Tuesday, August 6, 2019
Importance-Performance Evaluation Essay Example for Free
Importance-Performance Evaluation Essay 1. 0 Introduction Patronage of any product or service is a function of the satisfaction a consumer derives from its usage. In the case of hotels, patrons tend to equate good service to the facilities and amenities which make their stay as pleasurable and comfortable as can be desired for their moneyââ¬â¢s worth. It is, therefore, imperative that the hotel management carefully considers customer feedback in addressing hotel improvement initiatives. The purpose of this report is to undertake an Importance-Performance Evaluation of the City Hotel as commissioned by the Griffith University Hotel based from the ratings given by selected business and pleasure travelers on how important the existing hotel facilities were to them and the performance of these facilities in meeting their needs. Preliminary calculations were performed to find the means and standard deviations for each facility which aided in the identification of the five highest and five least most important facilities, as well as the facilities which garnered the five highest and five lowest performance ratings. A scatter plot was then drawn with benchmarks set to indicate acceptable levels of importance and performance. Statistical analysis using the t-test was also conducted to identify significant differences on the respondentsââ¬â¢ perceived importance of each hotel facility. Findings revealed that the over-all mean of the importance and performance rating are 2. 83 and 3. 15, respectively. Facilities with the highest importance and performance ratings are in-room cable television and family restaurant, respectively. The two types of travelers differed significantly in their perception of the importance in eight of the 17 facilities evaluated. 2. 0 Research methods This paper made use of Importance-Performance Analysis (IPA) to identify hotel facilities which are performing well and those that need particular attention from management for improvement and to detect significant differences in the perceived importance of each facility. Utility of the IPA for use in this paper stems from the fact that results may be graphically displayed and interpreted on a two-dimensional grid, simultaneously indicating importance and performance dimensions of the hotel facilities being evaluated. The IPA method of assessment makes use of four sets of data, namely the means, standard deviations, scatter plot and the t-statistic. The t-test was performed using a 0. 05 level of significance. 3. 0 Results Figure 1. Importance ââ¬â Performance Mean and SD and t-test Results Figure 1 displays the mean and standard deviation of each of the 17 facilities of the City Hotel as evaluated by its patrons, as well as the results of the t-test performed on the importance ratings given by the two types of travellers. As shown in Figure 1, the five most important hotel facilities are the in-room cable television, in-room broadband connection, a-la-carte restaurant, express check-out and the free daily newspaper; while the five least important facilities are the express check-in, valet parking, wireless broadband connection throughout hotel, mini-bar, and tennis courts. The over-all mean of the importance ratings is 2. 83. The facilities with the five highest performance ratings are the family restaurant, express check-out, tennis court, in-room broadband, and in-room pay movies. The five lowest performance ratings were given on the following facilities : wireless broadband connection throughout hotel, valet parking, in-room cable television, mini-bar and tour booking service. The over-all mean of the performance ratings is 3. 15. As expected of an IPA, the scatter plot in Figure 2 presents a visual of the importance and performance ratings. The plot also shows established benchmark standards indicative of acceptable levels of importance and performance. The sector defined by the quadrant at the top right indicates high importance and performance, where facilities are said to be performing well. Hotel facilities identified to be performing well include in-room broad connection, a-la-carte restaurant, swimming pool, express check-out, free daily newspaper and games room. On the other hand, the area covered by the quadrant at the top left portion of the plot signifies facilities of low importance but high performance, and are probably facilities which are being over-resourced like room service, family restaurant, tennis courts and in-room pay movies. Meanwhile, the quadrant at the bottom right portion represents facilities which are of high importance but were given low performance ratings. Such facilities are those that need attention from the management, namely the gymnasium and the in-room cable television. Finally, the quadrant at the bottom left portion of the plot contains the facilities with low importance and performance such as the wireless broadband connection throughout the hotel, mini-bar, express check-in, valet parking and tour booking service. These are the facilities with no real issue to focus attention on. Figure 2. Importance-Performance Scatter Plot Figure 3 next page represents the results of the t-test performed between business travelers and pleasure travelers to ascertain any significant differences in the means of their ratings on the perceived importance of each facility at 0. 