Monday, September 30, 2019

Context of human services Essay

Social changes in diverse societies are brought about by several factors such as maintaining order and responsibility within and outside the society. In this case, human services such as attending offering medical attendance, and avoidance of social evils such as corruption, are portrayed as major opportunities for the social changes. Many people see mental anomaly as curable. In real case, one cannot be completely cured from it, but the most promising fact is that it can be recovered and maintained. People in the society are more often encouraged to live with mentally challenged as they support them from day to day. They should be friendly to them since it is not the wish of the victims to be what they are. Family environment has been considered the best in provision of care to the victims of mental illness. Presently, many people prefer discharging their patience from hospitals as soon as possible since the expenses increases from day to day. Insurance reimbursements by both private and governmental sectors usually provide a cover of not more than sixty days to the patients. These days are adequate enough to recover the mental patients. Several organizations have come up to attend the patience and also provide moral support to them. For example, The Office of Protective Commission and the Public Guardian has been established to help the mentally challenged individuals cope with the environment they are in. such organizations have maintained social order as evidenced from their efforts to protect the ill from being taken advantage of (Hasenfeld, 2009) Members of the society should be encouraged and given knowledge about the mental disorder. In so doing, they will be actively encouraged to handle the victims with proper care, love, respect and most of all with dignity since the victims are also human beings thus they deserve tender care. Mental illness has got no specific cause. However, causes has been identified as either due to hereditary factors (it exists in the family linage), caused by organic diseases and even sometimes by environmental situations such as one being subjected to adverse stress. This disorder has got no borders and any person can be a victim, indiscriminate of his religion, gender or race and even age (Hopkins & Austin, 2004) Health systems in some parts of the world are a times selective in provision of services to its customers. Not everyone stands equal rights in services offered. Depending on your pocket or rather financial strength one is likely to get better services than the poor. Patience that may require argent medical attention is kept on waiting bays for long. This is as a result of the financially stable personnel not observing the rule of first come first served basis. Such issues have been of much negativity to the society since others have lost their loved ones at the bays and the emergency rooms. Also, the limited number of qualified persons may be a contributing factor. In some circumstances, the patient attendants may be reluctant in provision of services. Evil thoughts that propel them towards this could be such as assuming that patients could have gone to private organizations with relatively shorter queues than theirs, for fast delivery of services. It is much disgusting to realise existence of inequality in any society. This is whereby when one is rich, he/she gets richer and richer, and in most instances at the expense of others (Pease & Camilleri , 2001). Strengthening the civil society can be a way of addressing social issues such as social injustices, discrimination, violence and even poverty. A strong society can enhance better governance, tolerance and can also maintain peace within its borders. People who are socially responsible have got no time to engage in activities that will in one way or another haunt others, for example negligently polluting the environment, discriminating against others and even engaging in violence. Currently, reforms have been put in place with an aim of strengthening communities. Public are encouraged to participate in policy making. Several governments have taken initiatives of letting its citizens participate in decision making thus enabling the nation to thrive well in terms of political, economical and social development (Patti ,2008). Social evils such as corruptions are a major issue towards the existence of social injustices. Corruption has been a reason behind increase in the levels of poverty in the societies and also retarded growth in the economy. Corruption is as a result of poor governance. Those in the government can carelessly use the funds at the expense of the public thus being a leeway to social irresponsibility. It is clear therefore that this evil in the society should be emphasized on and properly dealt with so as to bring social order and also desirable changes for the development in the society (Laurence & Heinrich, 2000). In summary, it is clear that opportunities of success in terms of social changes can be as a result of human participation in service provision. Social order is enhanced through provision of better services in diverse sectors and also through good governance.

Sunday, September 29, 2019

Green Iguana Ethogram

Animal Behavior Lab An Ethogram on the Green Iguana Lecturer: Dr. P. Deluca Due Date: 2. 10. 12 Classification Kingdom | Animlia | Phylum | Chordata | Subphylum | Vertebrata | Class | Reptilia | Order | Squamata | Suborder | Sauria | Family | Iguanidae | Subfamily | Iguania | Genus | Iguana | Species | iguana | Introduction: The Green Iguana (Iguana iguana) was studied at Ardastra Gardens and Zoo in Nassau, Bahamas for approximately two hours on September 25th 2012.The Green Iguana is a large, arboreal herbivorous species of lizard of the genus Iguana native to Central, South America, and the Caribbean (Meshaka et al. , 2007). They are active during the day, feeding on leaves, flowers, and fruit. They generally live near water and are excellent swimmers. If threatened, they will leap from a branch, often from great heights, and escape with a splash to the water below (Meshaka et al. , 2007). Furthermore, they possess a row of spines along their backs and along their tails which helps to protect them from predators (Meshaka et al. 2007). Their whip-like tails can be used to deliver painful strikes and like many other lizards, when grabbed by the tail, the iguana can allow it to break, so it can escape and eventually regenerate a new one (Meshaka et al. , 2007). In addition, iguanas have well developed dewlaps which help regulate their body temperature. This dewlap is used in courtships and territorial displays (Meshaka et al. , 2007). The habitat of these iguanas was tropical warm and wet. The weather on that day ranged from 93Â °F to 95Â °F. Methods: The green iguanas were studied using Focal sampling.With this method, the green iguana was located and its behavior was observed for a standard time. During this focal study, the following data was recorded as they occur: * the context (date, time, location, weather, habitat, social context) * the sequence of behaviors * the duration of behaviors (using a stopwatch) Name of behavior: Head-Bobbing During this obse rvation, the green iguana (Iguana iguana) began this behavior by raising its body up and moving its head up and down. The time or duration of this behavior was between 12:18 pm- 1:39 pm.There were different modes of this behavior that was interpreted and could have been an indication of threat, a harmless greeting or protection of territory. The bobbing of the green iguana may also probably be done in a variety of situations and signaling of different things. The most notable description of this bobbing is the usual straight up and down with a minor side-to-side movement, which is vibrated quickly in the up-down-sideways mode. When bobbing is completed, the head is kept raised upwards after the last movement. This is held for a moment or two, followed by an up-and-down bob again.This process occurs when the iguana sees another one of its kind (neighbor), other lizards such as the brown anole and curly tail lizard and people visiting the zoo. When an individual would stay more than 1 0- 15 minutes the green iguana body will settle down into a relaxed, laying down position rather than the raised and laterally compressed body position that typically accompanies the aggressive bobs. This behavior occurred in three different sessions and they lasted on an average of thirteen (13) minutes and giving a total of thirty nine (39) minutes.The first observation of the green iguana was one of the slowest movements of its head when approached by a nearby lizard of a different species such as the brown anole that was passing by within the territory of the green iguana. This slow head bobbing appeared to be in a form of a greeting to the brown anole. At first however, the green anole was lying flat on its stomach not doing much and when the brown anole came pass, the green iguana changed its body posture by raising the body and flaring its dewlap (small pulsation of dewlap).However, the slight bobbing became more of an advertisement that the iguana was concerned about its ter ritorial rights. During the second observation, another green iguana that was sharing the same territory with the previous green iguana being studied appeared in the nearby area. When this happened, the green iguana (studied individual) bobbing changes its frequency or rate and became more rapid. This was probably an attempt to indicate that it was becoming more annoyed and offended by the trespassing of the other green iguana.It also had appeared to be warning the other iguana away from its basking area. During this behavior, the head is vibrated quickly in the up-down-sideways mode, and its head was kept raised upwards after the last movement. This was held momentarily followed by an up-and-down bob, as stated previously. However during the final bobbing observation, the green iguana head was moving in a slow jerking motion that was accompanied with little sneezing. This occurred approximately 1:22pm. During this observation, there were no visible stressors in its environment.It w as also moving along a piece of log and extending its dewlap. The dewlap is the fan like structure that hangs beneath the chin of the green iguana. The extension of the dewlap only lasted momentarily and it began to fold and tuck up under its chin, as if it was a sign of submission. This behavior lasted for approximately 8 minutes. Reference: Meshaka, E. W. , Smith, T. H. , Golden, E. , et al. (2007). Green Iguanas (Iguana iguana): The Unintended Consequence of Sound Wildlife Management Practices. Herpetological Conservation and Biology. 2(2):149-156.

Saturday, September 28, 2019

Should Physician-Assisted Suicide be Legal?

Most people in North America die what may be called a bad death. One study found that ‘More often than not, patients died in pain, their desires concerning treatment neglected, after spending 10 days or more in an intensive care unit’† (Horgan). The word euthanasia is the opposite of bad death in that its Greek origins of eu (good) and thanatos (death) have it meaning good death.   The media attention dedicated to Dr.   Jack Kevorkian, the â€Å"death doctor,† in the 1980s has given rise to some interesting questions and moral dilemmas concerning the right to die.   Ã‚  Jack Kevorkian made use of suicide machines, rigged contraptions that would deliver a death blow, to his patients that recommended them.Basically, euthanasia is the mercy killing of an individual who has a terminal illness and who might be in considerable pain or have no quality of life.   It can take two forms.   Passive Euthanasia is simply denying the patient lifesaving treatment s.   Examples of this can be the removal of feeding tubes or breathing tubes.   Active Euthanasia is, as the name implies, an active way to put a suffering individual to death.   It may include administering lethal doses of painkillers or toxins to the individual.   One definition of physician assisted suicide which combines both type of euthanasia and therefore has been dubbed ‘voluntary passive euthanasia (VPE) is â€Å"A physician supplies information and/or the means of committing suicide (e.g. a prescription for lethal dose of sleeping pills, or a supply of carbon monoxide gas) to a person, so that they can easily terminate their own life (Robinson). Recently morals and ethics have come into conflict over this issue.   Is the right to die inherent in each individual?   What role does dignity play?   Is the quality of life more important than the sanctity of life?The majority of people look to answer these questions from their own personal experiences.   T hose who have watched love ones die long and painful deaths will usually wish to avoid those ends themselves.   When death is imminent, suffering for a few extra days spent in pain or even unconscious or unaware of one’s surroundings seems a futile and even cruel punishment to inflict upon oneself or a loved one.   Others fear that the depression and pain experienced by the dying person are clouding their decision-making abilities. However, personal feelings are the least likely to be validated because everyone’s personal feelings and view differ.   Therefore, other levels of the moral and legal hierarchy must be considered.Many attempt to resolve this dilemma through religious avenues.   Religion as a basis for legal decisions is not uncommon.   Legally, the church and state must remain separate, but many exceptions have been made.   A moment of silence in school can be used for prayer.   Member of certain religious denominations may refuse medical treat ment such as vaccinations for their children.   Certain individuals are not required to swear on the Bible in court, and some religious groups are even allowed controlled and illegal substances for use in religious services.   Clearly precedence has been set for breaching or at least blurring, the line between legal and moral. Most devoutly religious individuals believe that taking the life of another is immoral under any circumstances.   They believe that only God can give and take life. Clearly they view physician-assisted suicide as murder.   Doctors who do so are playing God, which is considered a sin.From a medical standpoint, doctors are often in the middle of this debate. As physicians, they are extremely knowledgeable about the pain and suffering associated with terminal diseases and injuries.   They may feel personally saddened at this deterioration of a patient that they have come to know.   However, the doctors are bound by the Hippocratic Oath in which they h ave sworn â€Å"first, do no harm.†Ã‚   At this point, they possible feel conflicted between their professional duty and their personal feelings.Legally, taking one’s own life is suicide and taking another’s life is murder. Wikipedia defines murder as â€Å"the premeditated unlawful killing of one human being by another through any action intended to kill or cause grievous bodily harm† (Murder). This definition, doctors who take the life of a patient, even one who is suffering horrible and certain to die, is guilty of murder.Thus, the question of should physician-assisted suicide be legal is certainly complex.   Public opinion polls show that the international public is generally supportive of euthanasia.   According to a Gallup poll in 1997, 57% of people are in favor and 35% are opposed in the US.   In Canada, 76% are supportive with that number rising to 80% in Britain, 81% in Australia and 92% in the Netherlands (Reed, A12).The right to die is j ust one of the many choices that have come under the legislative domain.   Roe v. Wade gave the choice of abortion to women.   However, this right is now in jeopardy.   It seem that the US government is afraid to give choices about personal life decisions to the American public out of fear of religious backlash.   This has led to doctors fearing to provide this humanitarian aid out of fear of legal backlash in the form of lawsuits or even prosecution.Sue Rodriguez was the center of a high profile terminally ill case in Canada.   Suffering from ALS, she publicly challenged all opponents of the right to die with â€Å"Whose life is it, anyway.   Her doctor helped her commit suicide in the presence of a Canadian Member of Parliament. Neither was prosecuted (Robinson).   It is very hard to argue with the pleas of a dying woman in this situation.   However, the recent case of Terry Schiavo, in which the family had to make an interpretation of an incapacitated womanâ€⠄¢s desires, is less cut and dried.   Human greed and hatred can interfere with just decision making and this case clearly divided America.One way to ensure that an individual’s own personal wishes are carried out is through a living will.   In 1990, the U.S. Supreme Court ruled that every individual has the constitutional right to control his or her own medical treatment and that doctors, nurses or any professional staff must follow ‘clear and convincing evidence' of the ill individual’s wishes.   The personal position of the doctors and the family cannot override a living will (Robinson).Unfortunately, 67% of people do not have a living will (Robinson).   In absence of such a document, society is forced to the original question:   Should physician assisted suicide be legal?   Yes, it should.   First of all, the majority of the public believes that it is the right and just thing to do.   Next, legal precedents of the importance of choice in simil ar situations such as abortion have already been established in court.   Third, even if patients are depressed or in pain, they are still dying. The United States Justice system validates the choices of depressed individuals every day.   If a depressed person makes a choice to commit a crime, that choice is validated by an arrest, conviction and possible prison term. Prolonging their life under these circumstances is cruel and unusual punishment.   Doctors can choose as well.   Millions of people rely on doctor’s choices every day.The United States should not strip individual choice from its citizens. Citizens should be able to make the choice and then live (or, in this case, not live) by the consequences.   Physician assisted suicide should be legalized in the United States.   This way it can be documented and cases like Sue Rodriquez and Terry Schiavo will not have to dominate the media but can rest in the peace that they deserve.Works CitedHorgan, John. â€Å" Right to Die.† Scientific American. May 1996.Murder.   Wikipedia. Retrieved 19 July 2006 from http://en.wikipedia.org/wiki/MurderReed, Christopher.   Ã¢â‚¬Å"Oregon Tackles Mercy Killing.† Globe and Mail.   June 27, 1997: A12.Robinson, B.A. Euthanasia and Physician Assisted Suicide.   Ontario Consultants on ReligiousTolerance.   January 19, 2006.   Retrieved 19 July 2006 fromhttp://www.religioustolerance.org/euthanas.htm

