it is also know as regular computing or Grid Computing. But it will work but only if we are doing simple things, if we want to do many complicated work with the help of single computer it makes our work very slow. This is not a good approach to do our work so the better way to do our work. So in this situation distributed computing is very helpful it will do work with help of many computers. It divides its workload very smartly with the help of many computers which are available on network. With the help of distributed computing we can do our work very efficiently and quickly. Regular vs Distributed Computing (http://library.thinkquest.org/C007645/english/0-definition.htm , Retrieved on Aug 19, 2007) The main advantages of distributed computing over traditional supercomputer is its economy, Distributed computing can take full advantage of a computers capabilities by keeping it busy with numbers to calculate. If enough users sign up, these linked computers — often referred to as virtual parallel machines — can improve the fastest supercomputer by as much as four times for a fraction of the supercomputers cost. (http://library.thinkquest.org/C007645/english/images/103-advantages.jpg, Retrieved on Aug, 19, 2007) 3.1.4 Client/Server Architecture 3.1.4.1 2-Tier Architecture 3.1.4.2 3-Tier Architecture 3 tier architecture After the research of Client/Server Architecture developer decided that 3-tier Architecture is the best way to develop the proposed system because proposed system is used by many number of user and it is an examination system, so that it require lots of security from the hacking of question paper which is only possible with the help of 3-tier architecture because all the data will stored on the main server of the system, and user can only interact with the Presentation layer of the system with the help of business logic. As the study of Client/Server Architecture developer come to know that C# and .Net Framework is the best development tool to develop an application in 3-tier architecture. So that developer decided to develop a proposed system in C# and .Net Framework. 3.2 Study of Existing System There are many other examination system are available in market for the users. They are:- 3.2.1 Online Examination System (OnEx) This examination system is developed by Knowgence Technologies Pvt. Ltd. This system also provided many features like. Administrator will assign exam to users.Ease of creation and modifying exam at any time.Online monitoring of exams showing percentage completed.Student can move from any question to question.Automatic checking against predefined answer (if there is no Subjective question).Automatic disabling of exam when it is completed.Last 10 min alert. And many more. (http://www.knowgence.com/Download/OnExBrochure.pdf, Retrieved on October 18, 2009) 3.2.2 CUE Assessment System This Assessment System is developed by CALM, Department of Mathematics,Heriot-Watt University, this existing system is also used to assessed online examination. The features which are provided in this system are 1. Easy to create and modify the questions. 2. Checking of question and delivering exam. 3. Assessment for online exam accepts free format questions. Varity of questions like multiple choices, multiple responses etc. And many more. (http://www.calm.hw.ac.uk/cue.html, Retrieved on October 18, 2009) Why developer system is better than Existing system? After the study of existing system developer come to know that many features are not available. But proposed system will take care of all the features. 1) No one system is a combination of standalone and web. So that it system is only used when internet is available. 2) No one system has the entire feature like online exam, exam assessment and paper generator. 3) Generating a question in an exam with random order so that no one student/candidate will get same question in an exam if question are available in a database. 4) Data will be saved at real time if any problem will occur so that data will store at the same time. It will help to reduce the chance of data lose. 5) Generating a paper for written exam which is very helpful for education institute like school and colleges that are very often used. As the above features are not available in one complete system so that developer decided to provide this entire feature in proposed system. CHAPTER-4: SECONDARY RESEARCH 4.1 Academic Research 4.1.1 Process Models Process model defines a distinct set of activities, actions, tasks, milestones, and work products that are required to engineer for developing the software. These process models are not perfect, but they do provide a useful road map for software engineering work. Software engineer and there managers adapt a process model and then they follow it. In addition the people who have requested the software have a role to play as the process model is followed. Process model is important in the project as it provides the stability, control, and organization to an activity. There are many Process Models like waterfall model, spiral model, etc. A project can be made under any model. 