05 level of significance. Results of the t-test revealed that there were significant differences in the importance ratings between the business and pleasure travelers in terms of the following facilities: in-room broadband connection, family restaurant, gymnasium, in-room pay movies, express check-in, free daily newspaper, games room and tour booking service. Variable Group P-value Significance (P0. 05) Business Pleasure in-room broadband connection 3. 29 3. 21 0. 01 Yes wireless broadband connection throughout hotel 2. 26 2. 23 0. 09 No room service 2. 64 2. 61 0. 07 No a-la-carte restaurant 2. 97 2. 93 0. 1 No family restaurant 2. 86 2. 88 0 Yes mini-bar 2. 2 2. 18 0. 42 No swimming pool 2. 92 2. 91 0. 22 No gymnasium 3. 01 2. 99 0. 02 Yes tennis courts 1. 94 1. 94 0. 15 No in-room pay movies 2. 95 2. 98 0 Yes in-room cable television (foxtel) 3. 8 3. 8 0. 46 No express check-in 2. 8 2. 84 0. 01 Yes express check-out 2. 86 2. 81 0. 05 No valet parking 2. 53 2. 49 0. 19 No free daily newspaper 2. 74 2. 69 0 Yes games room 2. 95 2. 99 0 Yes tour booking service 2. 84 2. 9 0. 02 Yes 4. 0 Conclusions In summary, the evaluation of the facilities of the City Hotel using IPA indicated that the three facilities with the highest importance and performance ratings and are considered as the strongest areas of service in the hotel are in-room broadband connection, a-la-carte restaurant and express-check-out. Management should see to it that these strengths should be well maintained and upgraded whenever possible. Meanwhile the weakest areas are the tour booking service and valet parking. Future improvement plans should include strategies to revitalize the said facilities in order to ensure continued patronage and possibly improve City Hotelââ¬â¢s share of the market. 5. 0 Recommendations Based from the findings and conclusions, the following recommendations are being forwarded : (1) Institute a check-out survey among the hotel guests on how the hotel can be of better service to its patrons particularly in the areas of tour booking service and valet parking. This way, management will be appraised of what measures to undertake to enhance customer satisfaction; (2) Review how the other hotels are delivering their tour booking and valet-parking services and take on initiatives which will make City Hotelââ¬â¢s facilities comparable or the best among its class; (3) Undertake an environmental scan on all facilities being offered by the City Hotel in order to single out problem areas, apply potent solutions and improve service on all facilities, prioritizing areas that need attention like the gymnasium and the in-room cable.
Monday, August 5, 2019
Cloning the Putative Cancer Suppressor Gene GALNT9
Cloning the Putative Cancer Suppressor Gene GALNT9 Introduction The aim of this project is to clone the putative cancer suppressor gene GALNT9, it is a follow on from research by (pangeni et al. 2015) who previously found that this gene isnt expressed in breast cancers that metastasise to the brain. It was also discovered that when GALNT9 was knocked out of normal cells they appeared to become more cancerous. What is being tested here is whether a cloned GALNT9 can be expressed in cells that do not naturally express it in order to prevent or inhibit the development of cancer. This is an important discovery in the development of cancer therapies and preventative measures because metastasis is the single most common cause of cancer-related death. It also should be noted that metastatic breast cancer is commonly found in the brain, which is a guaranteed killer. It is interesting that breast cancers do metastasise in the way because of the complex and well-protected channels that must be used to enter the brain. This suggests that the metastasis occurs for a reason and that the cancerous cells have been developed specifically to metastasise to the brain. Ã Ã Literature review A cells physiology is maintained by complex dynamic processes that control overall gene expression in the intracellular molecular pathways. cancer progression and metastasis can be caused by the induction of redirected gene regulatory circuits which is often caused by cytogenetic mutations however can also be initiated by non-genetic factors including trauma. Some of these non-genetic factors that can cause cancerisation are mutations in epithelial-mesenchymal interactions. When the extracellular matrix increases in stiffness, there appears to be an increase in cell transformation and in cancer cell invasion (Feller, Khammissa, and Lemmer, 2017). Metastasis is the dissemination of neoplastic cancer cells to a secondary site or organ separate from the primary site. For example, if one is diagnosed with breast cancer which then spreads to the brain, this is known as a metastatic growth. Cancer of the brain that has spread in this manner is called metastatic breast cancer as opposed to brain cancer. Metastasis is the single most common cancer-related cause of death. The complex process of metastasis is the least known aspect of cancer biology and research into it is highly current and relevant. There are different oncogenes, tumour suppressor genes (TMGs) and metastasis suppressor genes (MSGs) that can inhibit the metastatic potential and invasive ability of cancerous cells (Efferth, 2009). Metastasis suppressor genes (MSGs) are proteins or molecules that are grouped into this class of genes so based on their ability to influence and suppress metastasis. Little is known about these genes; however, it is known that they come from a range of different biological pathways (Yoshida, 2000). At the site of metastasis or the secondary site MSGs regulate the growth of tumours. There are over 30 confirmed MSGs although their individual functionality has not necessarily been confirmed. For example,Ã Triple negative breast cancer (TNBC) is a type of cancer that is diagnosed by the expression of certain MSGs. The patients of this cancer often show a reduced expression of Raf kinase inhibitory protein (RKIP) which inhibits the invasive characteristics of a tumour (Frankenberger et al., 2015). It is known that different MSGs target different stages in the metastatic cascade, an interesting and potentially therapeutic find is that some MSGs promote dormancy at the secondary site. MSGs have little or no effect on the primary site however, metastasis frequently occurs before primary resection therefore if the cells are moving to a secondary site as dormant cells, there is an eliminated risk. Research into cloning these MSGs is ongoing with the intention that a successfully cloned MSG may have the capacity to suppress metastasis from a different part of the body. Questions are also being raised as to whether these MSGs can be expressed in a foreign environment and whether a previously active tumour can be returned to a dormant state (Murugaesu et al., 2012). Ã Ã
Sunday, August 4, 2019
fuel cell technology :: essays research papers
Fuel cell technology 1 Running head: FUEL CELL TECHNOLOGY: TRANSPORTATION AND RESIDENTAL/ COMMERICAL APPLICATIONS Fuel Cell Technology: Transportation and residential/commercial applications à à à à à Monique University 2 A fuel cell is an electrochemical energy conversion device. A fuel cell converts the chemicals hydrogen and oxygen into water, and in the process it produces electricity. With a fuel cell, chemicals constantly flow into the cell so it never goes dead as long as there is a flow of chemicals into the cell, the electricity flows out of the cell. Most fuel cells in use today use hydrogen and oxygen as the chemicals. Fuel cell provides a DC (direct current voltage that can be used to power motors, lights or any number of electrical appliances. The fuel cell will compete with many other types of energy conversion devices, including the gas turbine in your city's power plant, the gasoline engine in your car and the battery in your laptop. Combustion engines like the turbine and the gasoline engine burn fuels and use the pressure created by the expansion of the gases to do mechanical work. Batteries converted chemical energy back into electrical energy when needed. Fuel cells should do both tasks more efficiently. Fuel cells improve battered powered cars and gasoline powered cars more efficiently. Fuel-cell-powered electric cars are powered with pure hydrogen. It has the potential to be up to 80% 3 efficient, and with todayââ¬â¢s gas prices that would be wonderful. The efficiency of a gasoline-powered car is surprisingly low. All of the heat that comes out as exhaust or goes into the radiator is wasted energy. The engine also uses a lot of energy turning the various pumps, fans and generators that keep it going. So the overall efficiency of an automotive gas engine is about 20%. That is, only about 20% of the thermal-energy content of the gasoline is converted into mechanical work. The efficiency of an electric car is 72% for the car, 40% for the power plant and 90% for charging the car. That gives an overall efficiency of 26%. The overall efficiency varies considerably depending on what sort of power plant is used. If the electricity for the car is generated by a hydroelectric plant for instance, then it is basically free (we didn't burn any fuel to generate it), and the efficiency of the electric car is about 65%. à à à à à 4 Efficiency is not the only consideration, however. People will not drive a car just because it is the most efficient if it makes them change their behavior.
