Saturday, March 28, 2020
Development of a Web Based Recruitment Process System for the Human Resource of an Organization Essay Example
Development of a Web Based Recruitment Process System for the Human Resource of an Organization Paper DEVELOPMENT OF A WEB BASED RECRUITMENT PROCESS SYSTEM FOR THE HUMAN RESOURCE OF AN ORGANIZATION CASE STUDY:UGANDA VIRUS RESEARCH INSTITUTE SUBMITED BY: NAMBALE JOHN BOSCO REG NO: 2007-03-IT-042 LECTURER: MR OTHIENO JOSEPH 1. 1. Introduction For an organization to run successfully and efficiently its very important that it has efficient workers and to use its resources very well especially human resources. So one of the important goals of an organization is to recruit right people for the right job. So there should be a proper recruiting process management system so that all the activities and selection procedure can be carried out effectively without losing its transparency. A web based recruitment system will be of great help in carrying out recruitment operations and with this very objective in mind this web based recruitment system will be made. In this web based recruitment system it will manage all such activities (like storing applicants data, scheduling interviews, retrieval of recorded data and easy application) and that will save time, manpower and the biggest advantage of being it web based. This web based system will provide better prospective for the enhancement of organization regarding to quality and transparency. 1. 2. Background of the case study The Uganda Virus Research Institute (UVRI), located in Entebbe, Uganda, was established in 1936 as the Yellow Fever Research Institute by the Rockefeller Foundation. In 1950, after gaining regional recognition it was renamed the East African Virus Research Institute (EAVRI). After the collapse of the East African Community in 1977, it became a Uganda government public health research institution and was renamed the Uganda Virus Research Institute. We will write a custom essay sample on Development of a Web Based Recruitment Process System for the Human Resource of an Organization specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Development of a Web Based Recruitment Process System for the Human Resource of an Organization specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Development of a Web Based Recruitment Process System for the Human Resource of an Organization specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The government of Uganda now administers and funds the institute through the Uganda National Health Research Organization (UNHRO) which is an umbrella research body with in the Uganda Ministry of Health. The mission of the institute is to carry out scientific research concerning communicable diseases, especially viral diseases of public health importance and to advise the government on strategies for control and prevention. The institute also plays a large role in coordinating and administering virology related clinical trials within the county. Most recently the institute has been involved in human HIV vaccine clinical trials. The HIV/AIDS Reference and Quality Assurance Laboratory (HRL), which is part of the institute plays an important role in making public policy recommendations to the Uganda National Drug Authority on the access and usage of new drugs and medicaltechnologies. 1. 3. Problem Statement The current recruitment processes are primarily manual and paper based. These processes are labor intensive, costly and unfriendly from the applicant and managerial point of view. It is worth notifying that with the increasing number of applicants at the institute and with this current recruitment processes which are primarily manual and paper based are no longer efficient. It is the intention to replace these with a system that will allow direct job applications on-line and improve this situation. 1. 4. Objectives of the study This project is aimed at developing a web-based (on-line)recruitment system for Uganda Virus Research Institute which will store data, schedule interviews, allow easy retrieval of data and finally also allow easy application. However there are other specific objectives and these will include; â⬠¢To investigate the current system being used. â⬠¢To design a web based recruitment process system. â⬠¢To implement a web based recruitment process system. â⬠¢To test the web based recruitment process system. 2. Activities and Deliverables The following table describes the activities and deliverables comprising of the system development life cycle which involves planning stage, analysis stage, design stage, implementation stage and maintenance stage StagesActivitiesDeliverables Planningâ⬠¢Define business problem and scope Produce detailed project schedule â⬠¢Confirm project feasibility â⬠¢Presentation of reasons why system should or should not be developed by the organizationâ⬠¢Initiate â⬠¢Ensure feasibility â⬠¢Plan schedule Analysisâ⬠¢Gather information to learn problem domain â⬠¢Determine system requirements â⬠¢Generate alternative designs â⬠¢Compare alterna tives â⬠¢Recommend best alternativeâ⬠¢Requirements specification â⬠¢Entity Relationship Diagram â⬠¢Performance expectations â⬠¢Description of work flows and manuals Designâ⬠¢Define system architecture â⬠¢Produce logical and physical database design â⬠¢Design document Data Element Dictionary Implementationâ⬠¢Verify and test â⬠¢Convert data â⬠¢Train users and document the system â⬠¢Install the system â⬠¢Testing â⬠¢User training â⬠¢Installation of new system. Maintenanceâ⬠¢Maintain system â⬠¢Enhance system â⬠¢Support usersâ⬠¢Small patches,repairs and updates â⬠¢Enhancements to expand system capabilities 2. 