Friday, September 27, 2019

Insurance Law - Insurable Interest Essay Example | Topics and Well Written Essays - 750 words

Insurance Law - Insurable Interest - Essay Example Before insurance companies came up with regulations regarding issuance of policies people would take life policies on other people, and if the insured was to surpass the expected life expectancy, some insurers tended to â€Å"help them along† so as to get their claims. This presented moral hazards and created to need to come up with insurable interests. Analysis In property insurance when a policy is to be taken, insurance companies ensure that insurable interest is shown to the property. In a case where no loss was incurred, then the insurer is not paid anything (Evans 1912). Insurable interest also serves to reduce intentional losses and damage, before this was enforced, people used to take out policies on property and intentionally destroy the property so as to get the claim, but with insurable interest when the insurer has taken a policy on a property that they have an interest in, they are less likely to intentionally cause damage to it. This serves to significantly reduc e the number of bogus claims. The issue of valuation also arises, being that some policies will only pay of the value of the property even with insurable interest; the valuation question is still unresolved and highly controversial. The main difference in the application of insurable interest in property insurance and life insurance is that, when it comes to property, it proves essential. For example, if an insurance policy of 100.000 is taken on a house, at a premium of 300 per year. If the insurer doesn’t lose anything if the house is destroyed, then the insurer will be betting 300 every year that something happens to the house. Insurance policies should not be incentive for people to destroy property, just to claim. Non indemnity insurance, valued insurance, is when the policy holder is entitled to a certain amount if the insured property is damaged. If insured against fire, even if the fire does not do as much damage, the insurance still pays the claim. The contrast comes is life insurance where the insurance should change the insurable interest policy and change it with, the right to give consent, although this might be a bit complex, as in the example of someone who takes life insurance and sells it, as seen if the case of Arthur Kramer who took a life insurance policy of 56 million dollars and sold it to investors. When he died, his family could not claim anything, this led to long court battle for ownership. Life insurance, which engulfs other aspects as critical illnesses or accident, may be taken by a person on themselves for any amount. The law also allows one to take out a policy on a spouse or civil partner recognized by law (Dobbyn 2003). It does not however cater for natural affection or cohabitants. Therefore the law requires that for one to take a life insurance policy on another there must be reasonable interest, but this begs the question, how much interest? And how does one get to measure this? It comes down to the degree, which crea tes ambiguity. Although the law permits the insurance of a spouse, it does not have further specifications like, if the spouse is abusive, or is abused, should the allow for giving of consent. The law also holds that if you have pecuniary interest in a person you can take a life policy on them, for example business partner because the law will likely permit this, but then the business might fall, or a fallout occurs. Then there will be no more interest

Thursday, September 26, 2019

Argumentation Essay Example | Topics and Well Written Essays - 750 words - 1

Argumentation - Essay Example Critical analysis of these phenomena allows seeing some common prejudices. Men have the necessity to remain behind the mask of masculinity showing no emotions and being aggressive. Women have second roles and are supposed to be treated accordingly and that is why women have no power. These distorted narrative about man and women create many problems for both sexes as it turns out. And the essay is aimed to show which exact problems appear because of this. Boys are taught from the little age to be real men. However, what exactly being a real man means is usually learnt from media. And children unable to understand what is literal and what is not take everything for granted. For instance, Pixar was shooting cartoons with the leading characters being male only. Lonely male creatures in the company of male characters went off on some quest or fought villains in all the Pixar cartoons. Women played secondary roles or sometimes even become final achievements of the heroes. And boys along with girls learn that women cannot be leaders and cannot dream to be presidents. However, since when leadership skills are about power and not about the ability to think analytically and to find resolutions of the problems? And women are equally good in these tasks. Moreover, boys are taught to avoid emotions as emotions are perceived as female feature. However, avoiding real feelings leads to their suppression and to ruining any boy`s personality. The video â€Å"The mask you live in† shows that the results of such changes in psyche are pitiful. Boys are often diagnosed with behavioral disorders and receive medications as treatment, abuse alcohol and drugs and even commit suicides. They are also are more likely to become criminals since they always need to show their masculinity and aggression. The situation with girls is even more critical. Despite feministic movement girls have to fit the stereotypes of womanliness: be gentle and speechless.

Coca Cola Crisis in India 2003 Assignment Example | Topics and Well Written Essays - 1750 words

Coca Cola Crisis in India 2003 - Assignment Example It is important to note that this degree of trust is the cornerstone upon which any type of image recovery or customer trust will be built upon. Accordingly, these questions and answers will hinge upon building this degree of trust and seeking to engage key elements within the consumer base. Furthermore, an obvious recourse would be to attempt to re-engage the market with the understanding and belief that Coca Cola brand is investing all available energy and capital to remedy any quality control issues that might have existed previously. As a means towards accomplishing consumer trust on this matter, Coca Cola may wish to point to its civic activism within the recent past, both within India and around the world as a means to convince the shareholder of the serious nature in which Coca Cola takes such an action. As a means to accomplish both the long and the short term goals that have been mentioned, it will be incumbent upon Coca Cola to prove their overall level of seriousness by pr oviding demonstrable actions to the Indian marketplace that clear and decisive actions have been taken to remedy any prior shortfalls that may have been exhibited. How long would you evaluate the crisis? Unfortunately, a situation like the one that has been listed is not one that Coca Cola can recover from over the span of a few months or even years. Similarly, as anyone that is familiar with marketing will point out, the amount of time it takes to re-engage consumer trust and ensure the market that the firm is not typified by its most negative actions and the consequences thereof is a costly and time-intensive process. Due to the fact that the findings were so damning, it will take Coca Cola a very long period of time to both rectify the damage done to the brand’s image as well as to seek to effectively engage future consumers with the overall benefits of the brand. Although the process will not be quick or cheap, such is the responsibility of Coca Cola and defines any hope of increased future success within India. It should be noted that a great deal rests on the means by which Coca Cola attempts to re-engage its consumers.  Ã‚  

Wednesday, September 25, 2019

Article Essay Example | Topics and Well Written Essays - 500 words - 12

Article - Essay Example For this matter, the article has also cited various countries where the business performance has increased as result of established relationship between culture and relationship marketing. These countries include Brazil, India, Russia, and China. This article is important especially with the dawn to globalization. The aspect of culture cannot be overlooked as it exhibits both threat and opportunity dimensions. This article is instrumental in disregarding the threat dimension and taking advantage of the opportunities. This research has been conducted to specifically evaluate the role played by various cultural aspects that determine the effectiveness of relationship marketing. Mainly, the report has described each aspect as dimensions and analyzed each of them through experiments and extensive research. In this article, Stephen, Samaha, Joshua Beck, and Robert (2014) assert that accounting for culture is essential for effective international relationship marketing. According to the results they obtain from various researches, they have provided a theoretical insight into how and when culture dimension regulates specific joints in the relationship marketing framework. Accordingly, individualism (states isolating themselves from the rest of the world in a globalized concept) is significant as it suppresses many relationship building strategies. The article has also considered the Uncertainty avoidance concept. Accordingly, this is the extent to which a certain culture feels vulnerable to unknown situations. This dimension presents itself as a barrier as it prevents acceptance of new risks and flexibility. As such, it will prevent effectiveness of integrating a particular culture in the relationship marketing. On the other hand, Masculinity to femininity was found to be independent variable as far as RM is concerned. Similarly, the model used in the article predicts

Tuesday, September 24, 2019

Working Capital and Financial Environment Case Study

Working Capital and Financial Environment - Case Study Example in this case, the most important elements in the environment are the other actors involved either directly or indirectly with a production process. In assessing the internal environment, the professionals try to identify all the relevant actors paying attention to stated goals and strategies. Abbott and Merck requires huge financial resources on research and development and financial internal control helps to evaluate and analyze financial situation and investments risks. In 2006, Abbott has $24.11 billion revenue while Merck has $23.34 billion. Merck operating margin is 24.48% while in Abbott operating margin is 17.84% (Abbott Laboratories 2007; Merck and Co. 2007). Internal control suggests that all activities are reasonably under control from the perspective of costs. Cost variances can be controlled by establishing a good change control process and sticking to it. First, all requests for changes are documented. The requests describe the impact of the change on costs, the schedule , the technical integrity of the deliverable, and other work being carried out. Once they are properly formulated, they are reviewed by a panel of players who are charged with overseeing progress on the activities.

Monday, September 23, 2019

Change and Development in the English Language Essay - 1

Change and Development in the English Language - Essay Example The essay "Change and Development in the English Language" talks about the various socio-historical influences on the development of the Old English such as the separation of the land from the Continental influences, conversion of the English to Christianity, the assimilation of the Scandinavian colonizers on the English language, the veritable beehive of scholarly activity in England following its conversion to Christianity in the sixth century etc had pertinent linguistic effects which contributed to the development of Old English.In the development of the Old English, there were several socio-historical elements which influenced the linguistic progress of the language. The advent of the Angles, Saxons, Jutes, and Frisians in the British Island in the year 449 proved to be a major event in the history of the land and the language. They occupied Great Britain and converted the major population of the land to English speakers. The following separation of the land and language of the Old English from the influences of other Continental nations and languages helped in the development of a distinctive language in Great Britain. The external influence on this language cannot be ignored. It is of paramount relevance that the conversion of the English to Christianity was one of the major socio-historical influences that shaped Old English. Christianity introduced the influence of Latin on Old English and the linking of the English culture with mainstream Europe through the Synod of Whitby.

