Thursday, October 31, 2019

Autism Paper Essay Example | Topics and Well Written Essays - 500 words

Autism Paper - Essay Example His autism presents itself as a need for order, esoteric ways of viewing the world and difficulty communicating that to his classmates despite being very friendly and sometimes very outgoing, and a degree of judgment about others. In games with others, he frequently has different goals and objectives and wonders why everyone else is so â€Å"stupid†. The ADI-R and CSBQ may be able to guide my work with Adam. I would recommend, however, that they put him through the ADOS before designing a plan. The ADOS is designed to work with the ADI-R, and while I don't think it's strictly necessary, I believe that it's important to get as many different points of information as possible before beginning a regimen. The ADI-R focuses on social interaction, communication and behavior patterns. I think these are important, but I'd want a more holistic, qualitative look at his symptoms. The CSBQ is helpful because, as a questionnaire, it can provide more data than the ADOS. In conjunction, I th ink they are a useful guide. One thing I'd want to see specifically is his degree of restricted and repetitive behaviors.

Tuesday, October 29, 2019

The white mountains Essay Example | Topics and Well Written Essays - 1000 words

The white mountains - Essay Example Surprising tones were displayed among the bands of earth made visible by road cut-throughs. These bones of the mountains, the strata that reveal their core construction, only serve to heighten our perception of the volume of rock we’re seeing and the weight of patient time it has taken for wind and weather to sculpt the billowing rounded crests we see emerging around every angle we look. Even the chatter in the car during the drive takes on new dimensions with the changing scenery. While we start with discussions of a suitably frivolous nature, by the time we’ve hit the true mountains our conversation has taken on new weight and purpose. We begin discussing our destination point, The Old Man of the Mountain, and how it came to be. This was a rock formation chiseled out of a cliff’s edge by wind, water, weather and the natural rock fracturing that occurs as a result of constant changes in temperature. The formation closely resembled the features of a craggy old man in profile. The formation collapsed in 2003, the year after our visit. Our stories of how we’d first heard about the Old Man and how we eventually came to the decision to visit slowly began to taper off as the grandeur of the mountains surrounding us began working on our subconscious. With the revelation of each new vista, we began losing track of our conversation, allowing sentences t o dangle without completion as we were struck silently breathless at a new view. Then, suddenly, we were there, at the lookout point just off the freeway that affords a perfect view of the Old Man in profile as he gazes over a spectacular view of Profile Lake. The lake isn’t often mentioned in descriptions of the site and makes a stunning and sometimes surprising counterpoint to the face. He exists in awesome, mystifying reality, poking out from the side of the cliff in perfect detail. It is surprising to us how

