Imagine it is the year 2025 or more and at that time you are asked or straight declined to use social media websites on which most people rely on nowadays as their favourite pass time. Now imagine it is the year 2030 or more and you are asked to not use the Internet. Sounds scary, right?
Get original essayInternet has become an integral part of our lives. So much so that people can’t even imagine waking up to a day where they won’t have access to it. Our lives basically depend on it. From the time people wake up in the morning reading the news and being up to date with the recent events in the world to the time they fall back asleep reading an eBook or something else, they are using it for their benefits. It has proved itself to be beneficial in every aspect of human life and all sectors, be it healthcare, education to business to government. ‘The Internet is now ubiquitous throughout society, and its use as a source of continually updated professional knowledge is a key factor in professional learning and development in most professional workplaces.’
The internet has also made sure that every individual has access to the information they seek to get rather than visiting a library and then going from hundreds to books to get it. Distance learning has made it easier for students to gain skills, knowledge or certificates for which they would have to travel to a different location, maybe even a country. For e.g. MIT as well as Harvard offers over a thousand distance learning courses online for free.
But, not all countries have the same liberty. Not all countries have the liberty to use the same social media network used by billions of other people from different countries, the liberty to put out the content they think is good, the liberty to watch the same shows the rest of the world watches or read the same news. This is brought into implementation by using a technique known as censorship. Censorship is the technique used by governments of countries to basically put a ban or curb something or someone in particular, temporarily or permanently to view, access or publish content on the web. ‘Those who advocate balance, rather than some form of censorship or filtering, often do so from a very optimistic perspective using ‘freedom of speech’ or ‘freedom to read arguments’. Freedom of speech, or more correctly freedom of expression, relates to the right of an individual to express opinions. Freedom to read is related to the right of an individual to access information and knowledge.’ The censorship extent primarily depends on the regulations and varies from country to country. Censorship in the most basic form is used to restrict defamation, harassment and obscene material or something that hurts religious, political sentiments which can be hurting a particular group of people. ‘Tracking and profiling the activities of Internet users is a widespread practice and a major invasion of privacy. Multiple advanced and sophisticated techniques exist to carry out these types of activities, such as the use of web cookies and digital fingerprinting.’
There is certain stuff on the web that when visited or accessed, has detrimental effects on the growth of an adolescents’ brain. Anyone with an internet connection, can have easy access to pornography or sexual content. But also, with an internet connection, child can have access to some potentially fatal games like the Blue Whale. ‘The 'Blue Whale challenge' was reported to be an online 'suicide game' aimed at teenagers which set 50 tasks over 50 days. The challenge was alleged to be linked to numerous deaths around the world. But little about the 'game' was quite as it seemed.’ ‘This is not to imply that there is an automatic need for censorship or the banning of products that flood the markets related to e-Learning, computer games, use of the Internet or email communication.’
‘Many providers restrict the access to the material they provide based on the location of the visitors due to copyright protection requirements. Location is usually determined from the Internet Protocol (IP) address of the visitors. In order to gain access to the otherwise inaccessible material, Internet users can use servers that re-route traffic. Traffic re-routing is also one of the primary means to circumvent Internet censorship because it can simply deceive the censoring firewalls into believing that users are visiting legitimate destinations. the firewall can be deceived by the act of re-routing into believing that the user is not communicating sensitive material as the (encrypted) packets are being exchanged with an unknown entity (i.e. the re-routing server).’ There are some people who also use VPNs or Virtual Private Networks to gain access to content does not present in their region.