1. Project schedule A project schedule for the development of a web based recruitment process system for the human resource of an organization showing an activity and its estimated time period. ActivityEstimated Time Planning4 weeks Analysis5 weeks Design7 weeks Implementation9 weeks Overall project25 weeks 2. 2. Gantt chart MONTHSEPTEMBEROCTTOBERNOVEMBERDECEMBERJANUARYFEBRUARY WEEKS1234512341234123412341234 ACTIVITIES PLANNING ANALYSIS DESIGN IMPLEMENTATION OVERALL PROJECT 3. METHODOLOGY This will include various methods of collecting data. It comprises of two parts thats the research methodology which includes primary sources and development methodology which includes the design tools. 3. 1. Research methodology This will involve various methods that will be used to collect data and these include primary sources and secondary sources. . 1. 1. Primary sources 3. 1. 2. Observation During the research, I will see exactly what happens at the institute and also interact with the staff members of human resource department at the institute. During that period I will be able to observe and analyze the conditions of the work at the institute. 3. 1. 3. Oral interviews There will be free interaction with the staff members of human resource department and I will ask them some questions pertaining to the topic under study. The interviews will be aimed at getting an understanding the current situation. . 1. 4. Questionnaires The use of pre-printed questionnaires will be of great use since confidentiality will have to be maintained especially among the human resource department. It will comprise of both open ended and closed questions, questionnaires which will be distributed to each member of the human resource department. From this procedure, I will be able to get their views about the recruitment process. They will be requested to give their views on how to solve the problems at hand. 3. 1. 5. Secondary sources 3. 1. 6. Library research I will also have a review of the secondary data to gather information about the research problems mostly in the required area of the study. For this method various texts on databases and database management system will be of great help during the research; these will include a number of textbooks, journals, articles and the world wide web, that is ; internet which will be also my secondary source of information. 3. 2. Development methodology This will involve various design tools that will be used to collect data. 3. 2. 1. Design tools For this project , I will use PHP and MySQL as the prime design tools because of the following reasons below; 3. 2. 2 PHP Hypertext Preprocessor (PHP) is an HTML embedded programming language which executes scripts on a server and allows web designers to create dynamic content that interacts with databases. It supports the use of database servers such as MySQL, Informix and Solid. 3. 2. 3. Advantages of PHP â⬠¢It is fast and easy because its embedded in HTML code, the response time is short and PHP contains many special features and functions needed to create dynamic web pages. â⬠¢Its cross platform. It runs on a variety of operating systems for example Windows, Linux. â⬠¢It accesses everything. Has a built in set of functions that make getting whatever you need very easy. â⬠¢It is constantly being improved. A variety of developers look to improve the product almost daily. â⬠¢It is free. â⬠¢You can get support from different people. That is technical support is widely available. A large base of users provides free support through e-mail discussions list. 3. 2. 4. MySQL MySQL is a relational database management system (RDBMS) that interacts with Sructured Query Language(SQL), a tool for editing, accessing and processing data within a database. . 2. 5. Advantages of MySQL â⬠¢Fast â⬠¢Stable â⬠¢Easy to learn â⬠¢Runs on popular OS (Windows, Linux, Mac OS X etc) â⬠¢Applications can be created in great variety of programming languages such as C, C++ ,Java etc â⬠¢Extensively documented on the internet and there many books on the subject available. â⬠¢Available for many applications free of charge (GPL License) â⬠¢Cheaper â⬠¢MySQL is a relational database system Other tools to be used will include drawing tools such as gimp, adobe photo, computer aided software engineering tools, html, text editors such as notepad Table of contents Page Introduction.. 1 Background of the case study.. 1-2 Problem statement 2 Objectives of the study 2 Activities and deliverables 3-4 Project schedule. 4 Methodology. 5-7
Saturday, March 7, 2020
The artist must possess the couragous soul...the brave soul. The soul that dares and defies. Quote in The Awakening that mst accurately describes Edna.