Sunday, September 22, 2019

Includes recommendations for banking in China Essay Example for Free

Includes recommendations for banking in China Essay The bank is progressively upgrading its services and is attempting to match the best practices in the banking industry. This is evident from its Factoring programme for businesses. This enables business people to assign receivables to Bank of China and in turn they are provided with all facilities for collection, finance of trade, risk control and ledger sales management. In addition there is easy finance on production of delivery of goods, provision of capital at low cost, protection of credit to the seller despite any financial difficulty of the buyer, thus in some cases it will be the buyer also who will be benefiting along with the seller in case Factoring is undertaken. The Factoring services include export and import factoring as well export and domestic invoice discounting and domestic full factoring. Being the first and the largest factoring services provider in China’s banking sector, it has build extensive experience in this field and therefore will provide assured services. (Factoring, 2006). BOC has developed partnerships with large state held Chinese corporations such as the oil and petroleum company China National Petroleum Corporation. This will add value to its global business and create partnerships for growth. Security and risk management in Bank of China is dependent on its corporate governance policy. This is determined and controlled by the board of directors which oversees the overall operation and administration. As per standard norms of banks, committees are appointed to supervise various banking functions which include those for strategic planning, audit, risk management, personnel and remuneration and transaction controls. (Governance, 2006). The various stake holders in the bank include apart from the state government, the share holders, a board of directors, in which the posts of Chairman and President are said to be separate, a board o f supervisors and senior management. (Governance, 2006). The large quantum of non performing assets and a state control however does not immediately contribute to confidence in this area. The Bank is prone to provide for areas which are determined by the Central government and to that extent its policies are not ruled by the needs of ensuring profitability and efficiency. The picture in China is however continuously changing and greater progress in this sphere is anticipated in the future. HSBC exploits it legacy of banking in China to effect as it has been present in the Middle Kingdom since 1865. (HSBC China, 2006). The Bank provides the customers the advantage of being a single banker for domestic as well as foreign banking services thereby providing it convenience, speed, security and assurance. (HSBC China, 2006). HSBC is seen to operate at an entirely different level. The products, services and processes for the customers have been well established by the bank. It is now marketing these facilities to provide growth both in the personal and business banking sectors. Modern banking as practiced by HSBC is not only creating facilities such as automated teller and cash machines but actually recognizing the benefits of customers using these. This leads banks as HSBC to sponsor various gift schemes for users who use cash machines or pay their bills online. This indicates that services are not mere conveniences but offers which enable the bank to actually increase its efficiency. Then there are services such as money managers for the business, high interest deposit bonds, money market account and clients deposit account which enables pooling of money in a single account. HSBC also manages pensions of employers for a business as well for individuals. For business there are other factilities that are being provided such as business internet banking as well as HSBCnet which provides larger companies with a complete range of services on the internet, invoice finance, Against the internal growth outlook of Bank of China, HSBC is seeking more challenges externally as the Worlds local bank and is investing in many developing countries such as Vietnam, Saudi Arabia and even Iraq. (Schuman, 2006). The low penetration of modern banking systems services for example credit cards in China which for a 1. 3 billion population has only 10 million card holders has promised greater possibility and scope for banks such as HSBC. While HSBC sees itself as the Worlds local bank, the BOC wants to seek primacy in Chinese banking by providing assistance in doing business globally. Thus there is a difference in the focus of both the banks. This also underlines an essential difference in the states of the Chinese banking industry vis a vis global banking conglomerates as HSBC. The Chinese banking industry is still in its nascence and thus sees itself as a provider of financial services to its domestic clientele be it personal or corporate to operate internationally. On the other hand HSBC sees itself as a bank for global banking regardless of the nationality of its clients. The Bank of China will have to face these challenges in the future in a very cohesive manner. Bank of China is well established domestically as well as globally. It can conduct sustained operations as it has adequate experience and exposure to varied political, economic and financial regimes. The global orientation of the bank is particularly favorable for its sustained growth and expansion in the future. It can thus provide the lead to other banks in China.

Saturday, September 21, 2019

Motivation

Motivation Why are there multiple theories of motivation in organisational behaviour? Firstly I believe that we need to understand what motivation is before we can understand why there are lots of motivational theories. ‘Motivation comes from the Latin word movere, meaning ‘to move (kreitner R., kinicki A., Buelens M., 2002, p: 176) which means as fact, need, emotion and organic state which encourages a person to take an action. A persons performance at work is affected by several individual factors (Personality, attitudes and beliefs, motivation, perception) but in particular, by Motivation. The dictionary defines motivation as â€Å"the reason why somebody does something or behaves in a particular way† (Oxford Advanced Learners Dictionary of Current English, 2000, p1128). Many theorists over the years starting from the industrial revolution have analysed what makes workers work harder. This essay will illustrate why there are multiple theories of motivation I will be looking at two theories Maslows hierarchy and Hertzbergs two factor theories to try to determine why there is a need to have so many theories of motivation. Many organisations face difficulties when trying to motivate their staff. If the employees are motivated the company is likely to be more successful. To be able to understand motivation and the way it works, we have to understand human nature itself, managers also need to understand the work effort motivation cycle as to not loose there staff to more exciting rewarding and satisfying roles else were.( French, R., et al, 2008, Organizational Behaviour p157) There has to be effective management and leadership to motivate staff. Many companies believe that pay is the prime motivator; however people may want to exceed, receive acknowledgment for there efforts, they may want to feel a part of a group and also want to feel a heightened sense of worth at the workplace. This is where empowerment plays a very important part in a companys progression. ( French, R., et al, 2008, Organizational Behaviour. p 156) â€Å"Empowerment is the process by which managers delegate power to employees to motivate greater responsibility in balancing the achievement of both personal and organisational goals†. (Ref.- Chapter 4: Motivation and Empowerment page 184French, R. ,et al, 2008, Organizational Behaviour. Chichester: Wiley) By empowering employees this will make the staff more satisfied, productive and motivated throughout their working hours. Throughout the years many theorists have tried to explain what motivation is by designing theories describing how managers should stimulate their staff. (French, R. et al.,2008, Organizational Behaviour pp157-159) There are two main types of motivation theories content and process theories, the content theories look at the needs that individuals have, it includes 4 component theories: Maslows hierarchy of needs model, Alderfers modified need hierarchy model, McClellands achievement motivation theory and Herzbergs two-factor theories. The Process Theories are a understanding of the thought process that influence behaviour. The major process theories of motivation include Vrooms expectancy theory, goal-setting theory, and reinforcement theory and Adams equity theory. (French, R et al, 2008 Organizational Behaviour p160) Abraham Maslow has a structure which he has called the hierarchy of needs. There are five basic needs, which people are supposed to uphold. These are physiological, safety, social, esteem and self-actualization. (French, R et al, 2008 Organizational Behaviour p161) Physiological needs are food, drink, shelter and sex, Safety needs are the security and protection from physical and emotional harm. Social needs refer to a need for love. That means a person will strive for good relationships with people and a place within there group. .(Wilson, F M(2004) Organizational Behaviour and work) The needs that Maslow has at the bottom of the pyramid are based on basic needs concerned with survival or lower order needs, and these must be satisfied before a person can go to the next level on the hierarchy of needs until self actualization which Maslow argued that although everybody is able to, not many reach this level. (Wilson, F M (2004) Organizational Behaviour and work) While Maslows theory seems to make sense at first, there is little to show that a strict hierarchy works in every day working life. In fact research contradicts the order of needs because in some cultures they tend to put social needs before any other need. Maslows hierarchy also has trouble explaining cases such as the â€Å"starving artist† where a individual will neglect there physical needs to gain a spiritual need. Maslow also suggests that one need is satisfied at a time where there is no evidence this is true. In all motivation theories there are always advantages and disadvantages, Maslow has been critical of his theory himself, in a statement he said: â€Å"My motivation theory was published 20 years ago and in all that time nobody repeated it, or tested, or really analyzed it or criticised it. They just used it, swallowed it whole with only the minor modification† Ref- Wilson, F.M (2004). Organisational behaviour and work. Oxford University press, page146 (Lowry 1982:6 Clayton Alderfer proposed the ERG theory, which is very similar to Maslows theory, it also describes needs as a hierarchy. The letters ERG stand for three levels of needs: Existence, Relatedness, and Growth. This theory is based on the work of Maslow, so it has a lot which is similar with it but it also differs in some important aspects. He argues that Maslows theory is not flexible and as a result of this people may become frustrated as they are not able to move to the next stage. Alderfer has minimized Maslows 5 level theories into 3 levels; this theory is more flexible as people are able to go up and down the hierarchy if their needs keep changing. (French, R et al, 2008 Organizational Behaviour p160) Fredrick Herzbergs hygiene-motivation theory, Frederick Hertzberg put forward the idea that certain factors in the workplace cause job satisfaction, while others lead to dissatisfaction, he proposed the Two Factor theory of human motivation in the workplace, he believed that man has two sets of needs one as an animal to avoid pain and the second as a human being to grow psychologically. Hertzberg believes that the growth or the motivator factors such as achievement, the work its self, responsibility and advancement are the primary cause of job satisfaction. Hygiene factors the dissatisfiers using the term hygiene are considered maintenance factors that are to avoid dissatisfaction but by themselves do not provide satisfaction company policy, administration, supervision interpersonal relationships, working conditions salary status and security. Hertzberg used two open ended questions ‘tell me about a time when you felt exceptionally good about your job. and ‘tell me about a time when you felt exceptionally bad about your job.Herzberg analysed a diverse range of employees twelve different investigations informed the theory.( Herzberg et al 1959,. Wilson, F M(2004) Organizational Behaviour and work) There have been many criticisms of this theory one being some researchers have used other methods and have not been able to confirm the theory there for the theory is said to be method-bound as only Hertzbergs original method is able to support the theory. Other critics found it to be too convenient that Hertzbergs theory fits so neatly into two boxes, intrinsic contributing to job satisfaction and extrinsic to dissatisfaction. In the study by Ewan (1963) found that sometimes the hygiene factor, dissatisfies acted as satisfiers and satisfiers, motivators caused both satisfaction and dissatisfaction. (Wilson, F M(2004) Organizational Behaviour and work) Looking briefly at the most well known motivational theories David McClelland Need for Achievement Theory proposed that an individuals specific needs are acquired over time and are shaped by a persons life experiences. Most of the needs can be classed as achievement, affiliation, or power. A persons motivation in a certain job is influenced by these three needs. McCelland believed that having the right resources available such as raw materials, time, having the right skills to do the job and also having the necessary support to get the job done like supervisor support, or correct information on the job, McCelland believed that even if two of the three were met that there would still not be positive motivation and all three must be met to achieve positive motivation. (French, R et al, 2008 Organizational Behaviour pp163- 165) The expectancy theory of motivation is by Victor Vroom. Victor Vroom is very different to Maslow and Hertzberg, Vroom focuses on outcomes not on needs. Expectancy is the belief that more effort will lead to better performance. (French, R et al, 2008 Organizational Behaviour pp172- 174) Looking closely at the theories of motivation I believe that there are multiple theories of motivation as there is neither a right or wrong theory all seem to out line the basics of motivation weather it is in a hierarchy or set in two boxes we all have a need for the basics in life plus achievement, recognition and we all would be happier and more motivated to work in better conditions, I believe that a person has each one of these needs at or maybe many at a time so there for many theories are essential to get a wider knowledge of motivation and how to motivate an individual at work.