Sunday, October 27, 2019

Secure Barcode Authentication using Genetic Algorithm

Secure Barcode Authentication using Genetic Algorithm Dr. Poornima G. Naik Mr. Girish R. Naik Abstract— Genetic Algorithm (GA) is an invaluable tool for solving optimization problems due to its robustness. It does not break even if the inputs are changed slightly or in the presence of a reasonable noise. GA offers significant benefits over other optimization techniques in searching a large state space or n-dimensional surface. In todays information age information sharing and transfer has increased exponentially. With the popularization of Internet and exponential increase in e-commerce transactions security has become an inevitable and an integral part of any e-commerce application. Data integrity, confidentiality, authenticity, non-repudiation have gained tremendous importance and have become important components of information security. In this paper we have made an attempt to exploit the randomness involved in crossover and mutation processes of GA for generating a barcode for authentication process. The number of crossover points and number of mutation points is f ixed and cannot be altered by the user. In the current work we have employed a single crossover point and two mutation points. We have used Code-39 and Code-128 encoding techniques for generating a barcode. The barcode data comprises of 12 randomly generated decimal digits. Each decimal digit is represented using 4 bits. Hence the length of the barcode data is 36 bits. The randomly generated data is transformed into encoded form by applying crossover, mutation and XOR operations before generating a bar code. The randomness together with encoding makes the password robust and hard to track. Finally, the algorithm is implemented in Java and applied for authentication of employee data in a hypothetical organization. The methodology is general and can be applied to any task where authentication is required. Index Terms— Genetic Algorithm, Cross-over, Mutation, Barcode, Encoding. The paper is organized as follows. The first section gives an introduction to Genetic Algorithm under the heading of Introduction. Section II covers the literature survey and the current scenario of application of soft computing in implementing security. Section III focuses on the proposed method of barcode generation using Genetic Algorithm. Section IV covers implementation of the algorithm in Java. Finally, Section V is devoted for conclusion and scope for future enhancements. I. Introduction Genetic algorithms (GA) are adaptive heuristic search algorithms based on the evolutionary ideas of natural selection and genetics [1]. They are based on the principle of Darwinian idea of survival of the fittest and natural genetics. Genetic Algorithm Generally, a Genetic Algorithm consists of three basic operations. Selection Crossover Mutation The first step consists of searching individuals for reproduction. In our problem, we have selected two vectors of 16 bytes each as parents for reproduction. Since the problem is of encryption, there is no special preference given to any particular selection method. All the vectors are selected sequentially based on their order of appearance in a text file. Cross-over is the process of taking two parents and producing from them a child. In an optimization problem, crossover operator is applied to the mating pool with the hope that it creates a better offspring. For the problem under consideration, crossover is taken as one of the steps in producing a decrypted vector. We have employed four-point crossover method. In the case of optimization problem, selecting more than four crossover points will result in the disruption of building blocks whereas in the case of encryption larger the disruption better is the algorithm which makes it robust and difficult to break. After crossover, the vectors are subject to mutation. In optimization problem, mutation prevents the algorithm from being trapped in a local minimum. Mutation plays the role of recovering the lost genetic matter as well for randomly distributed genetic information. In encryption problem, mutation is employed for inducing disorder into the vector. It introduces a new genetic structure in the population by randomly modifying some of the building blocks and maintains diversity into the population. We have employed flipping method, in which for a character 1 in mutation chromosome, the corresponding character b in the parent chromosome is flipped from b to (9-b) and corresponding child chromosome is produced. In the following example 1 occurs at two random places of mutation chromosome, the corresponding characters in parent chromosomes are flipped and the child chromosomes are generated. Structure of Code128 Bar Code Barcodes are made up of a series of lines that vary in width and correspond to various numeric, alphanumeric, or multicode configurations which can then be read in by a laser barcode scanner.Code 128 is a very effective, high-density symbology which permits the encoding of alphanumeric data. It includes verification protection both via a checksum digit and byte parity checking. This symbology has been widely implemented in many applications where a relatively large amount of data must be encoded in a relatively small amount of space. Itsspecific structure also allows numeric data to be encoded at, effectively, double-density. A Code 128 barcode consists of a leading quiet zone, one of three start codes, the data itself, a check character, a stop character, and a trailing quiet zone as shown in Fig. 1. The Code 128 data is encoded in strips of bars and spaces. The sequences of zeros or ones simply appear as thicker bars or spaces. The checksum is included in the barcode, and is a digi t that verifies that the data just read in was correct. The checksum digit is based on a modulo 103 calculation based on the weighted sum of the values of each of the digits in the message that is being encoded, including the start character. Fig. 1. Code-128 Barcode Similar structure exists for Code-39 Barcode. ii Literature survey In literature to date, many GA based encryption algorithms have been proposed. A. Tragha et.al [2] have describe a new symmetric block cipher system namely, ICIGA (Improved Cryptographic Inspired by Genetic Algorithm) which generates a session key in a random process. The block size and key length are variables and can be fixed by the end user in the beginning of the cipher process. ICIGA is an enhancement of the system GIC (Genetic Algorithm inspired Cryptography) [3]. There are various proposed methods for image encryption such as quad tree approach, cellular automata [4, 5]. There are wide applications of GA in solving non-linear optimization problems in various domains [6,7]. But very few papers exist which exploit the randomness in the algorithm for implementation of security. Chaos theory and entropy have large application in secure data communication and the desired disorder is provided by inherent nature of genetic algorithm [8, 10]. Mohammad SazzadulHoque et.al [11] have pre sented an intrusion detection system by applying GA to efficiently detect various types of network intrusions. They have used evolutionary theory to filter the traffic data and thus reduce the complexity [12]. There are several papers related to IDS all of which use GA in deriving classification rules [13, 15]. But to the best of our knowledge very few papers exist which exploit randomness in generating barcode for authentication purpose. III Proposed Method Fig. 2. Application Architecture We have used Code-39 and Code-128 encoding techniques for generating a barcode. The barcode data comprises of 12 randomly generated decimal digits. Each decimal digit is represented using 4 bits. Hence the length of the barcode data is 36 bits.The randomly generated data is transformed into encoded form by applying crossover, mutation and XOR operations before generating a bar code. The application architecture is shown in Fig. 2. Pseudocode The pseudo code for barcode generation process using GA is depicted in Fig 3. Step 1 : Generate a 12 digit random number and store it in a vector. Step 2 : Each