Censorship is implemented in most countries just for the political parties to gain its benefits by not allowing people to know the criminal activities they have carried out or have been a part of. ‘China turned out the lights on Facebook in 2009, and there are no signs that Beijing plans to restore access to the U.S.-based social media platform. Some analysts trace the ban to riots that broke out in July of that year between Muslim Uighurs and Han Chinese in the north-western province of Xinjiang’. ‘China appears to have blocked access to the popular search engine, Google.’ In an article by the webpage HowToGeek notes that ‘By blocking foreign social networking sites like Twitter and forcing their citizens to use alternatives like Sina Weibo, China is able to control social-networking sites, gaining the ability to censor posts on them. China also hires people who are paid to post content favourable to Communist Party policy on the Internet, attempting to sway public opinion.’ ‘Anonymity research has grown in importance, and the recent revelations about mass surveillance programs as well as the ever-increasing censorship of Internet access globally only signify the critical role that research in this area can play in protecting privacy of global citizens.’ UAE – ‘'A lot of people use WhatsApp and Skype call everywhere in the world. (they're) free all over the world except in my country. The telecom companies (in UAE) are blocking it and not allowing it. Therefore, I like to request the management and directors of these companies to release and free the system and enable everybody to enjoy it,' the billionaire had said in a video statement.’
Currently there are 4 main reasons of ‘Internet Censorship:
Internet censorship may be benefiting the government, or the authorities who impose such regulations on the general public, but it sure does not benefit the population as they are restricted from the freedom of information which stops them from having access to certain webpages and also their freedom of expression in a way that they are not allowed or suppressed from publishing something that would not hurt the sentiments of people. As the thesis statement states, Censorship may be a boon for some (government) but it sure is a bane for many others (general public).
Online in simple word of the dictionary can be understood as the state of being connected. In today’s world, two words play a major role whenever we talk about ‘online’. Internet and social media. Internet and social media have become a major factor affecting the social, economic, political and educational aspect of a person. With the major threat of pandemic and lockdown arising worldwide, the platform of interaction and dependency of internet has grown up.
Get original essayThe Covid-19 resulted in shutting down of the schools all across the world. The pandemic changed everything, including education. Thus, online classes became a suitable alternative for this concerning situation. Online classes provide various benefits to both the teachers and students. With mostly the availability of digital versions of study material, online classes help in making the total cost spent in education a lot lesser. It somehow makes learning more comfortable for the students who are shy to talk in front of the physical class. With all benefits provided by online classes, it becomes very important to abide to the rules and ethics of this organisation.
Even without any guidelines, rules and regulations there is an etiquette that needs to followed during online classes but any kind of social media existing. This internet etiquette that has become important for everybody to follow in terms of communications are called as ‘Netiquette’. For starters, one should stop posting about everything which is not necessary, as this could damage the privacy of both the person who posted it and the person he or she posted about. It is also important for everyone to remember that posting something that belonged to someone else, is not only morally wrong but also illegal. The rules of copyrights should be taken seriously for not only people using social media, but the students too. Where the students can quote out the definitions given by philosophers by giving proper credit to them, they should refrain from copying someone else’s work and present it as theirs. A person’s behaviour in the internet should be courteous and kind, just like in the public. One is free to present his or her thought in the internet without being aggravated by others opinion.
If one is following netiquette, he or she is not only being a safe internet user but responsible, smart, and having respect for oneself and others. It is true that internet has developed our everyday conversation. Internet has definitely lifted up all the physical barrier and has formed a new world where people are connected to one another. While technology has made it easier to connect with friends and family around the world, we should set a clear boundary on our constant need to use the technology and give some time to our mental health. While internet provides anonymity for those who are socially shy, it is very crucial to not use this benefit for something negative. We should not only be concerned with our feelings and emotions but also consider feelings and emotions of others. Boundaries are very important and should be applied everywhere. This implies when we’re online too. One must be always considerate and should always think first before doing anything that has the potentiality of disturbing and hurting others.
There is a tendency of every person to misbehave while online. That’s when the concept of self-control comes up. There are certain precautions that should always be taken to help a person to minimalize his or her behaviour that can be offensive. This self-control should be practiced in every aspect of life not only online. If one fails to behave properly online, it indicates that person is rude socially too. One must practice self-control by achieving specific or long-term goal. One must concentrate on behaving properly in present if he or she has a focus about the future. As future can be changed with the acts of the person in the present. One must be careful of his or her choice of words when speaking in online platform. While swearing and offensive words is inappropriate in public, it is inappropriate in online platform too. If the person has not something good to say, it is not important and necessary for him or to say something bad. The current generation has more knowledge about internet than those who belong from older generation. But having more knowledge does not mean that one is free to manipulate and abuse its power. Not everything is hidden when it comes to internet and one must keep it in mind before abusing its power.