Friday, September 20, 2019

Examining Matrices Of Relation

Examining Matrices Of Relation History of matrix had to be going back to the ancient times, because it is not applied until 1850. Matrix is the Latin word for womb, and is same in English. It can also mean something is formed or produced. Matrix was introdeced by James Joseph Sylvester,who have brief career at the University of Virginia, which came to an abrupt end after an enraged Sylvester, hit a newspaper-reading student with a sword stick and fled the country, believing he had killed the student! An important Chinese text from between 300 BC and AD 200, Nine Chapters of the Mathematical Art (Chiu Chang Suan Shu), gives the use in matrix method to solve simultaneous equations. And this is origins of matrix. Too much and not enough, is the concept of a determinant first appears in the treatises seventh chapter. These concepts is invented nearly two millennia before Japanese mathematician Seki Kowa in 1683 or his German contemporary Gottfried Leibnitz (who is also credited with the invention of differential calculus, separately from but simultaneously with Isaac Newton) found it and use it widely. In chapter eight Methods of rectangular arrays, using a counting board that is mathematically identical to the modern matrix method of solution to solve the simultaneous equation is more widely use. This is also called Gaussian elimination outlined by Carl Friedrich Gauss (1777-1855). Matrices has its important in ancient China and today it is not only solve simultaneous equation, but also for designing the computer games graphics, describing the quantum mechanics of atomic structure, analysing relationships, and even plotting complicated dance steps! Background of Matrices More and larger with amount of numerical data, measurements of one form or another gathered from their lab is confronting the scientists. However the mere collecting and recording data have been collected, data must analyze and interpreted. And here, matrix algebra is useful in both simplifying and promoting much development of many analysis methods but also in organizing computer techniques to execute those methods and present its results. Definition An M x N matrix is a rectangular array of members having m rows and n columns. The number comprising the array are called element of the matrix. The numbers m and n are called dimensions of the matrix. The set of all m x n matrices is denoted by Rm x n. We shall ordinarily denote a matrix by an upper case Latin or Greek letter, whenever possible, an element of a matrix will be denoted by the corresponding lower case Greek letter with two subscripts, the first specifying the row that contains the element and the second the column. ( ) ( ) Thus the 3 x 3 matrix has the form: A3x3 ( ) The matrix is read as A with r rows and c columns has order r x c (read as r by c) or Ar x c And 4 x 3 matrix has the form: ( ) In some applications, notably those involving partitioned matrices, considerable notational simplification can achieved by permitting matrices with one or both its dimensions zero. Such matrices will be said to be void. Row and column matrix The n x 1 matrix A has the form Such matrix is called a column vector which has a single column only, which looks exactly like a member of Rn. We shall not distinguish between n x 1 matrices and n-vectors; they will de denoted by upper or lower case Latin letters as convenience dictates. Example: the 1 x n matrix R has the form R= (à Ã‚ 11, à Ã‚ 12, à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ , à Ã‚ 1n). R= (5, 6, 7, à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ ,n) Such a matrix will be called a row vector. A well-organized notation is that of denoting matrices by uppercase letters and their elements by the lowercase counterparts with appropriate subscripts. Vectors are denoted by lowercase letters, often from the end of the alphabet, using the prime superscript to distinguish a row vector from a column vector. Thus A is a column vector and R is a row vector, ÃŽÂ » is use for scalar whereby scalar represent a single number such as 2,-4 Equal matrices For two matrices to be equal, every single element in the first matrix must be equal to the corresponding element in the other matrix. So these two matrices are equal: = But these two are not: Of course this means that if two matrices are equal, then they must have the same numbers of rows and columns as each other. So a 33 matrix could never be equal to a 24 matrix, for instance. Also remember that each element must be equal to that element in the other matrix, so its no good if all the values are there but in different places: Combining the ideas of subtraction and equality leads to the definition of zero matrix algebra. For when A=B , then aij =bij And so A B = { aij bij} = { 0 }=0 Which mean in matrix are Square Matrix A square matrix is a matrix which has the same number of rows and columns. An m x n matrix A is said to be a square matrix if m = n Example: number of rows = number of columns. *provided no ambiguity In the sequel the dimensions and properties of a matrix will often be determined by context. As an example of this, the statement that A is of order n carries the implication that A is square. An n-by-n matrix is known as a square matrix of order n. Any two square matrices of the same order can be added and multiplied. A square matrix A is called invertible or non-singular if there exists a matrix B such that AB = I This is equivalent to BA = I Moreover, if B exists, it is unique and is called the inverse matrix of A, denoted Aà ¢Ã‹â€ Ã¢â‚¬â„¢1. The entries Ai,i form the main diagonal of a matrix. The trace, TR(A) of a square matrix A is the sum of its diagonal entries. While, as mentioned above, matrix multiplication is not commutative, the trace of the product of two matrices is independent of the order of the factors: TR (AB) = TR (BA). Also, the trace of a matrix is equal to that of its transpose, i.e. TR(A) = TR(AT). If all entries outside the main diagonal are zero, A is called a diagonal matrix. If only all entries above (below) the main diagonal are zero, A is called a lower triangular matrix (upper triangular matrix, respectively). For example, if n = 3, they look like (Diagonal), (lower) and (upper triangular matrix). Properties of Square Matrix à ¢Ã¢â€š ¬Ã‚ ¢ Any two square matrices of the same order can be added. à ¢Ã¢â€š ¬Ã‚ ¢ Any two square matrices of the same order can be multiplied. à ¢Ã¢â€š ¬Ã‚ ¢ A square matrix A is called invertible or non-singular if there exists a matrix B such that AB = In. Examples for Square Matrix For example: A = is a square matrix of order 3 ÃÆ'- 3. Relations of matrices If R is a relation from X to Y and x1, . . . , xm is an ordering of the elements of X and y1, . . . , yn is an ordering of the elements of Y , the matrix A of R is obtained by defining Aij = 1 if xi R yj and 0 otherwise. Note that the matrix of R depends on the orderings of X and Y. Example: The matrix of the relation R = {(1, a), (3, c), (5, d), (1, b)} From X = {1, 2, 3, 4, 5} to Y = {a, b, c, d, e} relative to the orderings 1, 2, 3, 4, 5 and a, b, c, d, e is Example: We see from the matrix in the first example that the elements (1, a), (3, c), (5, d), (1, b) are in the relation because those entries in the matrix are 1. We also see that the domain is {1, 3, 5} because those rows contain at least one 1, and the range is {a, b, c, d} because those columns contain at least one. Symmetric and anti-symmetric Let R be a relation on a set X, let x1, . . . , xn be an ordering of X, and let A be the matrix of R where the ordering x1, . . . , xn is used for both the rows and columns. Then R is reflexive if and only if the main diagonal of A consists of all 1s (i.e., Aii = 1 for all i). R is symmetric if and only if A is symmetric (i.e., Aij = Aji for all i and j). R is anti-symmetric if and only if for all i = j, Aij and Aji are not both equal to 1. R is transitive if and only if whenever A2 ij is nonzero, Aij is also nonzero. Example: The matrix of the relation R = {(1, 1), (1, 2), (1, 3), (2, 2), (2, 3), (3, 3), (4, 3)} on {1, 2, 3, 4} relative to the ordering 1, 2, 3, 4 is A = We see that R is not reflexive because As main diagonal contains a 0. R is not symmetric because A is not symmetric; for example, A12 = 1, but A21 = 0. R is anti-symmetric because for all i = j, Aij and Aji are not both equal to 1. Reflexive Matrices In functional analysis, reflexive operator is an operator that has enough invariant subspaces to characterize it. The matrices that obey the reflexive rules also called ref matrices. A relation is reflexive if and only if it contains (x,x) for all x in the base set. Nest algebras are examples of reflexive matrices. In dimensions or spaces of matrices, finite dimensions are the matrices of a given size whose nonzero entries lie in an upper-triangular pattern. This 2 by 2 matrices is NOT a reflexive matrices The matrix of the relation which is reflexive is R={(a, a),(b,b),(c,c),(d,d),(b,c),(c,b)}on {a,b,c,d}, relative to the ordering a,b,c,d is Or In generally reflexive matrices are in the case if and only if it contains (x,x) for all x in the base set. Transitive Matrices When we talk about transitive matrices, we have to compare the A(matrix) to the A2(matrix). Whenever the element in the A is nonzero then the element in theA2 have to be nonzero or vice versa to show that the matrices is transitive. For examples of transitive matrices: Then the A2 is Now we can have a look where all the element aij in A and A2 is either both nonzero or both are zero. Another example: Conclusion In conclusion, the matrix we are discussed previous is useful and powerful in the mathematical analysis and collecting data. Besides the simultaneous equations, the characteristic of the matrices are useful in the programming where we putting in array that is a matrix also to store the data. Lastly, the matrices are playing very important role in the computer science and applied mathematics. So we can manage well of matrix, then we can play easy in computer science but the matrix is not easy to understand whereby these few pages of discussion and characteristic just a minor part of matrix. With this mini project, we know more about matrix and if we need to know all about how it uses in the computer science subject, I personally think that it will be difficult as it can be very complicated.

Thursday, September 19, 2019

Symbolism and Realism Essay -- Symbolism Realism Literature Essays

Symbolism and Realism Symbolism and Realism were distinct but parallel literary movements that swept Europe and much of the world in the late 19th century. Social order was one of the main concerns of Symbolists and Realists, which reflects the unprecedented growth of the middle class and its values across Europe during that time period. Morality and ambition were homogenized – and, in some cases, institutionalized – to a degree never before seen in civilized society, and many intellectuals and artists saw this homogenization as a conformist social force that threatened individual perspective. Thus, Symbolists’ and Realists’ works lashed out against social institutions and values and were particularly concerned about the domestic sphere, because of its dependence on social norms and shaping effect on individual perceptions; were disturbed by the decaying effects of conformism; and were troubled by the disconnection between modern individuals. Moreover, Symbolists and Realists a rgue that these three themes of domesticity, decay, and disconnection are linked, a connection explored especially in the Symbolist Charles Baudelaire’s poem, â€Å"Spleen LXVIII† (1862), in the Realist Leo Tolstoy’s novella, The Death of Ivan Ilyich (1886), and in the Realist Anton Chekhov’s play, The Cherry Orchard (1903). Specifically, these authors argue that the various forms of modern domestic life lead to the ruination of substantial interpersonal connection. As long as one drowns in life’s tedium, asserts Baudelaire, the human experience and one’s connections with others decay. â€Å"Spleen LXVIII† describes a winter rain that pours â€Å"On corpses fading in the near graveyard, On foggy suburbs pours life’s tedium† (1550.II 3, 4), and, speaking of a ... ...orms in one way or another destroy one’s connections with other human beings. Not only does such focus on forms defy the social nature of humanity, creating generations of socially approved outcasts, but also it severely restricts the individual’s perspective by forcing it to conform to preordained, rigid structures, thereby suffocating the blessing of human creativity. Such restriction does not belong to modern civilization alone, however; creativity never exists without limit, for every society upholds rules of conduct that its members are taught to obey. Therefore, contemporary conformity is not new but rather reborn and strengthened. Correspondingly, the task of the modern citizen is ancient, but difficult in its originality: to strike a balance between creativity and conformity, between pursuing our own diverse forms and following the accepted forms of society.

Wednesday, September 18, 2019

Hard Times - The Theme of Education Essay -- English Literature

Hard Times - The Theme of Education In this piece I intend to explain how Dickens is trying to represent education in the Victorian era and how he feels about the style of teaching that is widely used during his times. I also intend to make references to how the representation of Victorian schools by Dickens compares, historically to the actual conditions in a school from the Victorian era. As soon as the book begins we are introduced to a style of teaching that is dependent only on facts. One of the main characters of the novel is Thomas Gradgrind and he is the enforcer of this utilitarian style of education and is described as a man who is very strict. Dickens introduces us to this character with a description of his most central feature: his monotone appearance and attitude. â€Å"Stick to facts, sir!† This exclamation suggests that the character likes to shout and sound firm. The short, punchy sentence suggests an assertive and strong character. Dickens also makes Gradgrind seem boring and grating by the gravelly and rough sound of his name and how it is pronounced. â€Å"Grind†, in particular suggests the grindstone, and flogging away at work constantly and is associated with the mechanical, repetitive drudgery of the factory system. Dickens also employs the outer appearance of Gradgrind to parallel the inner personality of Gradgrind, â€Å"Square coat, square shoulders and square legs†. This seems to highlight Gradgrind’s nature of unrelenting rigidity. Dickens also uses tricolons to really exaggerate the impression of this character being dull, boring and old fashioned. As a result, his educational ideas are seen to be dull and boring too. We get the overall impression from Dickens that he doesn’t ... ...stressed by the ‘factory’ style approach to the children and their education. He exaggerates this to show the ‘production line’ attitude to education is wrong and does not help the child. He believes that the school in Hard Times treats all children the same and there is no exception to the rule. He sees it as a rather utilitarian style approach, a ‘one size fits all’ kind of regime and believes that this system has obviously failed. His distress seem to turn to the kind of anger a activist would show in a protest and in a way his writing of the book is his form of a protest which is made through humour. He strongly believes that children at such an early stage in their childhood are too young to be exposed to such a formal and rigorous style of education and should instead be allowed to express their emotions and have their youthful imaginations nurtured.