decimal digit in step 1 can be represented using 4 binary digits. Hence the total number of binary digits required to represent the data is 4 x 12 = 48 bits. Generate a hash H, by repeating digits 0 and 1 (if the digit is > 8) and 0 and 0, otherwise, required number of times. Step 3 : Perform the XOR operation between the data and a 48-bit hash computed above. Step 4 : Split the vector into two vectors of size six each. Step 5 : Compute 10’s complement of each digit. Step 6 : Perform the crossover operation at the midpoint. Step 7 : Perform the mutation at the extreme positions of the vector. The mutation operation consists of flipping the digit from its original value to its complement. Step 8 : Combine the vectors to reconstruct a 12-digit vector. Step 9 : Perform the XOR operation between the data and a 48-bit hash computed above. Step 10 : Use the 12-digit number generated above to generate a barcode in code-128 fromat. Step 11 : End Fig 3 Pseudo code for barcode generation using GA Mathematical Formulation. Let the original vector be represented by VOriginal. Let H be the hash constructed as follows. H= ∑’ Hi where 1 Hi = 0000, for i = 8 or 9 = 0101, otherwise. H is the generated hash of length 48 bits. Compute the hash of VOriginal as shown below: VOriginal ÃŽ ¸ H = VHash Split the hash into two vectors of size six each. Let the two parts be represented by, V1Hash and V2Hash, respectively. VHash = V1Hash + V2Hash Compute 10’s complement of each digit. Let the two parts be represented by ( V1Hash)ÃÅ'  and (V2Hash )ÃÅ' , respectively. Perform the crossover operation at the midpoint. Let the two new parts now be represented by C( V1Hash )ÃÅ'  and C(V2Hash ), respectively, where C is the crossover operator. Perform the mutation at the extreme positions of the vector. Let the two parts now be represented by MC( V1Hash )ÃÅ'  and MC(V2Hash ) ÃÅ' , respectively, where M is the crossover operator. Combine the vectors to reconstruct a 12-digit vector. Perform the XOR operation between the data and a 48-bit hash, H computed above to generate a final vector. Let it be VTransformed. We get, VTransformed = [ MC( V1Hash )ÃÅ'  + MC(V2Hash ) ÃÅ' ] ÃŽ ¸ H (1) Decoding Vector into original Vector Perform XOR operation between H and VTransformed given by equ(1) to get, [ MC( V1Hash )ÃÅ'  + MC(V2Hash ) ÃÅ' ]. Split the hash into two vectors of size six each. Let the two parts be represented by, MC( V1Hash )ÃÅ'  and MC(V2Hash ) ÃÅ'  respectively. Perform reverse mutation operation and then reverse cross0ver operation on two individual parts to get, ( V1Hash)ÃÅ'  and (V2Hash ) ÃÅ' , respectively. Take 10’s complement of each digit in the two vectors to get, ( V1Hash) and (V2Hash ), respectively. Combine the two vectors to get VHash, where VHash =VOriginal ÃŽ ¸ H Perform XOR operation between H and VHashto get the original vector. The entire process of generating the barcode is illustrated below with the help of an example. Step 1: Generate a 12 digit random number and store it in a vector. Let the number be represented by Step 2 : Generate Hash H as shown below. Step 3 : Perform the XOR operation between the data and a 48-bit hash computed above. Step 4 : Split the vector into two vectors of size six each. and Step 5 : Compute 10’s complement of each digit. and Step 6 : Perform the crossover operation at the midpoint. and Step 7 : Perform the mutation at the extreme positions of the vector. Step 8 : Combine the vectors to reconstruct a 12-digit vector. Step 9 :Generate Hash H as shown below.. Step 10 : Perform the XOR operation between the data and a 48-bit hash computed above Step 11 : Use the 12-digit number generated above to generate a barcode in code-128 fromat. CODE128- 996108946439. Decoding the barcode Step 1: Extract the rightmost 12 digits from the barcode. Step 2 : Generate a hash as shown below: Step 3 : Perform the XOR operation between the data and a 48-bit hash computed above Step 4 : Split the vector into two vectors of size six each. Step 5 : Perform reverse mutation at the extreme positions of the vector. and Step 6 : Perform the crossover operation at the midpoint. and Step 7 : Compute 10’s complement of each digit. and Step 8 : Combine the vectors to reconstruct a 12-digit vector. Step 9 : Generate a hash as shown below: Step 10 : Perform the XOR operation between the data and a 48-bit hash computed above which represents the original vector iv implementation in JAVA The model proposed above is implemented in Java using MS Access as backend and Swing for GUI development. JDBC Type-I driver is used. The structure of the Barcode table used in the implementation is as follows : The following figures 4.1 to 4.4 show the output windows generated by Barcode tool developed in Java. Fig. 4.1 Java Barcode Generation Tool Fig. 4.2 Generation of Barcode Fig. 4.3 Barcode generated in Code-39 Format Fig. 4.4 Barcode Authentication Process. V.CONCLUSION AND SCOPE FOR FUTURE WORK In this paper we have proposed a model for barcode generation based on genetic algorithm and is implemented in Java for authentication of employees in a hypothetical organization. The password is encrypted by applying crossover, mutation and XOR operations and is difficult to track. This model provides a unique security layer on top of existing barcode security layer which makes the password more robust and difficult to break. Even if the database is hacked, the password cannot be stolen because the relationship between barcode and ID is not known. The model can be employed in situations where authentication is of prime significance and can be used for secure transmission of limited data such as credit card number. It provides a cheaper solution to RFID for authentication. Due to the symmetry in the operations involved and symmetry of XOR operation, the coding and encoding processes are reversible. Our future work consists of interfacing the software with barcode scanner and study of various coding techniques with reference to their applicability. References David. E. Goldberg, â€Å"Genetic Algorithms in Search, Optimization, and Machine Learning†, Pearson Education, 1989, ISBN-13: 978-020115767. X. F. Liao, S. Y.Lai and Q. Zhou. Signal Processing. 90 (2010) 2714–2722. H. Cheng and X. Li. IEEE Transactions on Signal Processive. 48 (8) (2000) 2439–2451. O. Lafe. Engineering Applications of Artificial Intelligence. 10 (6) (1998) 581–591. R. J. Chen and J. L. Lai. Pattern Recognition. 40 (2007) 1621–1631 Dr.Poornima G. Naik, Girish R. Naik, Application of Genetic Algorithm to Mass Production Line for Productivity Improvement, International Journal of Latest Trends in Engineering and Technology (IJLTET) Special Issue – IDEAS-2013 ISSN:2278-621X. S. Li, G. Chen and X. Zheng. Multimedia security handbook. LLC, Boca Raton, FL, USA: CRC Press; (2004) [chapter 4]. Y. Mao and G. Chen. Handbook of computational geometry for pattern recognition, computer vision, neural computing and robotics. Springer; (2003). H. S. Kwok, W. K. S. Tang, Chaos Solitons and Fractals, (2007) 1518–1529. Mohammad SazzadulHoque, Md. Abdul Mukit and Md. Abu NaserBikas,An Implementation of Intrusion Detection System Using Genetic Algorithm, International Journal of Network Security Its Applications (IJNSA), Vol.4, No.2, March 2012 L.M.R.J Lobo, Suhas B. Chavan, Use of Genetic Algorithm in Network Security, International Journal of Computer Applications (0975 – 8887)Volume 53– No.8, September 2012 W. Lu, I. Traore, â€Å"Detecting New Forms of Network Intrusion Using Genetic Programming†. Computational Intelligence, vol. 20, pp. 3, Blackwell Publishing, Malden, pp. 475-494, 2004. M. M. Pillai, J. H. P. Eloff, H. S. Venter, â€Å"An Approach to Implement a Network Intrusion Detection System using Genetic Algorithms†, Proceedings of SAICSIT, pp:221-228, 2004. S. M. Bridges, R. B. Vaughn, â€Å"Fuzzy Data Mining And Genetic Algorithms Applied To Intrusion Detection†, Proceedings of 12th Annual Canadian Information Technology Security Symposium, pp. 109-122, 2000. M. Middlemiss, G. Dick, â€Å"Feature selection of intrusion detection data using a hybrid geneticalgorithm/KNN approach†, Design and application of hybrid intelligent systems, IOS Press Amsterdam, pp.519-527, 2003.