When someone is behaving properly online and ignores another person not doing that, he or she is as much responsible as the other person. Online etiquette does not only ask for the people to behave properly but also asks them to influence others to behave properly. This means that no tolerance should be shown by one toward any kind of misbehaviour in the internet. It becomes very important for people to follow netiquette and encourage others to do the same. Online behavioural standard has been evolving with time. While online guidelines cannot completely discuss about the standard that one is expected to meet. One must try to behave what he or she is expected to without even being instructed.
One should stop his or her habit of evaluating and talking other people’s achievements, opinions, and beliefs in the internet. One should always be humble and less judgemental when his or her idea does not match with others. One should always find a way to solve his or her habit of misjudgement. One should always ensure that he or she is following and courting his or her behaviour when online. As has been shown, this boundless, yet vulnerable platform of human interactions has been challenging by one to find a way to not only communicate his or her thoughts efficiently, but delivering it with dignity and mutual respect. Nowadays moderating oneself cannot be a strategy that promises permanent success, as it copes with symptoms. Moderation of behaviour does not heal the wounds. The right medicine here is formalizing how we should and might interconnect with each other to ensure that our discussions are fruitful and yet polite. In internet platform, one doesn’t meet another person face to face and so he or she may not know how to conduct himself or herself properly when interacting with others. One should display ethical behaviour when he or she goes online. One should not violate the laws and guidelines of society and internet platform, thinking that one will not get caught. One should employ discretion in online interactions by adjusting his or her responses and behaviour according to the kind of people one is happening to interact with. In cyberspace too, some people have more power. They may be experts in an office or system administrators. Such people should not take advantage of their power.
A classroom is different from other social environments that a student may encounter in his or her life. The classroom should be a learning-centred environment in which faculty and students are unhindered by disruptive behaviour. Students differ in personality, interests, learning styles, and levels of thinking in every class. In such a situation and for the smooth running of a class, certain rules, regulations, moral standards, and procedures are created and have to be strictly followed by students in classrooms. When it comes to online classes as much as online etiquette is expected to be followed, the guidelines are also very much necessary to be followed. There is some basic behaviour that is expected from every student. It includes avoiding to arrive late at class. Being present in online class on time also shows that one is respectful of others time. If one is going to make the effort to arrive on time and be in class, one should also make the effort to stay actively engaged in class, as it assures the teachers to whether move on or explain things again. One of the most important factors that one must follow is that the students should come to class all prepared with all the homework completed as assigned by the teacher. It is a myth among students that they don’t feel the need to complete the homework, since it’s an online class and there is a very slight chance that teacher might catch who has or has not completed the homework or the assignment. Online classes depend a lot on links and internet connection, so one is expected to be patient and not to panic. If one faces any kind of technic problem, that is in general faced by everybody try to cause less chaos and try to help the teacher if asked to. There may be times when one needs to leave class early, but one must not make a habit of doing so. If one does need to leave class early, the best solution is to alert the professor ahead of time. Although students have to access classes from the comfort of their home, it is still a professional setting for their teacher to be presentable and to attend the classes properly. One must also need to know the ins and outs of the specific tool used by his or her teacher and take some time beforehand to learn all the features, instead of constantly asking the teacher about it and thus creating disturbance in the class. The incidents of accidental unmuting can be avoided by taking precautions and being alert of the tools used in the online classes. When it comes to mics one should also assure that he or she is not speaking directly speaking and breathing on their mic as this too could create a sense of distress. One needs to be wary of his or her surrounding while accessing classes so as not to cause any distraction or disruption to sessions. It needs to be ensured that the person is in a quiet place during class so that there are no sudden sounds which can be heard by the entire class. All the participants of an online class need to remember that it is a classroom setting, consisting of all learners' classmates and teachers. Students need to follow all the etiquettes they would in a regular classroom. We can ensure a happy and peaceful life by the way of implementing all the etiquette as a habit.
