...Case As a consequence of policy change, a professor was reverted as lecturer and his immediate subordinate was elevated to professor and head of department cadre. A tremendous change in his approach and attitude towards colleagues as well as students was observed. How would you account for such change? Give your arguments. Solution: Sometimes there is internal movement within an organization when due to policy change, employees are promoted, transferred or demoted. In the case in question, as a result of policy change a professor has been reverted as lecturer and his immediate subordinate has been elevated to professor and head of department cadre. One can confidently say that this is a clear case of demotion. A demotion can be defined as a compulsory reduction in an employee’s rank or job title within the organizational hierarchy of a company, public service department or other body (Wikepedia, 2012). It is also the reassignment of a lower job to an employee with delegation of responsibilities and authority required to perform that lower job and normally a lower level pay. It is the direct opposite of promotion. A demotion may be done for a variety of reasons such as disciplinary purposes, reorganization of work, inability to perform at a higher rank, poor attendance, and poor attitude; therefore, it is in this light that most people view it as a punishment. When somebody is demoted he/she may be demoted within a department as in the case of the professor according to...
Words: 780 - Pages: 4
...strategy. (www.revolutioncleaners.com). A business with more than 50 employees, Wal-Mart, was founded in Arkansas in 1962 and became a public company in 1972. The company started with the plan help the low income earners live an enhanced life. Walmart operates in twenty eight different countries and has more than 2.1 million employees globally and is opening new branches almost daily, selling a variety of products earning over 540 billion profits annually. (walmartstores.com) Hierarchical organization. With less than 50 employees, the hierarchical organization of Revolution Cleaners is extremely straightforward. The company has an owner, managers, and employees. The owner/CEO is in highest ranking official in the business and he gives his orders and commands to the store managers who then pass on the information the employees. Communication in Revolution Cleaners is very efficient as the hierarchical structure uncomplicated as opposed to a larger organization, like Walmart. The hierarchical structure in small companies like Revolution Cleaners is effective, as the amount of employees affects the success of the organizational structure. The level of the management is simple making communication and decision making efficient and problem free. Based on the Revolution Cleaners website (and personal...
Words: 678 - Pages: 3
...topicmodels: An R Package for Fitting Topic Models Bettina Grun ¨ Johannes Kepler Universit¨t Linz a Kurt Hornik WU Wirtschaftsuniversit¨t Wien a Abstract This article is a (slightly) modified and shortened version of Gr¨n and Hornik (2011), u published in the Journal of Statistical Software. Topic models allow the probabilistic modeling of term frequency occurrences in documents. The fitted model can be used to estimate the similarity between documents as well as between a set of specified keywords using an additional layer of latent variables which are referred to as topics. The R package topicmodels provides basic infrastructure for fitting topic models based on data structures from the text mining package tm. The package includes interfaces to two algorithms for fitting topic models: the variational expectation-maximization algorithm provided by David M. Blei and co-authors and an algorithm using Gibbs sampling by Xuan-Hieu Phan and co-authors. Keywords: Gibbs sampling, R, text analysis, topic model, variational EM. 1. Introduction In machine learning and natural language processing topic models are generative models which provide a probabilistic framework for the term frequency occurrences in documents in a given corpus. Using only the term frequencies assumes that the information in which order the words occur in a document is negligible. This assumption is also referred to as the exchangeability assumption for the words in a document and this assumption leads...
Words: 6498 - Pages: 26
...What is Organizational Psychology? Beyounka Bonner PSYCH 570 March 2, 2014 Dr. Vicki Koenig What is Organizational Psychology? According to Britt and Jex (2008), organizational psychology is grounded in scientifically studying one’s behavior and interactions that one has within the workplace, as well as other organizations. Organizational psychology has an extreme effect on a company’s success rate; it has an impact on a company’s work performance, gratification, security, healthiness, and overall well-being of a company’s employees. Research on employee’s behaviors and assertiveness, methods on how improvements can be made to the company’s hiring process, training programs, and managerial coordination are all conducted by organizational psychologists. Organizational psychologists assist organizations in transitioning through different times of adjustments, growth, and developments. There are many factors that may influence the way in which one behaves in an organization, such as, the structure of an organization, societal norms, managing styles, and the expectation of different roles. Although the field of organizational psychology is indebted to the study of organizations that are formal, it is not to say that the organization will always be one that is a business or that is one for profit; which is a common misconception about this field (Britt & Jex, 2008). This essay will explore the field of organizational psychology. Evolution of Organizational Psychology ...