Friday, October 25, 2019

Comparing HG Wells The Time Machine and Mark Twains Connecticut Yankee :: Mark Twain Connecticut Yankee

Comparing HG Wells' The Time Machine and Mark Twain's Connecticut Yankee Connecticut Yankee was written in 1889 by Mark Twain. A man is taken from 19th century America and taken to 6th century England. Using his wits He is quickly able to put himself in a position of rank in the court of Camelot. He then introduces many modern inventions and ideas to the society in an attempt to bring it to what was considered the â€Å"right† way in the 19th Century. This shows how much influence a single man can have in the society around him. There is also a conflict of ideas in this book that leads to his eventual downfall and return to the 19th century. Throughout literature and history there have been many instances where a single man and his idea and beliefs have changed the course of events and shaped a society around his individual beliefs. These men have shaped history and the worlds that they live in. Connecticut Yankee is a prime example of such a man in a world, where his ideas cause a dramatic change. Hank Morgan was pulled from his world and taken to one that is a total opposite of his. Seeing that he cannot return to his world he then tries to transform Camelot to the world he remembers, 19th century America. Morgan enters a world of slavery, poverty, and control of the masses by a few select people. This world is completely different than what he is accustomed to and what he believes. He is in a world of superstition and lies. He uses his knowledge of a solar eclipse and plays it like if he where making the sun disappear. This gets him the position of Head wizard and second only in command to the king himself and it saves him from burning at the stake. The Camelot that Twain places Hank Morgan is a complete opposite to the world he comes from. He views them as a pack of uneducated fools and savages. This situation is much like that of the Time Traveler in H.G. Wells the Time Machine. Instead of going back in time he goes forward in time where the Eloi and the Morlocks, different races of people, are thrown back to primitive conditions. He talks to Eloi and sees them as little children who the Morlocks exploit for food and labor.