Saturday, August 3, 2019
Hawthornes Scarlet Letter vs Scralet Letter the Film Essay examples --
Hawthornes Scarlet Letter vs Scralet Letter the Film Published in 1850, Nathaniel Hawthorneââ¬Ës The Scarlet Letter describes many details of the life of a woman in a Puritan community and her conflict with their beliefs. Immoral events committed were harshly treated in those times; today these situations are dealt with up-to-date solutions. A Hollywood version of the novel was created in 1995 to visually illustrate the story but left room for comparison. Both the book and movie contain similarities and differences in point of view, plot, and symbolism. The point of view in a story is important for visualization of the plot. In the novel Hawthorne narrates the story of Hester Prynne and her sin of adultery making his point of view third person omniscient. He speaks of Hester like an outsider watching upon her life through a lucid glass window. This opposes the movieââ¬â¢s point of view which is told by Hesterââ¬â¢s daughter, Pearl, with a first person limited prospect. Pearl speaks of her motherââ¬â¢s life and romance with her father as she has heard the tale of love and suffering. ...
Going to the Territory :: Going to the Territory Essays
Going to the Territory à Ralph Ellisonââ¬â¢s essay ââ¬Å"Going to the Territoryâ⬠is truly a definition of American culture.à Ellisonââ¬â¢s essay is a description of his journey from Oklahoma to Brown University and along the way he uncovers truths about the way Americans selectively acknowledge their history and ignore important aspects of their culture and let them fester into an uncontrollable problem.à Ellison had a connection to Brown University before he even made it out of grammar school.à His principal was the first colored man to graduate from Brown and Ellison received an award in memorial to Dr. Inman Page, Ellisonââ¬â¢s grammar school principal.à It is through his time spent at Brown and his journey there that he realizes that American culture is based upon what people choose to hear and see.à ââ¬Å"Considering the ironic fact that Americans continue to find themselves stumbling into (as well as over) details of their history, tonightââ¬â¢s is a most American occasionâ⬠¦At any rate, in the two hundreds years of our existenceà à à a great deal has been overlooked or forgottenâ⬠(123).à Ellison says that Americans ignore the social problems of our country, which results in the problems growing out of control.à Race is one of these problems.à According to Ellison, race is a result of peopleââ¬â¢s personal interests.à People are so self interested that they look past the pressing issues of today.à ââ¬Å"Our unknown history doesnââ¬â¢t stop having consequences each though we ignore themâ⬠(133).à Because we as Americans ignored such issues as racial inequality- in that the debt Americans owe the black community is not repayable.à We think that by instituting laws to make all persons equal is enough, but this equality is never achieved, but looked past as though it is fine. à Ellison speaks of Black culture as being imitated and mimicked by many non-white citizens.à He mentions Europeans dancing like the Negroes, and how they other members of society find it absurd for them to behave in such a way.à These people are subject to the prejudices of those who have overlooked the instances of inequality in the past.à Today, people who pose as Blacks are subject to much scrutiny and discrimination.à They are termed ââ¬Å"wiggersâ⬠and and are often seen as offensive.à Ellison thought that this mimicking behavior was okay and acceptable.