The artist must possess the couragous soul...the brave soul. The soul that dares and defies. Quote in The Awakening that mst accurately describes Edna. Madameoiselle Riesz tells Edna that in order to suceed, "the artist must possessthe couragous soul...the brave soul. The soul that dares and defies." This mostaccurately describes Edna. Edna does possess the courages soul and the soulthat dares and defies. She was inspired my Madameoiselle Riesz who is anartist herself and possesses the soul to be only herself.With the help of Madameoiselle Riesz, Edna was able to be herself and actout on her desires and urges. She no longer had to force herself to be someonewho she wasn't in order to fit in with the "mother-women." She no longer hadto fit in. Madameoiselle Riesz gave Edna the courage to search deep insideherself for what was really there, for even she had no idea, and then act onthat.At the beginning of the novel Edna is only existing, only going throughthe motions of life.English: AdeleShe is unhappy and doesn't really know why. Deep insideher is the need to escape and be free from her obligations as a wife andmother. She has alway s possessed this independent attitude and felt trappedby her family. It was only when Edna met and became friends with Adele andMadameoiselle Reisz that she was able to realize why she was unhappy andwhat was missing in her life.As Edna begins to realize more and more about herself and what she ismissing in her life, she is able to become more independent and become thefree women she has always seceretly desired to become.Edna refuses to be controlled and devote heself to her husband andchildren. She wants to be independent, able to come and go as she pleaseswithout having to worry about the rules and restrictions that come...
Wednesday, February 19, 2020
Culture Essay Example | Topics and Well Written Essays - 750 words - 2
Culture - Essay Example In an Islamic society that is fundamentally reserved, it is odd to predict that such things as ââ¬Å"Pastel carrying cases for condomsâ⬠would have a good market value. People of UAE are generally global agnostics. This essentially means that their tendency to buy a product is not influenced by the productââ¬â¢s global attributes. UAE is one country where the Western decadence is considered infectious. People of UAE derive their learning from the teachings of Islam. They may not be good practicing Muslims, though Islam still remains as the standard. They distinguish between right and wrong according to the teachings of Islam. Thus, the indigenous people of UAE derive learning from Islam. As the traditional environment is fundamentally Islamic, so the people of UAE tend to stick to it rather than adjusting with the fast pace new world. Additionally, their inherent richness of both cultural and monetary leaves them in no complex to run after the global standards. UAE governmen t has more than sufficient funds to provide the indigenous people with a rich and elite standard of living. People have much more money withy them than what they would need to purchase things of their want. Because of the abundance of money, people are not as thirsty for things as people from other cultures normally are. The indigenous people believe more in collectivism than individualism. UAE society is generally extroverted. People make a lot of friends and spend most of the time with family and friends. Increased social interaction causes people to share similar standards. This promotes collectivism in their approach. The lowest Hofstede Dimension for the Arab World is the Individualism... People of UAE derive their learning from the teachings of Islam. They may not be good practicing Muslims, though Islam still remains the standard. They distinguish between right and wrong according to the teachings of Islam. Thus, the indigenous people of UAE derive learning from Islam. As the traditional environment is fundamentally Islamic, so the people of UAE tend to stick to it rather than adjusting with the fast pace new world. Additionally, their inherent richness of both cultural and monetary leaves them in no complex to run after the global standards. UAE government has more than sufficient funds to provide the indigenous people with a rich and elite standard of living. People have much more money to them than what they would need to purchase things of their want. Because of the abundance of money, people are not as thirsty for things as people from other cultures normally are. The indigenous people believe more in collectivism than individualism. UAE society is generally extroverted. People make a lot of friends and spend most of the time with family and friends. The increased social interaction causes people to share similar standards. This promotes collectivism in their approach. Governmental rules are strictly observed because there are severe penalties for violating them. The etiquettes of business recognized internationally like dress code are generally violated. The indigenous men of UAE would wear their traditional white cloak, named Kundra or dishdasha in the workplace instead of the suit (Grapeshisha).