Thursday, October 24, 2019

E-Procurement And E-Logistics

our site – CUSTOM ESSAY WRITING – Business Management Dissertation Ideas ABSTRACT In this paper, we analyze the e-procurement and e-logistics of the Dell Inc. Company. This will include a brief overview of the company, an exploration of its Customer Relationship Management, the Supply Chain management and an analysis of the various softwares used by Dell Inc in promoting its relationship marketing. INTRODUCTION Today, many people have discovered the significance of E-commerce. E-commerce, also known as electronic commerce refers to business transactions and communication via computers especially over the internet and networks (Botha, Bothma and Geldenhuys, 2008: p.23). This involves buying and selling of services and goods, and transfer of funds among other commercial communications through the internet, mainly through the World-Wide Web (Botha, Bothma and Geldenhuys, 2008: p.23). E-commerce takes place in different situations such as between businesses and customers (B2C), between one business/company and another (B2B), and between customer and customer (C2C). It is mainly divided into two main parts, which are e-procurement and e-logistics. E-procurement is defined as an electronic method of conducting business transactions while e-logistics refers to the transfer of goods sold over the internet to customers (Botha, Bothma and Geldenhuys, 2008: p.24). A well implemented e-procurement system is highly effective in connecting businesses and other business processes with suppliers while running all interactions between them. According to Botha, Bothma and Geldenhuys (2008: p.23), the development and advancement of technology, many businesses now sell their products through computer technology, which is a brilliant way of making companies reduce overhead costs and reach a wide customer base. Thus, e-procurement benefits not only the business owners, but also customers since they can shop without leaving their homes. Also, customers can easily find the lowest price of products when buying their goods via the internet. In this paper, we analyze the e-procurement and e-logistics of the Dell Inc. Company. DELL INCORPORATED Dell Inc. is a computer company that was established by Michael S. Dell, in 1984 (Krauss 2003: p.7). It offers a wide range of technology product categories (Krauss (2003: p.8). These products range from personal computers to services such as storage solutions. Also, it gives a variety of services, which range from business services and configurable information technology including product-related support services, consulting and applications and infrastructure technology (Krauss, 2003: p.8). As stated by Levy (1999: p.20), Dell Inc. operates in four global business segments, which include public, Large Enterprise, Consumer, and small and Medium Business. The company designs its own products, manufactures and markets them, sells, as well as supports a range of products and services, which can be modified to individual requirements of customers (Perret and Jaffeux, 2007: p.4). Dell Inc. is considered among the companies that are most profitable. The company offers the most innovative customer service, as well as product custom configuration in the world (Perret and Jaffeux, 2007: p.5). For this reason, the company is faced with the challenge of satisfying the customers’ needs while maintaining a stable relationship with them. E-PROCUREMENT AT DELL Dell Inc. is widely known for selling its computers and others services through the internet to other business (B2B) and to individual customers (B2C) (Perret and Jaffeux, 2007: p.5). B2B refers to business transactions between one company and another such as business customers, suppliers and distributors. The B2C refers to business transactions between a company and consumers. At the beginning of the 1990’s, Dell Inc. attempted to distribute wares by retailing. However, the management found out later that this method was unprofitable for business (Gattorna, 2003: p.51). Hence, Dell Inc. decided to key on boosting its customer support and services by allowing customers to make orders directly (Gattorna, 2003: p.52). This was considered a unique strategy for Dell customization. Recently, Dell Inc. improved its sourcing and buying processes by implementing a leading e-procurement solution known as Ariba Buyer (Krauss, 2003: p.8). In order to ease the business processes between Dell Inc. and its supplier companies, Ariba Buyer which is an e-procurement solution is used. It is quite useful in automating and streamlining sourcing. (Li, 2007: p.20). In earlier years, making purchase orders at Dell was a highly laborious process since company workers filled out forms for each purchase process every time they ordered an item, which included collecting about ten approval signatures (Li, 2007: p.21). The buyers were then expected to re-enter the data into two different systems that included a home-grown Access database and the legacy purchasing system. This paper-based process was challenging for Dell to track its purchases by commodity, as well as analyze its purchasing patterns in terms of where, how much and from whom the supplies were bought, hence the change in its procurement process. Thus, Dell Inc. implemented an e-procurement solution known as Ariba Buyer. E-procurement enabled Dell to streamline its supplying base. This helped in the elimination of maverick spending, as well as standardization of the ordering processes for its suppliers. (Krauss, 2003: p.8). This was followed, by Dell’s move, to assess 3 e-procurement systems depending on five criteria. These criteria included a user-friendly boundary, cost-effectiveness, and integration with existing back-end system (Krauss, 2003: p.8). Others included e-commerce links to most of Dell’s supplying companies, and compatibility with the current IT policy of Dell servers (Li, 2007: p.20). According to Gattorna (2003: p.50), close to seven months were spent by the personnel that were responsible for