4.1.1.1 Waterfall Model The waterfall model is also called as the â€Å"classic life cycle†. It suggests a systematic, sequential approach to software development that begins with customer specification of requirements and progresses through planning, modeling, construction, and deployment. It produces deliverables at each phase like software requirement specification, design documents, actual code and test cases, final product etc. The waterfall model is the oldest paradigm for software engineering. (http://www.digitella.co.uk/brochures/Digitella%20SDLC.pdf , Retrieved on August 9, 2007) Some of the advantages are-: * The single requirements phase encourages specification of what the system is to do before deciding how the system will do. (i.e. specification before design). * The single design phase encourages planning of the system structure before building the components (i.e. design before coding). * The use of the reviews at the end of each phase permits acquirer and user involvement. * Each preceding step serves as an approved, documented baseline for the succeeding step. Some of the disadvantages of waterfall model are-: * Baselines and milestones place heavily emphasis on documentation in the early phases of the project. * Customers must be able to express their requirements completely, correctly, and with clarity. * Delays can occur in designing, coding, and testing. * It is difficult to access the true state of progress during the first two to three stages. * The developer must understand the application from the beginning. * No demonstration of system capabilities can occur until the end of the project. 4.1.1.2 Spiral Model The spiral model is another iterative model that has been proposed. As the name suggests, the activities in this model can be organized like a spiral that has many cycles. A spiral model is divided into a number of framework activities, also called task regions. Typically there are six task regions. 1. The customer communication task to establish effective communication between developer and customer. 2. The planning task to define resources, time lines and other project related information. 3. The risk analysis task to assess both technical and management risks. 4. The en

Tuesday, August 20, 2019

Urinary tract infections

Urinary tract infections ABSTRACT Urinary tract infections (UTI) are one of the most prevalent bacterial infections found in humans. 20. Uropathogenic Escherichia coli (UPEC) account for over 90% of uncomplicated UTI subsequently making it the most common etiological agent answerable for uncomplicated UTI.WW Pathogenic E.coli such as UPEC typically express virulence factors molecules directly concerned with pathogenesis but accessory/ancillary to normal metabolic function. Accordingly this confers an advantage on the pathogens by enabling them to exploit their hosts in ways inaccessible to commensal strains. 10. The UPEC genome accommodates an array of virulence and fitness factors specifically enabling it to colonise, survive and infect the mammalian urinary tract. WW +8. They utilise a number of fimbriae such as Type-1, P-,S- and F1C-fimbriae as adhesins to the mucosal epithelium as well as toxins, iron acquisition systems and factors involved in evading the host immune system such as capsular polysaccharide. INTRODUCTION Urinary tract infections can be broadly split into two types complicated and uncomplicated. The former referring to a UTI of an anatomically unobstructed urinary tract, where the individual maintains a normal immune status whereas the latter involves the possession of an abnormal urinary tract and immuno-compromisation. 22. An assortment of mechanical factors predispose an individual to contracting a complicated UTI, i.e. anything that causes disruption to i) normal urine flow, ii) complete emptying of bladder or iii) facilitates organisms access to the bladder. Hooton. Particularly prone are people who have lost neurologic control of their bladder and sufferers of vesico-urethral reflux (a condition where urine moves back up the ureters from the bladder).11 In general women are fourteen times more likely than their male counterparts to suffer from a UTI.. the female urethra is not only very short at only 5cm long hence easier to traverse but also is positioned at a hazardous proxim ity to the anus, in comparison the male urethra is surrounded by a drier environment and is much longer. In females the causative organism can be propelled into periurethral tissues during sexual intercourse consequently assisting the progression of bacteria up the urethra. Pregnancy is another contributing factor due to the resulting lethargic action of the bladder muscle wall. The pathogenesis of UTI begins when the uropathogens position themselves at a location outside the urinary tract and thus form a reservoir for infection 20. These organisms colonize form the perineal region or the feces and ascend to the bladder via the urinary tract WW+8. The ‘ascending route is how UPEC is considered to enter, whereby the bacteria ascend up the urethra into the bladder causing cystitis. However if left untreated the UPEC sometimes travel up even further to the kidneys via the urethers thus causing pyelonephritis. 12 + ww. The ‘hematogenous route involves seeding of the kidney during bacteremia and is a lot less common; gram positive bacteria such as Staphylococcus aureus are the main causative agents. 