Using etiquette as a habit not only makes us feel good but also increases our importance and respect within the eyes of others. “Netiquette,” is important during a civilized work environment or personal relation. The first rule of internet etiquette is to be kind and courteous. Being nice includes avoiding cyber bullying. One must think about how they would have felt if someone else said whatever they just typed about themselves. If one finds it the least bit disturbing, then one must not hesitate to delete it.Most people use the web to save lots of time, so honour that and keep all messages as brief as possible. If somebody has more to mention, one must try breaking it up into smaller topics. this may force him or her to be more organized and enable the reader to digest the knowledge during a more orderly manner. One must avoid using all caps in any email or post. As it means that he or she is shouting, when that might not be the case. One must be careful to what he or she posts. So before posting anything on internet one should always check its tone and message. Since anything one posts on the Internet is out there for all to see, he or she should avoid adding anything personal. If someone appears to be new to the internet, one must offer their assistance. Share information on proper etiquette and educate others about how to behave properly.
The usual approach to behave properly in internet is to develop written lists of rules for online behaviour. These basic, sense rules are often effective, but they're often read and forgotten. When upheld by moderators, community leaders and participants they're more likely to successful; particularly for setting standards within the youth of a community’s life. Moderating is a well-known practice for preventing impolite behaviour online. However, moderating are often demanding and time-consuming, particularly in active communities. Knowing when to regulate groups, when to abandoning, and the way to usher in non-participants isn't as obvious because it might sound. Role models could be the most beneficial way to promote good and healthy behaviour in internet platform. Watching what others do is also a typical strategy for newcomers to an internet community. It enables them to evaluate the tone of the community before launching in, and then avoid causing offense. Even the people belonging from an established community adopt this wise strategy when joining a new communities because each community has its own standards and ways of behaving. What's acceptable in one won't be in another. Mentoring might be helpful in technical, specialist and cross-cultural communities. This approach has been used widely and mostly in education environments. This approach encourages empathy and shared understanding, which is vital online where non-verbal cues are reduced or missing. Digital etiquette is basic rules you ought to follow to form the web a secure and better for yourself and others. You also should be careful how you word things because you could be joking and they may not get your joke and instead get offended. People usually know these rules and just choose to ignore them when on the internet because they’re not face to face and they think they can get away with it or feel like they can bully someone so they don’t see their face and either don’t feel bad or just won’t have to deal with the consequences. Being digitally etiquette means you using appropriate language on the internet, not hacking others computers or someone’s personal sites, not downloading anything illegally, etc. Instead of being mean online you could be nice, you could compliment someone instead of writing a mean comment on a picture or even let them know you are there for them when they’re having a hard day. Not add to their problems, do something to make them smile even if it’s only for a second to make their day easier to get through. Besides knowing how to behave appropriately in a given situation makes you more comfortable. Proper etiquette requires that you simply make others comfortable and protect their feelings. you are doing not means their errors or draw attention to their mistakes. In any working situation, you're perceived as more capable, more professional, and more intelligent if you're conversant in the right code of conduct for the workplace. When online the people around you may be feeling just as miserable, but you do not necessarily want their misery dumped on you, so do not share yours with them. Instead, take the time to be well mannered and uphold the small good gestures of life. Netiquette guide cannot address every possible situation you will face as you move through life. There are countless situations in internet when you will have the opportunity to practice it.
While internet creates an energy and excitement that gives birth to creativity and collaboration. Unfortunately, that also means that civil behaviour and professional standards are often overlooked. Much has been made from late about plagiarism and stealing of data on the web. It starts with the misunderstood concept all information on the web is public. Information is public, but it's not a public right. There is a difference. Everyone knows that plagiarism is wrong. But there is another layer of responsible behaviour on social media that is the act of attribution. Which means giving the source of where you got the information you are posting, is not ethical or unethical, it's just polite behaviour. While the principles of netiquette apply to social media, it’s important to know what differentiates social media sites like Facebook, Twitter and LinkedIn from other corners of the net. Because social media sites revolve around adding “friends” to your social circles, they enable users to share information selectively. Not all information has relevancy to all or any users, and respecting people’s time is vital. One must separate them into different lists can make this process easier. It should also be kept in the mind that professional communication and personal communication are growing increasingly blurred. So, one may find it beneficial to keep personal and professional social media accounts separately.