implementing Ariba. This time was spent in developing twenty interfaces that would facilitate connection of Ariba buyer with Dell’s legacy systems. They created linkages for Ariba and Dell’s purchase order, catalog data, cost center, accounting code validation, and employee data among other systems (Gattorna, 2003: p.50). This was made to ascertain that all the processed orders had been validated. This resulted in a final product, which facilitates making purchases online. This product is known as Dell Internet Requisition Tool (DIREQT) (Gattorna, 2003: p.51). Currently, DIREQT has made it easy for Dell employees to complete purchasing orders online by loging into DIREQT Web site, as well as conducting searches for certain products, suppliers or services, which usually give accurate status reports (Levy, 1999: p.23). Immediately, Ariba Buyer forwards the catalog items and requisition straight to the right manager at the cost center who signs the order electronically. The system then automatically creates an approving chain before directing it to an employee network. (Gattorna, 2003: p.51). However, if the product ordered is not present in the catalogue, Ariba Buyer includes a Dell buyer to source the product and hands over the request for last signatures (Perret and Jaffeux, 2007: p.6). After the requisition has been approved, it is moved to the Ariba Commerce Services Network (ASCN). ASCN is a shared network infrastructure that helps to connect with buyers and marketplaces, on the Ariba Business to Business (B2B). Commerce stand (Perret and Jaffeux, 2007: p.6). Ariba uses ASCN to communicate its orders to suppliers, which includes shipping through e-mail, faxes, Extensive Markup Language (XML) and electronic data interchange (EDI) (Perret and Jaffeux, 2007: p.6). Moreover, Ariba Buyer also accelerates the payment process in Dell Inc. The receipts that Dell’s central receiving department prepares for wares are brought into the organization and matched automatically with the right invoice. This is then fed into the system by the account payable processors (Bothma and Geldenhuys, 2008: p.25). In addition, the purchasers create receipts of the service given to them, which is also matched in an automatic manner. Therefore, this practice helps to avoid the early routine of service invoices, which is time-consuming, when making purchases for approval. As stated by Botha, Bothma and Geldenhuys (2008: p.25), with the Ariba Buyer at Dell, the requisition cycle time is likely to be reduced by 62%, and lessen operation costs by 61%. However, Dell Inc. believes that it stands to benefit on a larger scale from the perception into the buying process attained through combining customers’ information. Moreover, through the use of Ariba, Dell is able to gather information necessary to evaluate its supply base and re-evaluate key business to market communications services, office products and consulting, among many more kinds of expenditures (Gattorna, 2003: p.50). CUSTOMER RELATIONSHIP MANAGEMENT According to Perret and Jaffeux (2007: p.7), Customer Relationship Management (CRM) is the creation and maintenance of relations with customers. The key aim of Dell is to offer its customers technologically reliable customer service requirements. Perret and Jaffeux (2007: p.7) argue that the software that help in facilitation facilitate Dell’s CRM include marketing automation software, a system that benefits the sales, and custom designed Web pages that contain purchase data. According to Ross (2010: p.88), today, one fifth of standard-based computers sold in the world is Dell’s product. The key concept of Dell Inc. is to sell computers directly to customers. This will increase their success in the computer business. (Ross, 2010: p.88). Before Dell Inc. invented the made-to-order concept, its customers used to buy its products from electronic shops and retail stores. In this case, customers interacted only with the salesperson of the store and not the manufacturer. Therefore, Dell introduced the concept of interacting directly with the customer via the internet so as to fulfil the demands of its clients and deliver quality services. E-LOGISTICS AT DELL INC. For Dell Inc., the E-logistics has entirely changed it way of distributing its products. Traditionally, Dell used to pick up components from the warehouses of suppliers then collect them in its central or regional distribution centres, and finally merge them in stock in order to deliver the final products to customers (Ross, 2010: p.88). Currently, through implementation of e-logistics, Dell Inc. can now pick up components from the ware houses of suppliers and then forward the merging of components made during the transit to the logistic-service providers through USP or Airborne Express (Li, 2007: p.36). This has resulted in less fixed costs spent in warehouse centers and distribution, no product technological obsolescence, and no stock-keeping units (SKU). SUPPLY CHAIN MANAGEMENT AT DELL INC. Supply Chain Management (SCM) is a system that Dell established to ensure the availability of precise computer components for its customers on demand and location. SCM describes how the company manages how raw materials are transformed into the end products and how products and services get to all its consumers (William, 2003: p.150). This has enabled the company to develop a tight bond with its supplier companies and consumers. In this regard, Mencarini (2003: p.19) states that Dell Inc. have one of the most effective SCM system in the world, and that it is focusing on creating the best SCM through the i2. This will improve the supply chain process through connecting its suppliers and planners in order to satisfy the requirements, as well as demands of their customers. SOFTWARE USED BY DELL IN PROMOTING RELATIONSHIP MARKETING Dell also uses a variety of software to promote relationship marketing such as Hotlink, Premier Pages and an enhanced CRM system, among others (Gattorna, 2003: p.57). Its database software is highly efficient and effective