Tuesday, September 17, 2019

Contextual Differences Analysis of the Differences between Fassbinder’s All That Heaven Allows and Sirk’s Ali

The high price of gas at the pump has many Americans looking for alternates to their gas powered vehicles. One of the most popular option right now is a hybrid vehicle. The question that comes to mind is, are hybrid vehicles worth it? With record high gas prices due to the price of oil, most car owners out there have major concerns over their gas usage. Over the past ten years, the cost of gasoline has grown 250%! The price of oil has doubled since January of this year. The high prices of oil and gas is the driving factor for most of the people to trade their gas powered vehicles for hybrid vehicles.These vehicles promise to give consumers more mileage per gallon, the truth is that only a few vehicles currently in the market actually make any sort of financial sense. There are quite a few issues with buying hybrid vehicles, even with gas prices at more than $4 a gallon. First, these vehicles are much higher in price than their gas powered counter part so, the premiums attached to the ir price tags do not justify extra mileage that you get. In some cases car dealers are selling popular vehicles at much higher prices than MSRP.Second, there are no laws and regulations controlling the technology, price, and the mileage per gallon required out of these vehicles. Currently, there are hybrid vehicles in the market that offer an improvement of 3MPG to 18 MPG over their gas powered counterpart. This is a huge range that needs to be controlled. Third, the demand of these vehicles is driving the prices of the vehicles even higher, if people knew that it would take many years for fuel savings to pay back the hybrid premium on many models, the demand on these models would be much lower, driving the prices down.The solutions that I would like to propose is the government to work with auto manufacturers to develop a standard for hybrid vehicles. This standard should control the minimum mileage offered per gallon, and control the premium allowed to be charged by the manufactur ers. There are vehicles in the market that offer only a marginal benefit over the gas powered vehicles and yet the manufacturers charge thousands of dollars premium. Background: Today people all around the world are facing unusually high oil price hikes.Oil has become so very expensive that people are trying all kinds of extreme measures to lower the price. The hike in price has affected every nation; the entire world is trying to find a way out of the soaring prices. Thanks to the oil prices, travel expenses have increased, not just flying being expensive, driving your own car is very expensive. The chart below shows a trend in oil prices since 1990 with some of the major events leading to this increase. Note that since January of 2007 the oil prices have increase by 162%.With high gas prices, hybrid cars are a more affordable option than ever in terms of gas mileage, but only a handful of hybrid cars make solid financial sense, and only for some consumers, according to a new study by NADAguides. com, a vehicle pricing and information website. Using current gas prices for ten major metropolitan areas, the company studied the number of miles needed to recoup the extra cost of buying a hybrid car over its gasoline-only counterpart.The study showed, for example, that a driver in Los Angeles, the city with the highest gas prices in the study, will break even about 18 percent faster than a driver in Houston, the city with the lowest gas prices, assuming both are driving the same miles. The study found that, even at today's high gas prices, only a handful of hybrid cars make financial sense for a consumer who buys a new car every five years or less and drives an average number of miles per year.Even at Los Angeles-area gas prices, there are only five hybrid cars that would allow consumers to recoup their additional investment before they sold the car, assuming they drive an average of 15,000 miles per year. In order of shortest time to break even, they are: 1. Toyo ta Camry Hybrid 2. Chevrolet Malibu Hybrid 3. Nissan Altima Hybrid 4. Toyota Prius 5. Honda Civic Hybrid Following is a chart of the top five hybrid cars with the greatest return on investment and the number of miles to break even in 10 major metropolitan areas at current gas prices.Issue: Even with gas prices at more than $4 per gallon, there are quite a few issues with buying hybrid vehicles. Issue 1: High Prices Hybrid vehicle prices are higher than their gas powered counterpart. The demand for these vehicles in the last year has increased a lot, increasing the prices even further. In some areas people are actually paying premium over MSRP and waiting for more than two years to get some vehicles.The price premium attached to the hybrid vehicles are just too great to be considered a cost savings relative to purchasing their gasoline counterpart. If people knew how long it would take them to pay off the increased premium the demand for the hybrid would be lower than what it is now, decreasing the prices. Issue 2: High Prices The second issue with the hybrid vehicles is that there are no laws and regulations controlling the technology, price, and the mileage per gallon required out of these vehicles.Currently, there are hybrid vehicles in the market that offer an improvement of just a few miles per gallon over their gas powered counterpart, yet the manufacturers are charging thousands more for the premium for a so called hybrid technology. The table shows the amount of time it would take a buyer to offset the hybrid premium by fuel savings. The table also shows the miles per gallon and annual gas savings. These numbers clearly show the need to have some regulations to control the miles per gallon offered and the amount of premium that is charged by the manufacturers.Let’s look at some vehicles: Starting with the worst of the bunch, the Lexus LS600H. The premium charges on this vehicle is about $19,000, yet it only offers about 20 to 22 miles per gallon. It would take almost a century to break even. The next worst seems to be the Saturn Aura which only offers an annual gas savings of $171. The best one seems to Toyota Prius, but this car is so popular these days that in some areas there is a wait list of two years. In areas where it’s available, the dealers are charging more than $5,000 over MSRP.Solution: ?Better education to customers about the ownership costs of a hybrid vehicle ? Government should offer incentives like tax break to buy hybrid vehicles ? Have a standard to develop hybrid vehicle to encourage mass production, bringing the vehicle prices to even less than current gas-powered vehicles ? Force auto makers to sell hybrid vehicles at no more than, about 10%, premium to the customers Conclusion: Reference: Web Site: Bespoke Investing Group – http://bespokeinvest. typepad. com/bespoke/