Words: 1352 - Pages: 6
...in the Data mining course. It includes my two proposed approaches in the field of clustering, my learn lessons in class and my comment on this class. The report’s outline is as following: Part I: Proposed approaches 1. Introduction and backgrounds 2. Related works and motivation 3. Proposed approaches 4. Evaluation method 5. Conclusion Part II: Lessons learned 1. Data preprocessing 2. Frequent pattern and association rule 3. Classification and prediction 4. Clustering Part III: My own comments on this class. I. Proposed approach • An incremental subspace-based K-means clustering method for high dimensional data • Subspace based document clustering and its application in data preprocessing in Web mining 1. Introduction and background High dimensional data clustering has many applications in real world, especially in bioinformatics. Many well-known clustering algorithms often use a whole-space distance score to measure the similarity or distance between two objects, such as Euclidean distance, Cosine function... However, in fact, when the dimensionality of space or the number of objects is large, such whole-space-based pairwise similarity scores are no longer meaningful, due to the distance of each pair of object nearly the same [5]. Pattern-space clustering, a kind of subspace clustering, can overcome above problem by discovering such patterns that existing in subspaces...
Words: 5913 - Pages: 24
...Then, we calculate and setK=3.According to theformula (5), weeasily acquirea node set {1,2,3}which is closest to the node 4.Lastly, we naturally assignthe label '1' to the node 4sincethe labels of majority nodes belong to'1' in the node set {1,2,3}. Fig.2 (b) shows the detected results by the KNN. As we see,node 4 has been clustered into a reasonable category. Algorithm1describes theprocedures ofinitialization based on the ideology of KNN in detail as follows. Algorithm 1. The framework of initialization by the KNN technique Input: The information of a network: adjacent matrix A or node pairs A_pair, the number of nodes: n, the times of iteration: m_iter. Output: The pre-partition of a network: pre_label. Step 1. Set each node with a unique label, that is, label={1,2,…,n}. Step 2. Set t=1. Step 3. Set i=1. Step 4. Calculate the closeness of the current node with its adjacent nodes, then get the closeness in descending order: Si={Si1,Si2,…,Siq}(i=1,2,…,n), q denotes the number of adjacent nodesof node vi. Step 5. Set . If K is an even number, reset K=K-1; then go to Step 6. Step 6. Get the first K values in Si, and find the majority of labels which the K nodes correspond to. Update the label ofvi. Step 7. Update i=i+1. If i≤n, go to Step 4. Otherwise, go to Step 8. Step 8. Update t=t+1. Ift≤m_iter, go to Step 3. Else, go to Step 9. Step 9. Output the results of Initialization: pre_label. 3.2 Community integration strategy In section 2.4, we have defined a community membership...
Words: 525 - Pages: 3
...M. Tech (CS) Bharathidasan University, Trichy, India. Abstract: In data mining, Crime management is an interesting application where it plays an important role in handling of crime data. Crime investigation has very significant role of police system in any country. There had been an enormous increase in the crime in recent years. With rapid popularity of the internet, crime information maintained in web is becoming increasingly rampant. In this paper the data mining techniques are used to analyze the web data. This paper presents detailed study on classification and clustering. Classification is the process of classifying the crime type Clustering is the process of combining data object into groups. The construct of scenario is to extract the attributes and relations in the web page and reconstruct the scenario for crime mining. Key words: Crime data analysis, classification, clustering. I. INTRODUCTION Crime is one of the dangerous factors for any country. Crime analysis is the activity in which analysis is done on crime activities. Today criminals have maximum use of all modern technologies and hi-tech methods in committing crimes. The law enforcers have to effectively meet out challenges of crime control and maintenance of public order. One challenge to law enforcement and intelligence agencies is the difficulty of analyzing large volumes of data involved in criminal and terrorist activities. Hence, creation of data base for crimes and criminals is...