In order to earn respect and to be taken seriously one must follow the basic etiquette when being online. In current generation where everything depends on internet, our future somehow is affected to how we behave outside and online. One must not be ignorant to the rules that is supposed to followed by him or her. Ensuring how to behave properly in present also helps us ensure about our future. It not only ensures that our future is going to safe but it also helps in building our personality. Added benefit to behaving properly both online and offline is that it creates a strong foundation for your community. All the action of one influence a positive impact on the community. Thus, helping the community to develop and grow. When one behaves a proper way online, he or she gets the benefit of building a good relationship with other people across the social network. Proper behaviour specially in online classes helps in making the individual postings easy to follow, keep the conversation thread focused, and the overall discussion on-track. It is important that the behaviour is moderated to have a productive classroom.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayThere is always an exception and rules for proper etiquette in various places can shift from one situation to another. The important this is to remain mindful of how one is perceived in the social platform he or she is participating. And one is perceived based on his or her actions across the social platform.
Internet has occupied a larger space in the life of mankind. It has become prominent in almost all sectors worldwide. The basic advantage of Internet is fast communication and quick transfer of information through various modes.
Get original essayAs with the changing technology ,Internet is used not only for gaining knowledge but is also used for communication purpose. It has become a medium for exchanging or expressing ones ideas. Mostly the current scenario is that people use Social Networking sites as medium of connecting with other people and to share information with them. A Social Network is a wide network of individuals which are interconnected by interpersonal relationships.
As a lot of data is used by the individuals for exchanging information in the form of pictures, videos etc. The generated data is known as social network data. This data helps to determine various aspects of the society. Data mining is the process of inspecting data from different perspective for finding the unknown things. One of the significant task of data mining, helps in the discovery of associations, correlations, statistically relevant patterns, causality, emerging patterns in social networks is known as Association Rule mining
Earlier people used to communicate either verbally or non verbally.Non verbal communication takes place through writing letters in newspapers or making draft etc. This communication has certain limitation and is a bit confined.
There were less or not much means for nonverbal communication. The effect of Internet which is also known as network of networks made people to gain information globally in various aspects.Initially the only use of web was to gather information and to share it.Now a days, Internet has occupied a larger space in the life of mankind. It has become prominent in almost all sectors worldwide.
The basic advantage of Internet is fast communication and quick transfer of information through various modes. In due course of time the need of collecting the information to share, contribute and to impact went on increasing and ultimately gave a spark in gathering, analyzing and channelizing the huge data in a precise manner. Data creation, data collection, storage, retrieving and presentation became part and parcel of the people related to knowledge society. Eventually
Internet is not only a medium for gaining knowledge but is now used as medium of communication too. Presently, millions of people use Internet as a medium to express their ideas and share information. Most of the people use Social Networking Sites or blogs for connecting with people and sharing information. Social networking has thus escalated around the world with noteworthy speed. Many Social Networking sites are now available such as Facebook, Twitter etc. Facebook had more than 1.44 billion active users in the year 2015.
This results in a drastic boom in emerging of Social Sites. For Example Twitter is one among such social networking sites which became popular in a short span of time due to its simple and innovative features like tweets which are short text messages. These tweets are much faster and are used to collect various information. There are millions of tweets everyday which are used for gathering information that could help in making decision.
A Social Network is basically a network of individuals connected by interpersonal relationships. A social network data refers to the data generated from people socializing on this social media. This user generated data helps to examine several assets of the socializing community when analyzed and mined. This can be accomplished by Social Network Analysis. Relationship mapping and measuring is known as Social network analysis[SNA]. Thus SNA plays a decisive role in portraying various assets of the socializing community.