Tuesday, February 4, 2020
Administration of Tetanus, Diphtheria, and Acellular Pertussis Vaccine Article
Administration of Tetanus, Diphtheria, and Acellular Pertussis Vaccine to Parents of High-Risk Infants in the Neonatal Intensive Care Unit - Article Example The feasibility study was conducted to measure the role vaccination in the parents in controlling the infection of pertussis on the susceptible infants. This type of epidemiological study was applied because vaccination of the parents and adults, who are in constant contact with the infants is still not considered as one of the essential means of controlling the spread the pertussis in the infants. Identification of measures of prevention of the transmission of Bordetella Pertussis to young infants was the key factor of the study. The study was designed to explore whether the vaccination of parents was also one of the contributing factors in the increasing incidence of pertussis amongst infants. Bordetella Pertussis has become one of the main causes of morbidity and mortality amongst the infants. It is assumed that the parents may also be the most important carrier of Pertussis virus and the result of the study would encourage vaccination of parents and adults as a major preventive measure to control the spread of pertussis amongst the vulnerable infants. The article highlights the probable sources of infections and focuses on vaccination of parents so the infants can be safeguarded against the dreaded disease. The study was conducted in the neonatal intensive care unit of Stony Brook University Medical Center, New York from July 1, 2007 to October 30, 2007. During the period, 358 infants with gestational age ranging from 23 weeks to 42 weeks were admitted into NICU and 495 of 592 eligible parents were offered vaccination. 430 parents agreed to participate in the program. The nursing and other staff was adequately prepared to disseminate information regarding risks and benefits of the immunization e program. The vaccination was carried out as per the guidelines of the TdaP vaccine of Sanofi Pasteur, France. Consent forms with pertinent information like parents age, infants age, apgar score, race, discharge date, vaccine lot
Monday, January 27, 2020
Client Server Network Architecture Essay
Client Server Network Architecture Essay Abstract This report is about the client server network architecture in which each computer or process on the network is either a client which is low end computer which request services and or a server which is high end powerful computer which is highly capable of providing services to many different clients at the same time. The task which servers performs are like managing disk drives which are called file servers, managing printers which are called print servers or managing network data traffic known as network server. Clients are PCs which require or use these facilities from servers which include sharing files, printers, storage and sometimes processing. All the clients and servers in a network communicate by using different protocols which are set of rules or standards which govern the communication between any computers or devices connected in a network. This client server architecture is also known as two-tier architecture.(1) Introduction The advent of personal computers gave birth to the idea of client/server architecture. Before personal computers, programs were written for mainframes. Software written for mainframes was often coded in a monolithic format that is the user interface, business logic and data access functionality are all contained in a single application. Because the entire application ran within the mainframe this was not a problem.(2) Client/server model, needed to share many kind of services. As time passed the need of these services increased so servers also evolved. Many clients started sharing services of common server. Example can be of our web browser which is a client and requests services from web server like web pages or files. This is sometime also knows as Hyper Text Transfer Protocol server (HTTP) also for computer to make requests like a client Transfer Control Protocol/Internet Protocol (TCP/IP) and for transfer of files over internet File Transfer Protocol (FTP).Protocols are set of rules or standard that which governs the communication of two or more nodes in a network.(3) The relationship between two computer programs in which one program makes a request and other which provide the required service is called a client/server relationship. It is a backbone of interconnection of two or more programs or computers anywhere across the network. Example could be an ATM machine in which we send request for balance check or money withdrawal and through this machine which is like a client and bank has supercomputers which acts as servers and the transaction are handled by them and result is sent back to the client to display in front of user.(4) Client Server Architecture has two common architectural models. The two tier and the three tier architecture. In two tier architecture the application will be on the server instead of client because server has more disk space and power as compare to PC also the data will also be in server along with the application. In three-tier architecture the load is divided between two different servers instead of putting load on one and jamming other clients. These servers are database server and application server. The data and application are divided between these servers. Client would only request and display data. In this tier more manageable and less contention system for resources will be available because each server will be used either to process data or application requests.