Words: 1699 - Pages: 7
...3.4 System Design In this section, we provide the proposed work using graphic system such as: class diagram, system architecture, activity diagram etc. 3.3 Algorithm Design and Mathematical Model 3.3.1 Existing Clustering Algorithm The weighted variants of k-means clustering, with an objective function, but instead of this generic form propose a Block-based Weighted Clustering scheme for the objective function. Here we are considering the proposed algorithm is based on WLAN (wireless local area network) by designing temporary Mobile Ad Hoc Networks using 802.11 MAC protocol and AODV routing protocol. Algorithm 1: Block Based Weighted Clustering (BWC) Input: {MANET Access point 1, MANET Access point 1, MANET Access point 1} Concept and Notations:...
Words: 699 - Pages: 3
...Essay A driverless car, also known as a self-driving car is an autonomous car which can perform the actions of the human being, as if a man were driving a traditional car. We can say that the car is independent of the human as the car only needs to be programmed with the destination. The mechanical part of the vehicle is held by the car its own. Moreover, to function, the car has some specific technology, for example laser, radar, GPS and computer vision. An example of an approved case of self-driving cars can be Google’s. In 2011 the state of Nevada was the first jurisdiction in the United States to pass a law concerning the operation of driverless cars. This law was turned into effect by March 2012 and the Nevada Department of Motor Vehicles gave the first license for a self-driven car in May 2012. This license was given to Google’s car which was in this case a Toyota Prius. Google got involved with this issue as it is trying to develop technology for driverless vehicles. In addition, the project is currently being led by Google engineer Sebastian Thrun, director of the Stanford Artificial Intelligence Laboratory and the co-inventor of Google Street View. To develop this system, Google also had to hire 15 engineers. This topic about self-driving cars involves also other issues such as hardware and software, social and ethical issues and the social impact. As regards hardware and software involved, it integrates Google Maps with various hardware sensors and artificial...
Words: 656 - Pages: 3
...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...
Words: 623 - Pages: 3
...LASA 1 Promoting Cognitive Developments Students Name Course name and number Instructors’ name Date submitted LASA 1 Promoting Cognitive Developments A good understanding of how children grow, learn, and change is significant as it allows people to accept and appreciate the cognitive, physical, emotional, educational, and social growth that kids undergo from birth through early adulthood. Piaget is well known for her cognitive developmental theory that sees the kid cognitive development and knowledge, as taking place in different stages. According to his theory, he claims that the child passes through four unique stages of development; Sensorimotor stage (0- 2 years), pre-operational stage (2- 7years), concrete operational period (7-11 years), and formal operations (11-15) years (Herzog et al, 1997). According to him, reasoning in kids deepens as they continue to grow. Their engagement in the social and physical world improves development and all other changes that occur via assimilation and accommodation (Kenpro, 2010). Skinner‘s theory deals with behaviorism in children. His theory explains that a child’s behavior can become increased by the presence of reinforces and declined via punishment. According to this theory imitation or observational learning can greatly improve the chance that the child will learn or develop new behaviors. According to skinner a child’s development is way outside of their influence, but becomes shaped by the environmental stimuli...
Words: 949 - Pages: 4
...EXPERIMENT NO: 1 AIM: To study Information Life Cycle Management. THEORY: INFORMATION LIFECYCLE: The information lifecycle is the “change in the value of information” over time. When data is first created, it often has the highest value and is used frequently. As data ages, it is accessed less frequently and is of less value to the organization. Understanding the information lifecycle helps to deploy appropriate storage infrastructure, according to the changing value of information. For example, in a sales order application, the value of the information changes from the time the order is placed until the time that the warranty becomes void (see Figure 1-7). The value of the information is highest when a company receives a new sales order and processes it to deliver the product. After order fulfillment, the customer or order data need not be available for real-time access. The company can transfer this data to less expensive secondary storage with lower accessibility and availability requirements unless or until a warranty claim or another event triggers its need. After the warranty becomes void, the company can archive or dispose of data to create space for other high-value information. Information Lifecycle Management Today’s business requires data to be protected and available 24 × 7. Data centers can accomplish this with the optimal and appropriate use of storage infrastructure. An effective information management policy is required to support...