Friday, August 2, 2019
Accounting: the Forensic Accounting Who Fought Whiet Collar Crime Essay
Abstract The global increase in fraud has caused many people to lose trust in accountants. However, experts in the field of Forensic Accounting, such as Certified Fraud Examiners, are restoring ethics and trust by fighting to deter white-collar crimes. The most prevalent type of fraud encountered is occupational fraud. Under occupational fraud the most common and consequential schemes are asset misappropriation and fraudulent statements. Due to the rapid increase of occupational fraud, organizations have implemented anti-fraud controls. Statistics have shown that these controls have helped to decrease the likelihood of fraud. This examination of Forensic Accounting points out the importance of Certified Fraud Examiners in the economic, business, and financial fields within the International Community. See more:à Masters of Satire: John Dryden and Jonathan Swift Essay Forensic Accounting: Fighting White Collar Crime When asked about ethical issues in the field of accounting, Raymond Reisig, both a Certified Public Accountant (CPA) and Certified Fraud Examiner (CFE), stated that ethics is the foundation which accounting stands on because ââ¬Å"Our whole profession depends on people trusting us.â⬠However, due to the lack of ethics in many large companies involved with fraud, the public has lost faith in the accounting profession. Hoping to restore the trust of society, many companies worldwide have incorporated Forensic Accounting into their industries. Essentially, the secret to uncovering fraud is by following a trail of money that will eventually lead to evidence that proves where the money has gone. This has been the job of Certified Fraud Examiners for years. A number of different types of frauds occur daily, but the most prevalent type of fraud that seems to catch the publicââ¬â¢s eye is occupational fraud. Everyday, Certified Fraud Examiners are working hard to fight off occupatio nal fraud in corporate America. According to the Association of Certified Fraud Examiners (ACFE), occupational fraud is ââ¬Å"the use of oneââ¬â¢s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organizationââ¬â¢s resources or assetsâ⬠(2010, p. 6). Occupational fraud has now become a global problem, which has substantially increased the demand for forensic accounting. Forensic accounting is one of the many branches in accounting; under this specific branch exists Certified Fraud Examiners. Certified Fraud Examiners are experts specifically trained to find fraud, detect the ways in which the fraud was committed, and uncover who may have committed the crime. Two of the many schemes under occupational fraud that certified fraud examiners are confronted with are asset misappropriation and fraudulent statements. ââ¬Å"Report to the Nationsâ⬠, a worldwide study of 1,843 cases of occupational fraud from 2008-2009, found that in the U.S. ââ¬Å"Asset mi sappropriation schemes were the most common form of fraudâ⬠¦ representing 90% of all casesâ⬠(ACFE, 2010, p. 4). Asset misappropriations range from conspiracies like skimming, when an employee does not record a sale and instead pockets the money, to schemes like check tampering, when an employee steals blank checks from the company and writes them out to himself. However, the most common fraud is billing. Billing happens when an employee deceives his employer to make false payments by submitting invoices for fictitious goods or services. One example of this could be found in a recent report in The New York Times. Anita Collins, 67, who is being charged for grand larceny in the first degree, for embezzling over $ 1 million over seven years from the Archdiocese of New York. Anita was able to skillfully delude the Catholic Church by sending fictitious invoices to the Archdiocese and issuing 468 checks to accounts she controlled (Otterman 2010). Billing alone can cause an organization to lose, on average, $128,000 annually. Although Asset misappropriation is the most common type of fraud, according to ââ¬Å"Report to The Nationsâ⬠it is the least costly. In contrast to asset misappropriation, fraudulent statements only made up less than 5% of all cases in the same study. However, these schemes are the most consequential, causing a median loss of more than $4 million annually (ACFE 4). Fraudulent statements involve the manipulation, falsification or alteration of accounting records, misrepresentation of financial statements, and the misapplication of accounting principles relating to amounts (Crumbley 2009). Financial statement schemes can be very hard to catch because they are buried under false numbers and fake company names. In a recent New York Times article authors Hiroko Tabuchi and Keith Bradsher revealed that in October 2011, Michael C. Woodford, former Olympus president and chief executive, exposed the corporat ionââ¬â¢s ââ¬Å"fraudulent accountingâ⬠. The scandal covered up $1.7 billion in losses by misstating their finances on their income statements. The corporationââ¬â¢s former and current executives tactically buried their losses so that external auditors could never discover them (Tabuchi 2012). Due to the complexity of financial statement fraud, such as the Olympus scandal, many companies hire certified fraud examiners to investigate their financial statements when they suspect fraud is present. Occupational fraud is hard to detect due to the fact that owners and executives commit most fraud. Take for example the case of Maria do Rosario Veiga. Ms. Veiga was an experienced auditor who had been working for the World Meteorological Organization