Monday, September 16, 2019

Facial Identification Of Driver Fatigue Health And Social Care Essay

Driver weariness is frequently one of the prima causes of traffic accidents. In this concluding twelvemonth undertaking, a computing machine vision attack which exploits the driver ‘s facial look is considered, utilizing a combination of the Viola-Jones face sensing technique and support vector machines to sort facial visual aspect and find the degree of weariness.Section 1: DescriptionIntroductionStatisticss show that driver weariness is frequently one of the prima causes of traffic accidents. Over the past few old ages, a batch of research and attempt has been put forth in planing systems that monitor both driver and driving public presentation. A computing machine vision attack which exploits the driver ‘s facial look is considered in this concluding twelvemonth undertaking. The Viola-Jones real-time object sensing model working on a boosted cascade of Haar ripple characteristics is adopted for face sensing. To find the degree of weariness, multiple characteristic cate gorization is so performed utilizing support vector machines. The motives for taking to develop the system in this mode are the rapid face sensing times coupled with the simple and inexpensive overall execution, avoiding the demand to put in expensive and complex hardware.Concise Literature ReviewThis subdivision gives a wide reappraisal of the literary work related to face sensing in fatigue monitoring systems and engineerings, concentrating peculiarly on what has been done in the field of driver weariness. In subdivision 1.2.1, several statistics of fatigue-related motor vehicle accidents are mentioned and analysed. Section 1.2.2 high spots some of the more successful systems ( both commercial and non-commercial ) that have been implemented in recent old ages. On the other manus, subdivision 1.2.3 nowadayss an enlightening overview of the algorithms and techniques typically used in the development of such systems, particularly those refering to both face and facial characteristic sensing. Representative plants for each of these methods will be included.Statisticss Related to Driver FatigueDriver weariness has been one of the chief causes of route accidents and human deaths in recent old ages, and in this subdivision an effort is made to foreground some of the more of import statistics that demonstrate this negative tendency. The National Highway Traffic Safety Administration ( NHTSA ) [ 1 ] estimations that 2-23 % of all vehicle clangs can be attributed to driver weariness. Every twelvemonth, around 100,000 traffic accidents and 71,000 hurts related to driver sleepiness are reported in the United States, out of which more than 1,300 are fatal [ 2 ] . The NHTSA [ 3 ] besides reports that in the twelvemonth 2005 entirely, there were about 5,000 route human deaths ( around 8.4 % ) which were caused either by driver inattention ( 5.8 % ) or sleepy and fatigued drive ( 2.6 % ) . Furthermore, 28 % of fatal traffic accidents were due to lane maintaining failure, one of the indirect effects of weariness on drivers, ensuing in the loss of 16,000 lives. Undoubtedly, truck drivers are more capable to tire chiefly because of the long hours travelled on main roads, taking to inevitable humdrum journeys. In fact, a survey by the U.S. National Transportation Safety Board ( NTSB ) [ 4 ] confirmed that weariness was the finding factor in 51 out of 87 instances of truck accidents. These dismaying statistics pointed to the demand to plan and implement systems capable of tracking and analyzing a driver ‘s facial features or organic structure provinces and giving a warning signal at the first noticeable marks of weariness to seek and forestall the likely happening of an accident. In the following subdivision of this literature reappraisal, a figure of these systems will be presented.Existing Fatigue Monitoring SystemsMany different attacks for systems undertaking the job of driver fatigue have been studied and implemented over the past few old ages. Earlier devices tended to be instead intrusive, necessitating physical contact to mensurate fatigue characteristics while driving. These characteristics included bosom rate variableness, analysis of encephalon signals every bit good as the driver ‘s physiological province. Other systems studied the relation of driver sleepiness to maneuvering clasp and vehicle motions, with some besides using lane tracking installations. However, the focal point nowadays is more towards independent non-intrusive systems that work in the background without deflecting the driver in any manner, able to observe and track caput and oculus motions by agencies of one or more cameras mounted on the vehicle ‘s splashboard. The bulk of merchandises tracking weariness have been designed for on-road vehicles, such as autos, trucks and engines, and these will be reviewed in the undermentioned subdivision. In Section 1.2.2.2, other types of weariness monitoring systems that have been deployed will be analysed.On-Road Fatigue Monitoring SystemsCommercially Implemented SystemsIn the system presented by Advanced Brain Monitoring Inc. [ 5 ] , a caput mounted device in the signifier of a baseball cap uses the encephalon ‘s EEG ( Electroencephalography ) signals to mensurate weariness. Two electrodes inside the baseball cap are connected to the driver ‘s scalp to capture these signals, directing them v ia wireless moving ridges to a processing device 20 pess off from the driver. Russian seller Neurocom marketed the Engine Driver Vigilance Telemetric Control System ( EDVTCS ) [ 6 ] for usage within the Russian railroad system. EDVTCS continuously track drivers ‘ physiological province by mensurating alterations in the electro cuticular activity ( EDA ) i.e. alterations in the tegument ‘s opposition to electricity based on the eccrine perspiration secretory organs of the human organic structure, located chiefly on the thenar of our custodies and the colloidal suspensions of our pess. One of the first non-intrusive driver weariness supervising systems was ASTiD ( Advisory System for Tired Drivers ) [ 7 ] . It consists of an up-to-date knowledge-base theoretical account exposing a 24-hour anticipation form sing the possibility of the driver traveling to kip piece at the wheel, and a guidance wheel detector system capable of placing humdrum driving intervals, such as those in main roads, every bit good as unusual maneuvering motions as a consequence of driver weariness. Lane trailing is another attack taken to place distraction forms while driving. SafeTRAC, by AssistWare Technology [ 8 ] , consists of a picture camera located on the windscreen of the vehicle ( confronting the route ) and a splashboard mounted having device to which it is connected. The camera is able to observe lane markers in roads and issues hearable, ocular or haptic warnings if fickle drive forms, such as changeless impetuss between lanes, are observed. Sing the issues encountered in earlier systems, more importance now started being given to systems that monitored driver head motions, face and facial characteristics. MINDS ( MicroNod Detection System ) , described in [ 9 ] , paths head place and motion, with caput nodding being the chief weariness characteristic used for observing micro-sleep ( short periods of distraction ) while driving. Head motion is tracked by an array of three capacitance detectors located merely above the driver ‘s cockpit. Yet another attack was taken by David Dinges and Richard Grace [ 10 ] at the Carnegie Mellon Research Institute ( CMRI ) in the development of the PERCLOS proctor, which determines the oculus closing per centum over clip for fatigue sensing. In [ 11 ] , PERCLOS is defined as the proportion of clip the eyes are closed 80 % or more for a specified clip interval. FaceLAB [ 12 ] focal points on both face and oculus trailing, mensurating PERCLOS ( PERcentage of oculus CLOSure over clip ) and analyzing water chickweeds in existent clip ( including wink frequence and wink continuance ) . A important difference from other systems is that the absolute place of the eyelid, instead than the occlusion of the student, is used to mensurate oculus closing, doing it much more accurate. The 2001 AWAKE undertaking of the European Union [ 13 ] focused specifically on driver weariness, integrating many of the above mentioned steps. The chief end of this undertaking, ( its acronym standing for System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic hazard Estimation ) , was to supply research on the real-time, non-intrusive monitoring of the driver ‘s current province and driving public presentation. Many spouses were involved in AWAKE, including developers, makers and providers of electronics, research institutes, universities, auto makers and terminal users. The undertaking ‘s initial ends were those of accomplishing over 90 % dependability, a lower than 1 % false dismay rate and a user credence rate transcending 70 % . Car fabrication companies, such as Toyota, Nissan and DaimlerChrysler [ 9 ] are besides in the procedure of developing their ain weariness supervising systems.Research Based SystemsMany research documents closely related to driver fatigue monitoring have been published in recent old ages. Assorted attacks have been proposed, among which skin coloring material information has been really popular. Smith [ 14 ] nowadayss a system based on skin coloring material predicates to find weariness from oculus wink rate and caput rotary motion information. Similarly, in the gaze way monitoring system proposed by Wahlstrom et Al. [ 15 ] , coloring material predicates are used to turn up the lip part by finding those pels that match the needed coloring material values. Face extraction by skin coloring material cleavage utilizing the normalized RGB skin coloring material theoretical account is adopted in both [ 16 ] and [ 17 ] . Veeraraghavan and Papanikolopoulos [ 16 ] developed a system to observ e forms of micro-sleep by continuously tracking the driver ‘s eyes. PERCLOS is the fatigue characteristic measured in Aryuanto and Limpraptono ‘s system [ 17 ] . Horng and Chen [ 18 ] attempted to utilize the HSI coloring material theoretical account to take the consequence of brightness from the image. Machine acquisition is another common attack to tire sensing. Yang et Al. [ 19 ] choose to follow a Bayesian Network based â€Å" probabilistic model † to find the fatigue degree. A Bayesian Network theoretical account is besides constructed in [ 20 ] , where Zhu and Lan track multiple ocular cues, including caput and oculus motions and facial looks via two cameras, one for the face and the other concentrating specifically on the eyes, every bit good as Infra-Red illuminators to illume up the needed countries of the face. A nervous web attack is adopted by D'Orazio et Al. [ 21 ] and RibariA†¡ et Al. [ 22 ] in their proposed systems. In [ 21 ] , the oculus is detected based on the border information of the flag, with its darker coloring material doing it much easier to turn up. A back extension nervous web is trained to sort the province of the eyes ( either unfastened or closed ) . On the other manus, in [ 22 ] , a intercrossed nervous web and a combination of the â€Å" HMAX theoretical account † and â€Å" Viola-Jones sensor † together with a Multi-Layer Perceptron ( MLP ) are used to turn up the face. The grade of caput rotary motion, oculus closing and oral cavity openness are the fatigue steps calculated. To sort driver public presentation informations, Liang et Al. [ 23 ] make usage of Support Vector Machines ( SVMs ) . They focus on cognitive ( mental ) , instead than ocular driver distractions. For fast face and facial characteristic sensing, the method proposed by Viola and Jones affecting a boosted cascade of characteristics based on Haar ripples is adopted in a figure of documents, including [ 24 ] and [ 25 ] . Often, a loanblend of techniques are used to obtain better consequences for driver weariness sensing. Saradadevi and Bajaj [ 26 ] usage Viola-Jones ‘ method for mouth sensing and SVMs to right sort normal and yawning oral cavity cases. On the contrary, the one presented by Narole and Bajaj [ 27 ] combines pixel-based skin coloring material cleavage for face sensing and a mixture of nervous webs and familial algorithms to optimally find the weariness index, with the nervous web being given as initial input values for oculus closing and oscitance rate.Other Fatigue Mo nitoring SystemsAs with drivers in autos, pilots in aircrafts are obviously capable to tire, chiefly due to the drawn-out flight continuances. NTI Inc. and Science Applications International Corporation ( SAIC ) [ 28 ] designed the Fatigue Avoidance Scheduling Tool ( FAST ) , a system intended to track and foretell weariness degrees for U.S. Air Force pilots, based on the SAFTE ( Sleep, Activity, Fatigue and Task Effectiveness ) theoretical account created by Dr. Steven Hursh. Another application in which weariness monitoring is utile is in the bar of Computer Vision Syndrome [ 29 ] , a status caused by working for drawn-out hours in forepart of show devices, such as computing machine proctors. Matsushita et Al. [ 30 ] besides developed a wearable weariness monitoring system which detects marks of weariness based on caput motions. The broad assortment of different applications developed to supervise weariness is an grounds of the turning importance of this field. The focal point in the following portion of the literature reappraisal will switch to the weariness analysis attack taken in this thesis: the sensing of faces and their characteristics in images. The implicit in methods and algorithms typically used in this procedure will be discussed.Reappraisal on Face and Facial Feature Detection TechniquesKnowledge-based methodsDetecting faces in knowledge-based techniques involves the encryption of a set of simple regulations specifying the features of the human face, including pixel strengths in the images and the places and correlativities between the different characteristics, since these are common to all human existences. In a knowledge-based method presented by Yang and Huang [ 31 ] , a hierarchy of grayscale images of different declarations together with three different classs of regulations are used. The images are analysed for possible face campaigners by using regulations that have to make with the cell strength distribution of the human face. An betterment to this multi-resolution method was proposed by Kotropoulos and Pitas [ 32 ] . Alternatively of ciphering the mean pixel strength of each cell, merely those for each image row and column are computed, organizing perpendicular and horizontal