12 Cystitis and pyelonephritis are the two fundamental types of infection involved in UTI. Cystitis is a lower urinary tract infection whereby the bladder becomes inflamed through infection with UPEC. Symptoms include frequency, urgency, dysuria (painful v oiding), cloudy or foul smelling urine (due to pyuria) and suprapubic pain. Mims Pyelonephritis (from the Greek pyelum pelvis, nephros- of the kidney) is a more serious infection however as it is an upper urinary tract infection affecting the kidneys. This presents symptoms such as dysuria, fever, rigors, malaise, loin pain and tenderness. Wikipedia. Uropathogenic E.coli are the predominant cause of UTI with over 40% of women and 12% of men likely to experience at least one UTI in their lifetime. This coupled with the fact that in the U.S.A alone the estimated cost to society is over three billion dollars means it is essential we learn as much about the pathogenesis of UPEC as possible. WW. The word pathogenesis comes from the Latin â€Å"pathos† meaning disease and â€Å"genesis† meaning creation. It can be described as the mechanism by which an etiological factor causes a disease. UPEC yields numerous virulence factors that aid in the colonisation of the urinary tract and also induce fitness on the pathogen. Adherence can be described as the first step in the pathogenesis of UPEC in UTI as adhesion is necessary to allow colonisation, then to penetrate. After colonisation it allows penetration but also confers other advantages such as a) secreted exotoxin is in close contact with target cells b) increased protection from host defences and most importantly in the initial stages c) resistance to the hydrodynamic force of urine flow.12 UPEC utilize a number of surface expressed appendages called adhesions or fimbriae to achieve adhesion to uroepithelial cells 8. Type-1 fimbriae are one of the most imperative virulence factors involved in the pathogenesis of UPEC as it is through their adherence to the uroepithelial cells that achieves the establishment of UTI. 3 These fimbriae are highly conserved in UPEC, being found in over 90% of isolates.1,20. The fim gene cluster encodes for Type-1 fimbriae with five of the genes responsible for structural proteins: FimA, FimI, FimF, FimG and FimH. Jones et 96- 20. In vivo microarray studies presents data that show the fim genes are expressed 12-72 times more than all of the 11 other fimbrial gene clusters. 5 In regards to the actual structural appearance of Type-1 fimbriated UPEC approximately 200-500 peritrichously arranged fimbriae are seen on the surface. Schembri et al 02 20. The initial binding of UPEC to uroepithelial cells is conferred by the FimH adhesin to terminally positioned D-mannose moieties of glycoproteins exposed on the apical surface. 7. The stratified bladder epithelium is characterized by a superficial layer of â€Å"umbrella cell It is a specific integral membrane protein, UP1a, which has been identified as the urothelial receptor for the FimH adhesin of Type-1 fimbriae. 7. UP1a is part of a unique membrane structure called the asymmetric unit membrane (AUM) that is comprised of 3 other integral membrane proteins, the uroplakins (UPs) UPIa, Ib, III and IIIa. 15. The AUM looks like rigid plaques and structurally form a 16nm receptor complex assembled into hexagonally packed two-dimensional crystals that are essential in maintaining the permeability barrier function.15 In addition to creating the foothold for infection in the pathogenesis of UPEC in UTI through adherence, Type-1 fimbriae also play a role in the invasion of host cells. FimH binding triggers host cell signaling cascades enabling UPEC to be internalized via a ‘zipper-type invasion mechanism.7 Overall Type-1 fimbriae play a crucial role in establishment of lower UTI through key roles in adhesion and invasion within the bladder. It is P-fimbriae that are noted to play an essential part in pathogenesis of upper UTI, i.e. pyelonephritis. 12 The pap (pyelonephritis-associated pilli) gene cluster, found on the UPEC chromosome itself, encodes for P-fimbriae. 20. This pap gene cluster is made up of eleven genes with six encoding for structural proteins that form the P-fimbria structural unit: PapA, PapK, PapF, PapG, PapE and PapH. 20. P-fimbrial lectins, (specifically the PapG adhesin) recognise a digalactoside component of the P blood group antigen and also Gal (a 1-4) Gal b galbiose disaccharide receptors extensively positioned on the surface of uroepithelial cells in 99% of the population.12+13 The expression of P-fimbriae undergoes phase variation (ON/OFF) with this being controlled by a combination of Dam methylation, leucine-responsive regulatory protein (Lrp) and the PapB and PapI regulators.3,20 Despite the strong epidemiological association of P-fimbriae with UPEC strains causing acute pyelonephritis, its precise function during the pathogenesis of a UTI remains elusive. 1. However the plethora of P-fimbrial receptors in human renal tissue coupled with their association with acute disease severity (found in 90% acute pyelonephritis) suggests that P-fimbriae are indeed necessary for colonisation and perhaps invasion of the upper urinary tract. 20+Johnson. In addition to Type-1 and P-fimbriae, there are a number of other fimbriae found to be albeit not as imperative, but nonetheless associated with the pathogenesis of UPEC in UTI. F1-C (Foc) fimbriae bear a resemblance to Type-1 fimbriae in their organelle structure and genetic organisation. The F1-C fimbriae mediate binding to globotriaosylceramide targets found solely in the kidneys as well as galactosyleramide on epithelial cells in the bladder and kidneys.