with customer relationship management, which stores tables of data used to check the information of customers and establish promotional campaigns. These databases mainly include the information of customers, their products and interests. According to Gattorna (2003: p.57), customer database helps to increase profits since it contains the information of clients, which determines the efficient and effective ways to target and divide the consumers. Hotlink is an automation software program, which facilitates tergeting and marketing communication, monitoring of customers and market development (Mencarini, 2003: p.21). This software gives Dell a free opportunity to advertise its products through the word of mouth. Also, it impacts its customer base to ensure that customers receive better services than before. Premier Pages are a transparent online system/software custom designed Web pages, which contain all the purchasing data (Gattorna, 2003: p.57). In addition, the software contains a paperless ordering process, which captures the technology configurations of customers. Mencarini (2003: p.21) argues that Dell created Premier Pages in order to gather less clientele details than they already have and develop a win-win situation that is more realistic. This starts when the clients places their orders for a computer and built later. Another system that Dell uses is an enhanced CRM system, helped by an information system company called the IS Partners (Moon, 2003: p.45). ProClarity offers a comprehensive analytical ability that highlights negative and positive areas of the business. Moreover, the company breaks down its sales by region where each team enables Dell to measure its own trend and success. ProClarity significantly benefits all the financial sections of the company. It also helps the Dell staff to easily access detailed demographic information about customers. The marketing department is able to follow product sales, customer activity and marketing mixes via this software. The management can follow activities in customer accounts, and act on lapsed quotes. Additionally, Dell installed the e-commerce software i2 Collaboration Planner, i2 Supply Chain Planner and i2 Factory Planner in order to meet its supply chain needs (Moon, 2003: p.45). This is applicable in the management of build-order procedures that exist between placing orders and customer support. The software enables Dell Inc. to classify customers and target them through their most preferred medium, obtain and analyze results (Moon, 2003: p.45). Moreover, Dell Inc. has signed an agreement with Part-Miner (Gattorna, 2003: p.51). Part-Miner is a vertical portal in electronic components industry, which provides information and helps to meet the demand and supply of the components. FUTURE PLANS OF DELL INC In future, Dell plans to update its processes of purchase such as the establishment of online auctions for products and services like printing, shipping, and paper (Li, 2007: p.20). The company also plans to make order status, payment information and receipts easily accessible to suppliers online. In coming years, Dell intends to expand its catalogue base and purchase choices by convincing its main suppliers to use the Ariba Business to Business Commerce Platform (Li, 2007: p.20). CONCLUSION CRM-SCM integration tries to satisfy clients through prompt delivery of products, ensuring its accessibility and maintain the manufacturer’s profits and returns. Thus, there are several lessons that can be drawn from Dell’s application of e-business. This trend can be emulated by other organizations in the industry. This will result in offering of better services to customers. It can be portrayed via the way Dell Inc. uses CRM to its advantage. Customer satisfaction will increase their trust in the organization, improving its reputation. In addition, custom-building a PC desired by the clients has formed a particularly strong relationship between Dell and its customers (Moon, 2003: p.50). In addition to this, implementing technology in a phased fashion has helped Dell to achieve a strong relationship with its clients. Dell set up simulated environments in order to support the i2 system in blotches without affecting the live form. Dell ensured that all stages of the comp leted process allowed future growth of the company before developing the whole system. Hence, this reduced risk and increasing efficiency. Another significant lesson from Dell would be to extend the link from the customer to the supplier, while maximizing its operation efficiency as well as customer satisfaction (Ross,2010: p.92). As a result, customers were able to spend less money on purchasing customized machines. This is because Dell approved the savings that resulted from managing its inventories efficiently. The company was, therefore, able to share information with suppliers about customer requirements and buying patterns in real-time. REFERENCES Botha, J., Bothma, C. & Geldenhuys, P. 2008. Managing E-commerce in Business, New York, Juta and Company Ltd. Gattorna, J. 2003. Gower handbook of supply chain management, Burlington, Gower Publishing Ltd. Krauss, M. 2003. Dell looks to Sears to extend buyer reach. Marketing News, April 28, 2003, Vol. 37, Issue 9. Li. L. 2007. Supply chain management: concepts, techniques and practices enhancing the value through collaboration, Tokyo,World Scientific. Moon, K. 2003. Dell Computers: A Leader in CRM. Retrieved February 20, 2010 Mencarini A. 2003. E-Business: Dell Case Study, UK, Strathclyde Business School. Perret, F. & Jaffeux, C. 2007. Essentials of logistics and management, London, EPFL Press. Levy, R. H. 1999. The Visible Marketer: Dell’s CRM model stresses transparent processes. Available from http://directmag.com/mag/marketing_visible_marketer_dells/index.html {Accessed 20th February 2012} Ross, D. F. 2010. Introduction to Supply Chain Management Technologies. London, CRC Press. William C. 2003. The true meaning of supply chain management. Logistics Management, June 2003, Vol. 42, Issue 6.