Words: 676 - Pages: 3
...Case Study 3: Managing Contention for Shared Resources on Multicore Processors By Ja’Kedrick L. Pearson Professor Hossein Besharatian CIS 512 June 2, 2013 Memory contention Memory contention is a state an OS memory manager can reside in when to many memory requests are issued to it from an active application possibly leading to a DOS condition specific to that application. A test was run on a group of applications several times, on three different schedules, each with two different parings sharing a memory domain. The three pairing permutations afforded each application an opportunity to run with each of the other three applications with the same memory domain. The three applications being discussed in this paper are the Soplex, Sphinx, and the NAMD. The Soplex is a linear programming (LP) solver based on the revised simplex algorithm. It features preprocessing techniques, exploits sparsity, and offers primal and dual solving routines. It can be used as a standalone solver reading MPS or LP format files as well as embedded into other programs via a C++ class library. Sphinx is an open source full text search server, designed from the ground up with performance, relevance (aka search quality), and integration simplicity in mind. It's written in C++ and works on Linux (RedHat, Ubuntu, etc), Windows, MacOS, Solaris, FreeBSD, and a few other systems (Sphinx Technologies, 2013). NAMD is a parallel molecular dynamics code designed for...
Words: 1093 - Pages: 5
...Favian Morales GS1140 Tuesday 7:20pm Instructor K. Fitch October 7, 2014 The DARPA project The DARPA headquarters was founded the year of 1958 in Arlington, Virginia by our very own president Dwight D Eisenhower. They have a total of 240 employees, and has an annual budget of 2.8 billion. DARPA stands for Defense Advanced Research Projects Agency. That is not the information I want to bring to your attention. The information I want you to know is about the DARPA challenge (The driverless car). From what I researched, the purpose of this vehicle is to travel into disasters that human engineering couldn’t bear to enter. The driverless vehicle must perform thee various tasks: 1. Drive a utility vehicle at the site.2. Travel dismounted across rubble.3. Remove debris blocking an entryway.4. Open a door and enter a building.5. Climb an industrial ladder and traverse an industrial walkway.6. Use a tool to break through a concrete panel.7. Locate and close a valve near a leaking pipe.8. Connect a fire hose to a standpipe and turn on a valve. I personally think it is impossible to build, for the simple fact that I would not even know where to start. While writing this essay, I was thinking of ways to engineer such a vehicle. I couldn’t come up with no analysis to such a challenge, then it hit me. What was said in the article I what Mr. Fitch been teaching us all along. The lesson of the original challenge [DARPA Grand Challenge - driverless cars] is that persistence pays....
Words: 328 - Pages: 2
...1 Video Data Mining JungHwan Oh University of Texas at Arlington, USA JeongKyu Lee University of Texas at Arlington, USA Sae Hwang University of Texas at Arlington, USA 8 INTRODUCTION Data mining, which is defined as the process of extracting previously unknown knowledge and detecting interesting patterns from a massive set of data, has been an active research area. As a result, several commercial products and research prototypes are available nowadays. However, most of these studies have focused on corporate data — typically in an alpha-numeric database, and relatively less work has been pursued for the mining of multimedia data (Zaïane, Han, & Zhu, 2000). Digital multimedia differs from previous forms of combined media in that the bits representing texts, images, audios, and videos can be treated as data by computer programs (Simoff, Djeraba, & Zaïane, 2002). One facet of these diverse data in terms of underlying models and formats is that they are synchronized and integrated hence, can be treated as integrated data records. The collection of such integral data records constitutes a multimedia data set. The challenge of extracting meaningful patterns from such data sets has lead to research and development in the area of multimedia data mining. This is a challenging field due to the non-structured nature of multimedia data. Such ubiquitous data is required in many applications such as financial, medical, advertising and Command, Control, Communications and Intelligence...
Words: 3477 - Pages: 14