profiles severally. To vouch a high sensing rate, the regulations in knowledge-based methods must neither be excessively general nor excessively specific, and hence, the coevals of regulations for the face must be performed really carefully. Because of the complexness required in coding all possible face constellations, rule-based techniques do non provide for different face airss [ 33 ] , doing them decidedly inappropriate for weariness monitoring applications.Feature-based methodsFeature-based attacks to confront sensing differ in a important manner from rule-based techniques in that they foremost attempt to place a individual ‘s facial properties and later find whether the latter are valid plenty to represent a human face, ensuing in the sensing of that face.Facial FeaturesThe presence of faces in images is frequently determined by trying to observe facial characteristics such as the eyes, nose and mouth. In a method presented by Sirehoy [ 34 ] , the egg-shaped nature of the human face is used as the footing for face sensing in grayscale images with littered backgrounds. Due to the different visual aspects of facial characteristics in images, Leung et Al. [ 35 ] usage a combination of several local characteristic sensors utilizing Gaussian derivative filters together with a statistical theoretical account of the geometrical distances between these characteristics to guarantee accurate face localisation. Han et Al. [ 36 ] , on the other manus, usage morphological operations that focus chiefly on the oculus part in their efforts to observe faces, based on the logical thinking that this is the most consistent facial part in different light conditions. A more robust and flexible feature-based system was presented by Yow and Cipolla [ 37 ] . The theoretical account cognition of the face that is used screens a wider country, including the superciliums, eyes, nose and mouth. A figure of Partial Face Groups ( PFGs ) , tantamount to a subset of these characteristic points ( 4 ) , are used to provide for partial face occlusions.Face TextureAnother face cue that is used for sensing intents is its textural form, this being specific to worlds and hence easy discriminable from other forms. Manian and Ross [ 38 ] present an algorithm that uses the symmetricalness and uniformity of the facial form as the footing of sensing. Rikert et Al. [ 39 ] tackle texture-based sensing in a different manner, utilizing a statistical method that learns to correctly sort whether an image contains a face or non.Skin ColourMany plants related to human clamber coloring material as a face sensing cue have been presented in recent old ages. Detection can be either pixel-based or region-based. The former attack is normally taken, in which each pel is analysed and classified as either tegument or non-skin. Two chief picks are made during this procedure: the coloring material infinite and tegument modeling method. Harmonizing to [ 40 ] , the normalized RGB, HSV and YCrCb coloring material infinites are typically used to pattern skin coloring material. Normalized RGB [ 41 – 45 ] is reported to be consistent in different light conditions and face orientations. On the other manus, YCrCb [ 46 – 48 ] and HSV [ 49 – 51 ] are normally chosen since they specifically separate the luminosity and chrominance constituents of the images. In [ 40 ] , several other tegument patterning techniques normally adopted are mentioned.Template matching methodsAnother proposed method for face sensing involves the storage of forms of the face and its characteristics, which are so compared to existent face images and given a correlativity value ( i.e. the degree of similarity between the existent image and the stored form ) . The higher this value, the greater is the opportunity that the image contains a face. Works on templet fiting techniques in recent old ages have focused both on fixed and variable-size ( deformable ) templets.Fixed-size TemplatesFengjun et Al. [ 52 ] and Ping et Al. [ 53 ] usage a combination of skin coloring material cleavage and templet matching for face sensing. Two grayscale templets with predefined sizes – one covering the whole face and the other concentrating merely on the part incorporating the two eyes – are utilised in both systems. Fixed-size templets, although straightforward to implement, miss adaptability to different caput places since sensing is greatly affected by the orientation defined in the templet.Deformable TemplatesAn improved templet matching method is one in which the templet can be altered to better reflect the input images and therefore would be able to place a wider assortment of faces in different airss. Yuille et Al. [ 54 ] propose deformable oculus and mouth templet matching in their work. Initially, the templets are parameterized through pre-processing to bespeak the expected form of both characteristics. The work presented by Lanitis et Al. [ 55 ] besides parameterizes the templet s, concentrating on the coevals of flexible molded human face theoretical accounts through the usage of a â€Å" Point Distribution Model † ( PDM ) [ 56 ] which is trained on a figure of images per individual with characteristic fluctuations within and between faces.Appearance-based methodsRather than being based on a set of preset templets, appearance-based face sensing relies on machine larning techniques that identify the presence of faces and their major features after a procedure of developing on existent universe informations. One of the most widely adopted machine larning attacks for face sensing are nervous webs, chiefly because of the success they achieved in other applications affecting pattern acknowledgment. Rowley et Al. [ 57 ] propose a robust multi-layer multi-network nervous web that takes as input pre-processed 20Ãâ€"20 grayscale pel images to which a filter is applied at each pel place, returning a face correlativity value from -1 to 1. The concealed beds o f the nervous web are designed to supervise different shaped countries of the human face, such as both eyes utilizing a 20Ãâ€"5 pel window and single eyes and other characteristics with the 5Ãâ€"5 and 10Ãâ€"10 Windowss. The web so outputs another mark finding the presence or otherwise of a face in a peculiar window. Yang et Al. [ 58 ] establish their system on a Sparse Network of Winnows ( SNoW ) [ 59 ] . Two mark nodes ( â€Å" linear units † ) patterning face and non-face form characteristics are used in this instance. The active characteristics ( with binary representation ) in an input illustration are first identified and given as input to the web. The mark nodes are â€Å" coupled via leaden borders † to a subset of the characteristics. To update the weights for farther preparation, the Winnow update regulation method developed by Littlestone [ 60 ] is adopted. A additive categorization technique in the signifier of Support Vector Machines ( SVMs ) was used to observe faces in an application presented by Osuna et al [ 61 ] in 1997. While the bulk of machine acquisition attacks ( including nervous webs ) effort to take down the â€Å" empirical hazard † , i.e. the mistake value in the preparation procedure, SVMs attempt to cut down the upper edge of the expected generalisation mistake in a procedure called â€Å" structural hazard minimisation † . Viola and Jones [ 62 ] present a rapid object sensing system holding face sensing as its motive. A important difference from other proposed systems is that rectangular characteristics, instead than pels, nowadays in the inputted grayscale images are used as the bases for categorization. This has the consequence of increasing the velocity of the overall procedure. Viola and Jones ‘ method will be discussed in item in the following chapter of this thesis.Purposes and AimsFamiliarization with the OpenCV tool. Literature Review about bing systems and methods to be used in this Dissertation. Fast face sensing utilizing Viola-Jones technique. Execution of multiple facial characteristics used to find the fatigue degree. Application of Support Vector Machine classifier to observe unsafe state of affairss such as driver kiping etc. Real-time execution of the proposed methods within OpenCV.MethodsViola-Jones technique for face sensing. Support vector machines to sort facial visual aspect ( e.g. open/closed eye/mouth ) . Features to be taken into consideration: caput motion, oculus closing and frequence of oral cavity gap ( bespeaking yawning ) . Eye weariness steps include PERCLOS ( PERcentage Eye CLOSure over clip ) and AECS ( Average Eye Closure Speed ) .EvaluationComparing the developed system to other systems found in literature in footings of preciseness, callback and truth. Deducing some trial informations on which the algorithms will be tested. Test topics seeking out the application. Showing the consequences obtained.DeliverablesProgress Report. Review Report. 2 page abstract for ICT Final YearA Student Projects Exhibition. Presentation Slides and Poster. Spiral and difficult edge transcripts of the Dissertation Report. C++ application, preparation and testing resources.Section 2: Work PlanWork done so farCollected and read several documents related to bing driver weariness systems and face sensing in general. Completed the first bill of exchange of the literature reappraisal. Familiarized myself with the OpenCV environment. Used a webcam to capture two short cartridge holders inside a auto, one in sunny and the other in cloud-covered conditions. Collected 2000 positive and 4000 negative images for face sensing. Positive images: 1500 taken from FERET grayscale face database, the other 500 from the captured cartridge holders. Negative images: created a C++ application to randomly choice non-relevant countries of the frames of the two captured cartridge holders. Created another C++ application to be able to harvest the positive images to bespeak merely the needed rectangular countries, bring forthing a text file to be used in the preparation procedure. Used this information to bring forth a classifier for faces in XML format with OpenCV ‘s Haar preparation public-service corporation.SubtasksCompute truth, preciseness and callback values for the face sensing preparation. Trial with new picture cartridge holders and observing the consequences obtained. Perform Cross Validation. Train the classifier for oral cavities, once more utilizing positive and negative images. For oculus sensing, an already generated classifier will be used. Extract characteristics from face, oculus and mouth sensing. Integrate and utilize a C++ library for support vector machines, such as libSVM, to sort facial visual aspect. Write Abstract, Introduction, Methodology, Evaluation, Results, Future Work and Conclusion of the Dissertation Report. Write Review Report. Write 2 page abstract for ICT Final YearA Student Projects Exhibition. Work on Presentation Slides and Poster.Schedule ( Gantt Chart )Section 3: Mentions[ 1 ] D. Dinges, M. Mallis, G. Maislin and J. Powell ( 1998 ) . â€Å" Concluding study: Evaluation of Techniques for Ocular Measurement as an Index of Fatigue and the Basis for Alertness Management † , U.S. Dept. Transportation, National Highway Traffic Safety Administration, [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //ntl.bts.gov/lib/jpodocs/edlbrow/7d01! .pdf [ 2 ] National Highway Traffic Safety Administration ( 2005 ) . â€Å" NHTSA Vehicle Safety Rulemaking and Supporting Research Priorities: Calendar Old ages 2005-2009 † , [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //www.nhtsa.gov/cars/rules/rulings/priorityplan-2005.html [ 3 ] National Highway Traffic Safety Administration ( 2005 ) . â€Å" Traffic Safety Facts 2005: A Compilation of Motor Vehicle Crash Data from the Fatality Analysis Reporting System and the General Estimates System † , National Center for Statistics and Analysis, U.S. Dept. Transportation, [ online ] , Last accessed on 4th October 2010, Available at: hypertext transfer protocol: //www-nrd.nhtsa.dot.gov/pubs/tsf2005.pdf [ 4 ] Hall, Hammerschmidt and Francis ( 1995 ) . â€Å" Safety Recommendation † , National Transportation Safety Board, [ online ] , Last accessed on 21st December 2010, Available at: hypertext transfer protocol: //www.ntsb.gov/recs/letters/1995/H95_5D.pdf [ 5 ] J. Cavuoto, â€Å" Alertness Monitoring Devices Emerge from San Diego † , Neurotech Business Report, [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.neurotechreports.com/pages/alertness.html [ 6 ] J-S Co. Neurocom, â€Å" Engine Driver Vigilance Telemetric Control System EDVTCS † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.neurocom.ru/en2/pdf/edvtcs_adv_eng.pdf [ 7 ] Fatigue Management International, â€Å" ASTiD: Advisory System for Tired Drivers † , [ online ] , Last accessed on 22nd September 2010, Available at: hypertext transfer protocol: //www.fmig.org/ASTID % 20Information % 20Document.pdf [ 8 ] AssistWare Technology, â€Å" Tired of Confronting Another Night Entirely? SafeTRAC can assist † , [ online ] , Last accessed on 22nd September 2010, Available at: hypertext transfer protocol: //www.assistware.com/Downloads/SafeTRAC-Fleet % 20Datasheet.pdf [ 9 ] European Commission, Information Society Technologies ( 2002 ) . â€Å" System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic hazard Estimation † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.awake-eu.org/pdf/d1_1.pdf [ 10 ] D. F. Dinges and R. Grace ( 1998 ) . â€Å" PERCLOS: A Valid Psychophysiological Measure of Alertness As Assessed by Psychomotor Vigilance † , US Department of Transportation, Federal Highway Administration, [ online ] , Last accessed on 21st December 2010, Available at: hypertext transfer protocol: //www.fmcsa.dot.gov/documents/tb98-006.pdf [ 11 ] W. W. Wierwille ( 1994 ) . â€Å" Overview of Research on Driver Drowsiness Definition and Driver Drowsiness Detection † , 14th Technical Int. Conf. on Enhanced Safety of Drivers ( ESV ) , Munich, Germany, pp.23-26. [ 12 ] Sing Machines, â€Å" faceLAB 5 † , [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.seeingmachines.com/pdfs/brochures/faceLAB-5.pdf [ 13 ] E. Bekiaris ( 2004 ) . â€Å" AWAKE Project Aim and Objectives † , Road Safety Workshop, Balocco, Italy, [ online ] , Last accessed on 21st September 2010, Available at: hypertext transfer protocol: //www.awake-eu.org/pdf/aim_achievements.pdf [ 14 ] P. Smith, M. Shah and N. D. V. Lobo ( 2003 ) . â€Å" Determining Driver Visual Attention with One Camera † , IEEE Transactions on Intelligent Transportation Systems, Vol. 4, No. 4, pp. 205 – 218, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.4.842 & A ; rep=rep1 & A ; type=pdf [ 15 ] E. Wahlstrom, O. Masoud and N. Papanikolopoulos ( 2003 ) . â€Å" Vision Based Methods for Driver Monitoring † , IEEE Intelligent Transportation Systems Conf, pp. 903 – 908, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.3.4434 & A ; rep=rep1 & A ; type=pdf [ 16 ] H. Veeraraghavan and N. Papanikolopoulos ( 2001 ) . â€Å" Detecting Driver Fatigue Through the Use of Advanced Face Monitoring Techniques † , ITS Institute, Center for Transportation Studies, University of Minnesota, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //www.cts.umn.edu/pdf/CTS-01-05.pdf [ 17 ] Aryuanto and F. Y. Limpraptono ( 2009 ) . â€Å" A Vision Based System for Monitoring Driver Fatigue † , Department of Electrical Engineering, Institut Teknologi Nasional ( ITN ) Malang, Yogyakarta, Indonesia, [ online ] , Last accessed on 17th June 2010, Available at: hypertext transfer protocol: //aryuanto.files.wordpress.com/2008/10/teknoin09-1.pdf [ 18 ] W.