(6) Literature Review In modern world because of rapid changes in user requirements and increasing amount on daily basis of users sharing data among them the needs of faster and better network system growing tremendously companies are bound to upgrade their system every six months. Now Hures is also facing same problems. This is very common problem in any company because of the rapid development of business systems so to cater these problems any company should keep this in mind while developing new system is that they may need to upgrade very soon. Hures analyst did not plan the future scenarios properly and because that even internal and external environment is affecting the company. The business is affected by many changes like political, social and technological. Client/Server technology is often introduced for flexibility of coping with these changes. However it comes with its own challenges which we will discuss here. Client/Server is built on three basic building block they are client which is a small or less capable hardware or software then middleware which is a software which lies in between and server more powerful then client. The first block client runs different applications on its operating system which provides graphic user interface. Clients could have web browser for example as an application requesting services now operating system transfers these request to the middleware. Client also runs a DSM (Distributed System Management) it could be simple element to the entire front-end managing application. Middleware is application which has three categories: transport stack, network operating system (NOS) and server-specific middleware. It runs on both the client and the server. It also have DSM like clients and is the backbone of client/server architecture. Server is typically intelligent software or hardware it runs some application to make an interface with middleware. Server consists of five main components SQL database, TP Monitors, groupware , object and the web. Server also has DSM in it which can be a simple agent or entire back-end of the system. The Distributed System Management application runs on every node in the Client/Server network. The additional server like email could be used depending on size and usage of the network. Hures could also use similar OS in all workstations it also plays very important part in Client/Server. Same OS on all sides in network can reduce a lot of problems and it will increase server efficiency and will cause less strain on servers. The Alternative architecture which could overcome Hures problem can be client queue client or another one called peer to peer architecture. Client queue client Architecture is also called passive queue Architecture. In Client queue client all points including servers are simple clients. It was developed to continue on traditional Client Server Architecture. In this they were trying to make one client as a server for different clients to multiply the usage for clients. Hures could benefit from this track and order number of clients for better efficiency also there will be better resources distribution and sharing. Example is search engine which uses spidering for faster and better results. Peer-to-Peer Architecture rather than focusing on power of server it distinguishes itself by distributing power and function. It depends totally on bandwidth and power of different nodes in the network. This architecture goes against previous client server architecture where there is one central server it replaces it with nodes which function as clients and servers simultaneously. Hures could use this architecture because due to its encapsulation it makes it easier to repair or upgrade without clients being affected and its more secure and easy to maintain. Intranet is one of the oldest and safest way for any company to have communication among themselves. It works just like website on internet. It gives you options to log ons to access only authorize data at your level in company. Most of the corporations use intranet for sharing important data among the employees. Intranet is a kind of network which is built by using same tools and protocols used by internet or World Wide Web (WWW) but is only restricted to the network of this company only. It uses same HTML, Java and CSS and also provide same database to store data within network server. Security features are fully customizable so its your preference whether you want to change password every 30 day or to set different accessibility for employee depending their post and work in the company. Any outside person trying to access company files will be blocked by firewalls. The Advantages of this internal network is that inside employees can do very important information interchange very quick and secure. It makes the data sharing more effective, easier and effective manner. It can also be used for internal applications such as newsletters, policy manuals, and price list etc. It can also gather information related to expense and programs that can help to transact application. As it is a private place on internet its safer and secured because only authority can access the website. The Disadvantages of this intranet to be considered would be like firstly it is very expensive to setup and maintain because a special team of people need to be hired and trained for handling the process of managing resources of this particular company and organizing them in the website. This process will also be very time consuming to develop and also the number of individual users would have to be considered in the overall budget for planning, designing, implementing. Also to maintain the quality, testing and maintenance needs to be done at all time. Obviously once whole site is developed now each user in company needs to be trained also how to use and set up your passwords which will also affect overall budget. It is very true that the popularity of intranet software and the internet pose threats towards traditional client/server system because intranet software have more advantages as compared to peer to peer or client/server architectures. It takes the most advantage of networking technology in the business world and because it enables us to take full use of wireless and internet technology at the same time it is the most flexible most secure and gives more privacy as compared to offered by traditional client/server system. As a result it is the most popular choice among many companies. However it is also very important to keep in consideration that even though intranet is the most popular and successfully used and accepted worldwide, there are still parts in the system or particular company which needs to use traditional client server system. As far as security is considered there are always threats to any open network system. To reduce the risk of infiltration from outside sources prope r monitoring of network on continues level is severely needed. The most important aspect of any company/corporation should be the network security. Cctv could be installed in various places to remotely monitor all the activities of users within the office and no one should be allowed to use their plug n play devices to any individual workstation. Maintaining the network integrity should be of the highest priority and could reduce the unplanned damages to revenue but again the cost of doing all these procedures will be substantial.