Various data from various social networking sites are stored in files and other repositories, which helps us to analyze and interpret such a huge amount of data together which gives us many interesting knowledge which could help us in making further decisions . Data Mining also known as Knowledge discovering process[4] is the process for finding the unknown insights by analyzing data from different perspective. Here the patterns are discovered in large datasets. The information is extracted from a dataset and remolded..Thus data mining and knowledge discovery in databases (or KDD) are used as substitutes to each other but data mining is the actual process of the knowledge discovery process.
One of the significant task of data mining,which helps in the discovery of associations, correlations, statistically related patterns, causality, emerging patterns in social networks is done by Association Rule mining.
Another mining technique known as Frequent items sets mining play an important role in many Data Mining tasks.
Frequent item sets mining plays a significant role in many Data Mining tasks that try to discover interesting patterns from databases such as association rules, correlations, sequences, classifiers and clusters. The mining of association rules is one of the prominent problems of all these. The recognition of sets of items, products, manifestation and peculiarity, which often appear together in the given database, can be seen as one of the most primitive tasks in Data Mining.
For example, the association rule bread, potatoes->sandwich would reveal that if a customer buys bread and potatoes together, they are likely to also buy sandwich. Here, bread and potatoes is support and sandwich is confidence. Such knowledge can be used for decision making purpose. Consider a social network environment that collects and shares user-generated text documents (e.g. discussion threads, blogs, etc.). It would be profitable to know what are the words people use generally in a discourse related to a specific topic, or what set of words are often used together. For example, in a discussion topic related to ‘American Election’, the frequent use of word ‘Economy’ shows that economy is the most important aspect in the bureaucratic habitat.
Hence, a frequent item set of count one could be a good marker of central discussion topic. Likewise, frequent item set having count or length two can show what the other important factors are. Therefore, a frequent item set mining algorithm run on set of text documents produced over a social network can display the central topic of discussion and pattern of usage of words in discussion threads and blogs. With the exponential growth of social network data towards a terabyte or more,it has been more difficult to analyze the data on a single machine. Thus the Apriori algorithm [6] which is one of most well-known methods for mining frequent itemsets in a transactional database is proving inefficient to handle the ever increasing data. To deal with this problem, the MapReduce framework [7], which is a technique for cloud computing, is used.
Hadoop is an open-source platform licensed under the Apache v2 license that provides analytical technologies and computational power required to work with large volumes of data. Hadoop framework is built in such a way that it allows user to store and process big data in distributed environment across many computers connected in cluster using simple programming models.
It is designed in such a way that one can manage thousands of machines from a single server, with a facility of storage and local computation. It breaks data into manageable chunks, replicates them and distributes multiple copies across all the nodes in a cluster so that one can get its data processed quickly and reliably later. Rather than relying on hardware to deliver high-availability, the Apache Hadoop software library itself is designed to detect and handle failures at the application layer, so delivering a highly-available service on top of a cluster of computers.Hadoop is also used to conduct analysis of data .The core components of the Apache Hadoop consist of a storage part, known as Hadoop Distributed File System(HDFS) and a processing part called as MapReduce.
Methods of discovering relation between variables in large databases is called Association Rule Mining. It was introduced for checking regularity between products in large scale transaction by point-of-scale (POS) system by Rakesh Agrawal. This was based on Association rule.
For eg:-bread, tomatoes, mayonnaise directly refer to a sandwich. According to various sales data of supermarket implies that if a customer purchases tomato and mayonnaise together , he might also buy a sandwich. For Making decisions this data can be used.
T. Karthikeyan and N. Ravikumar,in their paper concluded after reviewing and observing .They give a conclusion that a lot of attention and focus was given to performance and scalability of algorithms, but not given to the quality of the rule generated. According to them ,the algorithm could be enhanced for deducting the execution time, complexity and would also improve the accuracy. Further, it is concluded that more focus is needed in the direction of designing an efficient algorithm with decreased I/O operation by reducing database scanning in the association rule mining process.
This paper gives a theoretical survey on some existing algorithms of association rule mining. The concept behind this is provided at the beginning followed by some overview of research works
This paper aims for giving a theoretical survey on some of the algorithm of association rule mining. The pros and cons of the same are discussed and concluded with an inference.