for 4 years before she blew the whistle on their fraudulent behavior. Ms. Veiga was fired from the organization because she refused to cover- up an embezzlement scheme of 3.5 million dollars stolen by senior officials (WMO 2009). For this reason many organizations have implemented anti-fraud controls to prevent and detect fraud. Anti- fraud controls consist of controls such as hotlines, fraud training for employees, surprise audits and employee support programs. In every study since 2002, the Association of Certified Fraud Examiners have found that tips are the most common and effective way to detect fraud (ACFE 4). This study found that tips detected 40.2 percent of all cases; employees were the most common source of fraud tips (ACFE 17). Anti- fraud controls are reinforcing ethical standards in the field of accounting. A specific case study examined by CFE Tracy Coenen exemplifies the right way to deal with receiving a tip from an employee about fraud. First, the board of directors must determine that an independent investigation of the allegations should be done. After this, they seek unbiased analysis, and retain an outside counsel and a forensic accountant to investigate. Management then gathers all documents relevant to the allegations, and gives the investigator access to all employees and accounting records (Coenen 2011). Going through such procedures should be important to any company who receives a suspicious tip from an employee. Due to the major business scandals involving asset misappropriation and fraudulent statements, it is crucial for CFEs to have a good understanding of these schemes. Examining fraud involves close examination and piecing together financial evidence to find the hidden truth behind numbers. For this reason, the requirements to become a CFE include earning a Bachelorââ¬â¢s Degree, passing a ten-hour exam and having at least two years of professional experience in the related field (Meservy, 2006, p. 164). Not only do these requirements prepare a CFE before going into the field of forensic accounting, but they also ensure the public that the work of a CFE is trustworthy. Although it is very important that CFEs obtain knowledge of fraudulent behavior, it is also important that they acquire other skills as well. Many times when people hear the word ââ¬Å"accountantâ⬠they rarely think of a person who has excellent communication and writing skills. However, this is a very misleading misconception; In fact in a survey of 725 CFEs, communication and people skills were reported as critical by 44% of the recipients (Meservey, 2006, p. 176). These skills are viewed as critical because when a fraud examiner is investigating a case, he or she must be able to speak directly with their client; A CFE must also be able to orally present their findings in a courtroom to a judge and jury in a way that is clear and easy to understand (Wells, 2009). Along with communication and people skills, surprisingly, writing skills are also one of the most important. After a fraud examiner collects all the evidence needed, he or she must report their findings; A majority of the time these findings are reported by writing. Tracy Coenen, a fraud examiner and forensic accountant, stresses that, ââ¬Å"The best financial expert witnesses help win cases by artfully and simply communicating the facts through written reportsâ⬠¦Ã¢â¬ (Coenen, 2007). For this reason, a CFE must have strong writing skills. A part of effectively reporting facts is following an ethical code by remaining unbiased about the innocence or guilt of the suspect, and reporting only relevant facts. If there is a lack of clarity in the way facts are reported and communicated, not only can it cause the jury to lose trust in the CFEs findings, but essentially cause a negative outcome on a case (Coenen, 2007). The corner stone of the accounting field is ethics. For this reason, being ethical is the most important skill a CFE should acquire. Huge fraud cases such as the collapse of Enron and WorldCom led to higher costs for products and services, mistrust in leaders and a loss in retirement funds and job security (Crumbley, 2009). This was one of the driving forces that led to the passing of the Sarbanes-Oxley Act of 2002. This act not only regulated the auditing profession but it also demonstrated to the public that accountants value ethical standards. Up until now this act is based on making ââ¬Å"everyone responsible for fighting fraud by increasing all parties responsibilities for uncovering such fraud in every direction at every stop in the processâ⬠(Crumbley 2009). Not only has the Sarbanes-Oxley Act helped to gain the trust of the public, but CFEs have also played a huge role in this as well. The fact that the main task of a CFE is to deter and detect fraud, proves to society that the field of accounting remains ethical and fair. Fraud has caused many people to lose their trust in accountants; however, the field of accounting is implementing many ways to reduce fraud. Forensic Accounting plays a huge role in this because Certified Fraud Examiners are being used to analyze and examine financial statements in a way that normal accountants cannot. Through excellent communication and writing skills CFEs have ultimately proven that accountants do more than just ââ¬Å"deal with numbersâ⬠. The increase in demand for Forensic Accounting shows that our ethical standards are still our main priority. Unfortunately, occupational fraud is something that always occurs in every organization; we cannot change this. However, what forensic accounting can change is the way which society views accountants as ethical.