-B. Horng and C.-Y. Chen ( 2009 ) . â€Å" Improved Driver Fatigue Detection System Based on Eye Tracking and Dynamic Template Matching † , Department of Computer Science and Information Engineering, Tamkang University, Taipei, Taiwan, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //dspace.lib.fcu.edu.tw/bitstream/2377/11188/1/ce07ics002008000132.pdf [ 19 ] J. H. Yang, Z.-H. Mao, L. Tijerina, T. Pilutti, J. F. Coughlin and E. Feron ( 2009 ) . â€Å" Detection of Driver Fatigue Caused by Sleep Deprivation † , IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, Vol. 39, No. 4, pp. 694 – 705, [ online ] , Last accessed on 16th September 2010, Available at: hypertext transfer protocol: //www.engr.pitt.edu/electrical/faculty-staff/mao/home/Papers/YMT09_DriverFatigue.pdf [ 20 ] Q. Ji, Z. Zhu and P. Lan ( 2004 ) . â€Å" Real-time Nonintrusive Monitoring and Prediction of Driver Fatigue † , IEEE Transactions on Vehicular Technology, Vol. 53, No. 4, pp. 1052 – 1068, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.2.4714 & A ; rep=rep1 & A ; type=pdf [ 21 ] T. D'Orazio, M. Leo, P. Spagnolo and C. Guaragnella ( 2004 ) . â€Å" A Neural System for Eye Detection in a Driver Vigilance Application † , Proceedings of the 7th International IEEE Conference on Intelligent Transportation Systems, pp. 320 – 325, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //pr.radom.net/~pgolabek/its/A nervous system for oculus sensing in a driver watchfulness application.pdf [ 22 ] S. RibariA†¡ , J. LovrencI?icI? and N. PavesI?icI? ( 2010 ) . â€Å" A Neural-Network-Based System for Monitoring Driver Fatigue † , 15th IEEE Mediterranean Electrotechnical Conference, pp. 1356 – 1361. [ 23 ] Y. Liang, M. L. Reyes and J. D. Lee ( 2007 ) . â€Å" Real-time Detection of Driver Cognitive Distraction Using Support Vector Machines † , IEEE Transactions on Intelligent Transportation Systems, Vol. 8, No. 2, pp. 340 – 350. [ 24 ] H. Ma, Z. Yang, Y. Song and P. Jia ( 2008 ) . â€Å" A Fast Method for Monitoring Driver Fatigue Using Monocular Camera † , Proceedings of the 11th Joint Conference on Information Sciences, Atlantis Press, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //www.atlantis-press.com/php/download_paper.php? id=1717 [ 25 ] T. Brandt, R. Stemmer, B. Mertsching and A. Rakotonirainy ( 2004 ) . â€Å" Low-cost Ocular Driver Monitoring System for Fatigue and Monotony † , 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 7, pp. 6451 – 6456, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.93.1899 & A ; rep=rep1 & A ; type=pdf [ 26 ] M. Saradadevi and P. R. Bajaj ( 2008 ) . â€Å" Driver Fatigue Detection utilizing Mouth and Yawning Analysis † , International Journal of Computer Science and Network Security, Vol. 8, No. 6, pp. 183 – 188, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //paper.ijcsns.org/07_book/200806/20080624.pdf [ 27 ] N. G. Narole and P. R. Bajaj ( 2009 ) . â€Å" A Neuro-Genetic System Design for Monitoring Driver ‘s Fatigue † , International Journal of Computer Science and Network Security, Vol. 9, No. 3, pp. 87 – 91, [ online ] , Last accessed on 28th July 2010, Available at: hypertext transfer protocol: //paper.ijcsns.org/07_book/200903/20090311.pdf [ 28 ] C. Trautvetter ( 2005 ) . â€Å" Software Scheduling Tool Fights Crewmember Fatigue † , Aviation International News, [ online ] , Last accessed on 20th September 2010, Available at: www.novasci.com/AIN-JL05.pdf [ 29 ] M. Divjak and H. Bischof ( 2009 ) . â€Å" Eye Blink Based Fatigue Detection for Prevention of Computer Vision Syndrome † , IAPR Conference on Machine Vision Applications, Keio University, Hiyoshi, Japan, [ online ] , Last accessed on 20th September 2010, Available at: hypertext transfer protocol: //www.icg.tugraz.at/Members/divjak/prework/MVA_2009_presentation % 20- % 20Divjak.pdf [ 30 ] S. Matsushita, A. Shiba and K. Nagashima ( 2006 ) . â€Å" A Wearable Fatigue Monitoring System – Application of Human-Computer Interaction Evaluation † , Proceedings of the seventh Australasian User Interface Conference, Vol. 50, [ online ] , Last accessed on 17th September 2010, Available at: hypertext transfer protocol: //crpit.com/confpapers/CRPITV50Matsushita.pdf [ 31 ] G. Yang and T. S. Huang ( 1994 ) . â€Å" Human Face Detection in Complex Background † , Pattern Recognition, Vol. 27, No. 1, pp. 53 – 63. [ 32 ] C. Kotropoulos and I. Pitas ( 1997 ) . â€Å" Rule-Based Face Detection in Frontal Views † , Proceedings of the International Conference on Acoustics, Speech and Signal Processing, Vol. 4, pp. 2537 – 2540, [ online ] , Last accessed on 16th October 2010, Available at: hypertext transfer protocol: //poseidon.csd.auth.gr/papers/PUBLISHED/CONFERENCE/pdf/Kotropoulos_ICASSP97.pdf [ 33 ] M.-H. Yang, D. J. Kriegman and N. Ahuja ( 2002 ) . â€Å" Detecting Faces in Images: A Survey † , IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 1, pp. 34 – 58, [ online ] , Last accessed on 16th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.63.7658 & A ; rep=rep1 & A ; type=pdf [ 34 ] S. A. Sirehoy ( 1993 ) . â€Å" Human Face Segmentation and Identification † , Computer Vision Laboratory, Center for Automation Research, University of Maryland, [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //drum.lib.umd.edu/bitstream/1903/400/2/CS-TR-3176.pdf [ 35 ] T. K. Leung, M. C. Burl and P. Perona ( 1995 ) . â€Å" Finding Faces in Cluttered Scenes utilizing Random Labelled Graph Matching † , Proceedings of the fifth International Conference on Computer Vision, Cambridge, Massachusetts, U.S.A. , [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.8710 & A ; rep=rep1 & A ; type=pdf [ 36 ] C.-C. Han, H.-Y. M. Liao, K.-C. Yu and L.-H. Chen ( 1996 ) . â€Å" Fast Face Detection via Morphology-based Pre-processing † , Proceedings of the 9th International Conference on Image Analysis and Processing, Florence, Italy, [ online ] , Last accessed on 25th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.29.4448 & A ; rep=rep1 & A ; type=pdf [ 37 ] K. C. Yow and R. Cipolla ( 1996 ) . â€Å" Feature-Based Human Face Detection † , Image and Vision Computing, Vol. 15, No. 9, pp. 713 – 735, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.28.5815 & A ; rep=rep1 & A ; type=pdf [ 38 ] V. Manian and A. Ross ( 2004 ) . â€Å" A Texture-based Approach to Face Detection † , Biometric Consortium Conference ( BCC ) , Crystal City, VA, [ online ] , Last accessed on 26th October 2010, Available at: hypertext transfer protocol: //www.csee.wvu.edu/~ross/pubs/RossFaceTexture_BCC04.pdf [ 39 ] T. D. Rikert, M. J. Jones and P. Viola ( 1999 ) . â€Å" A Texture-Based Statistical Model for Face Detection † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, [ online ] , Last accessed on 26th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.32.8916 & A ; rep=rep1 & A ; type=pdf [ 40 ] V. Vezhnevets, V. Sazonov and A. Andreeva ( 2003 ) . â€Å" A Survey on Pixel-Based Skin Color Detection Techniques † , GRAPHICON-2003, pp. 85-92, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.5.521 & A ; rep=rep1 & A ; type=pdf [ 41 ] D. Brown, I. Craw and J. Lewthwaite ( 2001 ) . â€Å" A SOM Based Approach to Skin Detection with Application in Real Time Systems † , Proceedings of the British Machine Vision Conference, [ online ] , Last accessed on 27th October 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.16.2675 & A ; rep=rep1 & A ; type=pdf [ 42 ] M. Soriano, B. Martinkauppi, S. Huovinen and M. Laaksonen ( 2000 ) . â€Å" Skin Detection in Video Under Changing Illumination Conditions † , Proceedings of the fifteenth International Conference on Pattern Recognition, pp. 839 – 842, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download ; jsessionid=751F3CF514D95B2D7C8C425A1753714B? doi=10.1.1.16.2582 & A ; rep=rep1 & A ; type=pdf [ 43 ] N. Oliver, A. P. Pentland and F. Berard ( 1997 ) . â€Å" LAFTER: Lips and Face Real Time Tracker † , Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition, pp. 123 – 129, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.50.9491 & A ; rep=rep1 & A ; type=pdf [ 44 ] J. Yang, W. Lu and A. Waibel ( 1998 ) . â€Å" Skin Color Modelling and Adaptation † , Proceedings of the Asian Conference on Computer Vision, pp. 687 – 694, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.44.8168 & A ; rep=rep1 & A ; type=pdf [ 45 ] L. Mostafa and S. Abdelazeem ( 2005 ) . â€Å" Face Detection Based on Skin Color Using Neural Networks † , Proceedings of the 1st International Conference on Graphics, Vision and Image Processing, Cairo, Egypt, pp. 53 – 58, [ online ] , Last accessed on 24th October 2010, Available at: hypertext transfer protocol: //www.icgst.com/GVIP05/papers/P1150535113.pdf [ 46 ] R.-L. Hsu, M. Abdel-Mottaleb and A. K. Jain ( 2002 ) . â€Å" Face Detection in Color Images † , IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 5, pp. 696 – 706, [ online ] , Last accessed on 30th August 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.4990 & A ; rep=rep1 & A ; type=pdf [ 47 ] J. Ahlberg ( 1999 ) . â€Å" A System for Face Localization and Facial Feature Extraction † , Technical Report, no. LiTH-ISY-R-2172, Linkoping University, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.43.7504 & A ; rep=rep1 & A ; type=pdf [ 48 ] D. Chai and A. Bouzerdoum ( 2000 ) . â€Å" A Bayesian Approach to Skin Color Classification in YCbCr Color Space † , IEEE TENCON 2000, Vol. 2, pp. 421 – 424, [ online ] , Last accessed on 13th November 2010, Available at: www.se.ecu.edu.au/~dchai/public/papers/tencon2000.pdf [ 49 ] S. J. McKenna, S. Gong and Y. Raja ( 1998 ) . â€Å" Modeling Facial Colour and Identity with Gaussian Mixtures † , Proceedings of Pattern Recognition, pp. 1883 – 1892, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.902 & A ; rep=rep1 & A ; type=pdf [ 50 ] L. Sigal, S. Sclaroff and V. Athitsos ( 2000 ) . â€Å" Estimation and Prediction of Evolving Color Distributions for Skin Segmentation Under Changing Illumination † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 152 – 159, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.1.9735 & A ; rep=rep1 & A ; type=pdf [ 51 ] L. Jordao, M. Perrone and J. P. Costeira ( 1999 ) . â€Å" Active Face and Feature Tracking † , Proceedings of the tenth International Conference on Image Analysis and Processing, pp. 572 – 576, [ online ] , Last accessed on 13th November 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.893 & A ; rep=rep1 & A ; type=pdf [ 52 ] L. Fengjun, A. Haizhou, L. Luhong and X. Guangyou ( 2000 ) . â€Å" Face Detection Based on Skin Color and Template Matching † , Proceedings of the 1st International Conference on Image and Graphics, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //202.197.191.206:8080/44/course/chap03/sourse/colorfacedetect.pdf [ 53 ] S. T. Y. Ping, C. H. Weng and B. Lau, â€Å" Face Detection Through Template Matching and Color Segmentation † , Stanford University, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.stanford.edu/class/ee368/Project_03/Project/reports/ee368group04.pdf [ 54 ] A. L. Yuille, P. W. Hallinan and D. S. Cohen ( 1992 ) . â€Å" Feature Extraction from Faces utilizing Deformable Templates † , International Journal of Computer Vision, Vol. 8, No. 2, pp. 99 – 111, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.ittc.ku.edu/~potetz/EECS_741/SuggestedReadings/Lecture_14_Yuille_DeformableTemplates_IJCV92.pdf [ 55 ] A. Lanitis, C. J. Taylor and T. F. Cootes ( 1995 ) . â€Å" An Automatic Face Identification System Using Flexible Appearance Models † , Image and Vision Computing, Vol. 13, No. 5, pp. 393 – 401, [ online ] , Last accessed on 14th November 2010, Available at: hypertext transfer protocol: //www.bmva.org/bmvc/1994/bmvc-94-006.pdf [ 56 ] T. F. Cootes, A. Hill, C. J. Taylor and J. Haslam ( 1994 ) . â€Å" The Use of Active Shape Models For Locating Structures in Medical Images † , Image and Vision Computing, Vol. 12, No. 6, pp. 355 – 366, [ online ] , Last accessed on 15th November 2010, Available at: hypertext transfer protocol: //www.sci.utah.edu/~gerig/CS7960-S2010/handouts/ivc95.pdf [ 57 ] H. A. Rowley, S. Baluja and T. Kanade ( 1998 ) . â€Å" Neural Network Based Face Detection † , IEEE Transactions On Pattern Analysis and Machine intelligence, Vol. 20, No. 1, pp. 23 – 38, [ online ] , Last accessed on 4th December 2010, Available at: hypertext transfer protocol: //citeseer.ist.psu.edu/viewdoc/download? doi=10.1.1.110.5546 & A ; rep=rep1 & A ; type=pdf [ 58 ] M.-H. Yang, D. Roth and N. Ahuja ( 2000 ) . â€Å" A SNoW-Based Face Detector † , Advances in Neural Information Processing Systems 12, MIT Press, pp. 855 – 861, [ online ] , Last accessed on 4th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.41.152 & A ; rep=rep1 & A ; type=pdf [ 59 ] N. Rizzolo ( 2005 ) . â€Å" SNoW: Sparse Network of Winnows † , Cognitive Computation Group, Department of Computer Science, University of Illinois at Urbana-Champaign, 2005, [ online – presentation ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //cogcomp.cs.illinois.edu/tutorial/SNoW.pdf [ 60 ] N. Littlestone ( 1988 ) . â€Å" Learning Quickly when Irrelevant Attributes Abound. A New Linear-threshold Algorithm † , Machine Learning 2, Kluwer Academic Publishers, pp. 285 – 318, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.130.9013 & A ; rep=rep1 & A ; type=pdf [ 61 ] E. Osuna, R. Freund and F. Girosi ( 1997 ) . â€Å" Training Support Vector Machines: An Application to Face Detection † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 130 – 136, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.9.6021 & A ; rep=rep1 & A ; type=pdf [ 62 ] P. Viola and M. Jones ( 2001 ) . â€Å" Rapid Object Detection utilizing a Boosted Cascade of Simple Features † , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 511 – 518, [ online ] , Last accessed on 5th December 2010, Available at: hypertext transfer protocol: //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.137.9386 & A ; rep=rep1 & A ; type=pdf