Sunday, January 19, 2020
The Effects of Addicting to Cyber Social Networks
The Effects of Addicting to Cyber Social Networks Social network is an addictive thing nowadays. I believe that everyone, start from teenagers up to old people addict to cyber social networks. Almost every single breathe, they update their twit, their statues, etc. If we cannot control ourselves to use this social network in the good way, it will not take a long time for us to get the bad impacts. There are so many bad impacts of addicting social networks.First of all, we will next to our far away people we usually connected to, but we will be far with the people around us. How come? Many people always keep contact to their friends in cyber world by social networking, so they often donââ¬â¢t care with the people around them. That condition absolutely makes others feel uncomfort to talk with that person. So, donââ¬â¢t be surprised if those real friends will stay away from that person. Actually itââ¬â¢s good to keep contact with people who far away with us. However, real frien ds are more important than cyber friends.Why? Because if we have a problem, real friends will help us directly than cyber friends. So the main point here, we have to priority our real friends first, then our cyber friends. The second is our main activity will be annoyed because of addicting to social networks. I am sure that we often meet someone who cannot live faraway from their gadget just to update his social networks. Donââ¬â¢t you ever think that this habit actually is annoyed his main activity? For example, there is a student in a class.All of us know that his main activity should be related with studying. However, if he is too busy with his social networks, how about his study? I believe that he will not be able to focus on his study because every single breathe he updates his social networks as I said before. That habit will also influence his score, how come? Because if we cannot focus on what we do, of course we will not be able to do it well. We will not be able to gi ve our best on it. The last but not least, addicting to social networks will give bad impact for our body.As we know that if we addict to something, in this case social networks, we will not be able to be separated with our gadgets. Whenever and wherever we go, those gadgets will stick with our hand, and absolutely itââ¬â¢s dangerous for us. Medical research has found that two mobile phones which are calling to each other for some hours can make an egg cooked. From that news, I think we should know how dangerous the radiation of this gadget is. Besides the radiation, too much doing this activity will make us feel lazy to move, we will sit all day long.Sitting for a long time is also not good for our body, we have to do exercise at least 15 minutes per day regularly. As you know, it is really dangerous for us if we cannot use cyber social networks in a good way. Being far away with people around us, annoying our main activity and also causing harm for our health is just some examp les of this bad habit. In my opinion, technology is good for us, but we have to use it in a good way too, so we can get the advantages. Sonia Dwi Cahyanti 110221414604/AA
Saturday, January 11, 2020
Marie Curie â⬠Change Agent Essay
Marie Curie has been chosen as a change agent due to the fact that she was the first woman to win a Nobel prize. She studied radioactivity, ââ¬Å"a term which she invented,â⬠(1) and invented portable x-ray machines which were carried by vans to the wounded in the field during World War I. (2) Element 96 was named curium (Cm) in the honor of Pierre and Marie Curie. (3) She made important advancements in the area of science, as remembered by the Curie institute, which for a time she was director of. The institute was named for her because of all the advancements she had made during her studies, and the work she did at the institute itself. The change that she made was for education for women to be accepted, and for women working in science to be more acceptable in her time. Works Cited (1) http://www.lucidcafe.com/library/95nov/curie.html (2) http://www.diplomatie.gov.fr/label_france/ENGLISH/SCIENCES/CURIE/marie.htm (3) http://www.student-consolidation.net/nobel-prize-winners/curie-sklodowska/curie-sklodowska.htm
Subscribe to:
Posts (Atom)