Thursday, August 1, 2019
Array Paper
Programming Solution Segments in Wooden Ring or Bowl One of the clubs that I belong to is the Savannah River Wood turners Association. We meet once a month in a friends shop down the road from where I live, and we usually have guest speakers give a presentation on aspects of wood turning. Last weekend we had a gentleman from Atlanta teach a session on segmented wood turning. Segmented turning is a type of wood turning that involves gluing together hundreds of segments to make a particular shape that you would then refine on a DOD lathe.It is a very time consuming and complicated endeavor sometimes, and the thought of a program to help with the math seemed like a great idea. The personnel involved in the project is mainly myself, but also some of the other members from the group. The aim is to be able to input the amount of segments that you would want to use in a ring and then determine the angle at which you must cut the sides of the segments. It would also be great if the program c ould output the length of each segment based on the diameter of the bowl.I say bowl loosely, building a blank with segments is usually done so that they form a ring. The final shape could be anything, but for this program it will be a bowl. In terms of the development cycle, the program will be built in five stages. The first part I am doing right now by writing this paper, this part is the analysis of the problem. The second will be the general design of the program itself. I will flesh out all of the details about input/output, what variables will be used, whatever math will be involved in the next paper.The third stage is the coding stage in which I will create a Visual Logic executable that runs the program. The fourth and fifth stage will be testing and maintenance. I suppose that I will actually test out the program by attempting to use the results that I get by creating a segmented wood blank. I will then put it on the lathe and include pictures in my final paper, as long as time permits. Turning can be a slow or fast process, and with segmented turning going fast is really not an option.Taking a modular approach will be somewhat important in the context of this reject. By using modules to separate all of the math from the input and output, it should make the academicals Logic flow chart easier to understand. The math involved in determining the dimensions of each segment is not that complicated in reality, but to me it might as well be ancient Egyptian. Luckily, I have found multiple websites and even other programs to guide me in making this. The first thing the program will do is ask the user what it wants to do.I saw that in the next paper we are required to use a selection statement, and I intend to use an if else, or maybe even a while loop to create a main menu for the program. From the desired diameter of the bowl in centimeters or they will choose to exit the program. The exact function of this menu is still up in the air, and as I move into mo re detailed design and math I will figure it out. The number of segments will be store in a variable. This variable will then be divided into 360, then divided by 2. This will give the angle to cut the pieces at.In reality the user would have to understand to cut the segments at this angle on both ides facing inwards, but that may be another variable I can output. Next the user will input the desired diameter of the ring in centimeters, this will also be stored in a variable, which will then be multiplied by 3. 14. I will add a third variable called the fudge factor, this is relative to the thickness of the segments and gives the user some flexibility in design and cutting. This number will be added to the circumference of the ring, and then the circumference will be divided by the number of segments.The final output will be the length of each segment, and the angle to cut at. Overall I hope to create a program that will aide in the math involved in this process, and one that I will be able to share with my friends. This type of woodworking is a lot of fun, but for those of us that are not so math inclined it can become frustrating. Accuracy is of the utmost importance, and hopefully this program will help me achieve it. I think this will be a lot of fun. References Segmented
Subscribe to:
Posts (Atom)