Wednesday, October 23, 2019

Managing Employee Performance Essay

In the article under review, Hoogenboezem and Hoogenboezem (2005) discuss the introduction of performance measurement in the Dutch Police service since 2002. This phenomenon followed radical changes in Dutch political organization largely precipitated by the rise of politician Pim Fortuyn who had government performance on top of his political agenda. The Dutch government, like most of its Western counterparts had been cited for underperformance with regards to public service delivery. The government had frequently shifted this blame on non-performance of its civil servants. This was taken as a key political agenda in the run up to the 2002 elections in the Netherlands. Fortuyn’s argument was that government had refused to exercise control by holding public sector managers accountable and setting targets for them. The authors examine the Dutch political system. Traditionally, the system has thrived on consensus building. This had affected efficiency in performance within the public sector which gave rise to a ‘’political attention for performance measurement’’ (2005:571). They also investigate the collapse of the Dutch pillars of society, the nature of policing and the community policing approach in the Netherlands and conclude that performance measurement will eventually become ineffective as a performance enhancing instrument. This they ascribe to the fact that the whole process of targeting in the Dutch Police administration does not have a firm philosophical base. It is based on loose arguments of a loud politician and an electorate that wanted change at all cost. Importing management practices like performance targeting from the private sector to the public sector comes with complexities (Adcroft and Willis, 2005). This is manifest in the struggle to cope with t argets by the Dutch Police. Effect of Targets on Performance Measurement The consequence of the political waves in the Netherlands in 2002 was the setting of quantitative law enforcement targets for political heads of the Police force. Specific figures for the number of suspects to be prosecuted for public violence and juvenile crime, for example were set. It appears to me that the targets are the result of undue political pressure rather than a carefully thought through system of performance management. Performance management systems are implemented to produce tangible results for organizations based on their mission statement and strategic objectives. Performance measurement is only one component of a performance management system. There is no indication, at least from the journal article, that the due processes for establishing a performance management process, namely prerequisites, planning, execution, assessment, review and renewal/recontracting (Agunis, 2009:32) are followed in the Dutch Police example. The effect is the general cynicism towards tar geting by the Police and the public. Again, employees react differently to performance measurement. This requires that organizations must be able to predict employee reaction to targets and factor these reactions into the management process (Selden and Sowa, 2011). Feedback from the parties involved in the Dutch Police targeting differs hugely. Whilst one group (senior management) appear enthused about the targets, another group (the operational policemen) are aggrieved. This suggests lack of consultation of all stakeholders which is a key component to successful performance management; especially in the setting of targets and measurement criteria. The essence of policing is to make society safer. Any ‘’†¦system that will not make the Netherlands safer†¦Ã¢â‚¬â„¢Ã¢â‚¬â„¢ (Hoogenboezem and Hoogenboezem, 2005:573) is doomed to fail ab initio. Such a system lacks strategic congruence and becomes a public relations gimmick. This is the position expressed by some in Police leadership. However another group are inspired about getting more money ((Hoogenboezem and Hoogenboezem, 2005:573). The ‘’more money’’ factor will tend to obscure an impartial assessment of the scheme. This is also the case with Police chiefs expressing some support for targeting, with targets linked to reward in their case. Policemen at the operational level have problems with the targets because they make their jobs a routine; leaving them with few choices in the maintenance of law and order. The exercise of discretion appears to be of intrinsic value to the operational policeman. Where targets have placed a strict regiment on the use of discretion the intrinsic motivation in being a Policeman gets lost. An unmotivated Policeman could be a danger to society. Although officers in lower and middle management appear inspired about targets and their alignment to rewards, this is not necessarily a motivator for performance. Job enrichment and job enlargement have been recognised as essential motivators in the not-for-profit organizations (Selden and Sowa, 2011) and the Dutch politicians must recognise this. Any perception of unfairness in the Performance management system could lead to decreased employee commitment (Aguinis, 2009) and eventually undermine the whole system. In this regard the conclusion of the authors that the performance measurement in the Netherlands Police is a mixture of cynicism and a public relations ritual of signing contracts is validated. This is largely the result of it being a knee jerk reaction not involving employees in the determination of the entire process. Employee involvement helps translate targets into operational language that is understood by all participants in the process (Chamberlain, 2011) and bought into. Employee buy-in is essential for the success of every performance management system. Worst still is the fact that the new requirements of the Dutch Policeman under the present circumstance has not come with any training package. It is also not evident that systems of recruitment and selection have been amended to reflect the expected outcome in view of the radical changes in nature of the job. Conclusion In my opinion performance of Policemen should not be measured against outcomes. It should be exhibited in various agreed behaviours and programmes. Take the example of Washington State in the US where pperformance data indicated an increase in motorcycle accidents. Several Agencies like the Department of Licensing, Washington State Patrol, Traffic Safety Commission and the Department of Transportation, worked together to provide more education for motorcycle operators and manufacturers as well as stricter licensing. These measures (programs and behaviours) resulted in fewer accidents (http://www.agacgfm.org/research/downloads/CPAGNo23.pdf). The case for quantifying performance outcomes for the public sector does not have much merit in my opinion. References Aguinis, H. (2009) Performance management. 2nd ed. Upper Saddle River, NJ: Pearson/Prentice Hall. Chamberlain, L (2011). ‘Does your performance management need a tune-up?’ Strategic Finance. November. pp.18-20. Available at: http://content.ebscohost.com.ezproxy.liv.ac.uk/pdf27_28/pdf/2011/5Y6/01Nov11/67179179.pdf?T=P&P=AN&K=67179179&S=R&D=buh&EbscoContent=dGJyMNLe80SeprY4wtvhOLCmr0mep69Ssam4SrWWxWXS&ContentCustomer=dGJyMOzprkmvqLJPuePfgeyx44Dt6fIA . Accessed on: 7 December 2011) Hoogenboezem, J. A., & Hoogenboezem, D. (2005) ‘Coping with targets: performance measurement in The Netherlands police’, International Journal of Productivity and Performance Management, 54 (7), pp. 568–578. http://sfx7.exlibrisgroup.com.ezproxy.liv.ac.uk/lpu?title=International+Journal+of+Productivity+and+Performance+Management&volume=54&issue=7&spage=568&date=2005&issn=&eissn Seldon, S., & Sowa, JE (2010) ‘Performance management and appraisal in human service organizations: management and staff perspectives.’ Public Personnel Management. 40(3), pp. 251-262. Available at: http://ehis.ebscohost.com.ezproxy.liv.ac.uk/ehost/pdfviewer/pdfviewer?sid=8b3e34b3-2e4c-4ffe-bcb5-f57ceb9d50f7%40sessionmgr113&vid=4&hid=120 (Accessed on: 7 December 2011) Adcroft, A., & Willis, R., (2005) ‘The (un)intended outcome of public sector performance measurement’ International Journal of Public Sector Management, 18(5) pp. 386-400. DOI 10.1108/09513550510608859. Available at: http://www.alternativeminds.co.uk/AA4.pdf. (Accessed on: 28 December 2011)