Rakesh Agrawal and Ramakrishnan Srikant proposed a concept of seed set for generating new large item sets which were called candidate itemsets which counted the actual support for these at the end of the pass until no new large sets were found. These two algorithms for finding the association rules between items in a large database of sales transaction were named as Apriori and AprioriTid.
J. Han, J. Pei, and Y. Yi developed a systematic FP-tree-based mining method called as FP-growth for mining recurring patterns which were based on fragment growth concept. The problem was tackled in 3 aspects: mainly the data structure called as FP-tree, where only recurring length items will have nodes in the tree, They also originated FP-tree based pattern which surveyed its conditional base and then constructed its FP-tree and performed mining periodically with a such a tree. Also, the divide and conquer method was used instead of bottom-up approach search technique.
A new strategy for mining frequent itemsets from terabyte scale datasets on cluster systems was developed by S. Cong, J. Han, J. Hoeflinger, and D. Padua which concentrated on the idea of a sampling based framework for parallel data mining.
The entire idea of the purposeful data mining was included in the algorithm. The processors performance, memory hierarchy and available network was taken into account. This developed algorithm was the fastest sequential algorithm which could extend its work in parallel setting and hence it utilized all the resources which were made available in an effective way.
A new narration for data mining was introduced by P. V. Sander ,W. Fang, K. K. Lau which utilized new-generation graphic processing units(GPU ) known as GPUMiner. The system was dependent on the massively multi-threaded SIMD (Single Instruction, Multiple-Data) architecture given by GPUs. GPU miner consists of three components: Buffer manager and CPU-based storage that handled data and I/O transfer between the Graphical Processing Unit and Central Processing Unit, It also integrated CPU-GPU co-parallel processing mining module, and at last it included a mining visualization module which was based on GPU.
The two FP-Tree based techniques, a lock free dataset tiling parallelization and a cache-conscious FP-array were proposed in “Optimization of recurring itemset mining on multiple-core processor”, which dealt with low utilization of multi core system and effectively improve the data locality performance and uses hardware and software prefetching.Also the FP-tree building algorithm can be reapproached by lock free parallelization algorithm.
To divide the recurring itemset mining task in the top down approach, C. Aykanat, E. Ozkural, and B. Ucar developed a distribution scheme which was based on database transaction.This method operates on a graph where vertices match the recurring item and edges match the recurring itemsets of size 2.A vertex separator separates this graph so that the distribution of the items can be decided and mined independently . The two new mining algorithm were developed from this scheme. The items that corresponds to the separator are recreated by these algorithms. One of the algorithm recreates the work and the second computes the same.
The MapReduce mode based algorithm studied on which was used by the association rules. The Algorithm performance is made ineffective because of single memory and limited CPU resources. The paper developed by S. Ghemawat and J. Dean describes the improved Apriori Algorithm which can manage massive datasets with a huge number of nodes on Hadoop platform and can study many problems which are usually larger and multi-dimensional datasets.
For Cloud Computing , Jongwook Woo and Yuhang Xu,proposed a Market Basket Analysis (key,value) pair algorithm and the code of which can be executed on Map/Reduce platform.
The joining function technique was used by this algorithm to produce paired items. The transaction is sorted in the alphabetical order before generating the (key,value) pair to avoid errors.
A new effective miming of recurring itemsets based on Map/Reduce framework was proposed by Nick Cercone and Zahra Farzanyar, [20] this framework was thus used in Social Network Data. This improved Map/Reduced Apriori Algorithm reduces the no. of partial recurring itemsets and improves the processing time of the itemsets generated during the Map and Reduce phase.
Using genetic algorithm Nirupma Tivari and Anutha Sharama presented a survey of Association Rule Mining in which the techniques are classified based on different approaches. Extreme robustness in mining the Association rules of GAs was used. Desired rules were included into results which were generated when the technique was applied on the synthetic database.Desrired Rules constitutes of the rules containing the general rules and the negation of attributes yielded from the Association Rule Mining. Major changes were needed to enhance the complexity reduction of the above mentioned algorithms using distributed computing.
The paper proposed by D. Kerana Hanirex and K.P. Kaliyamurthie improved the effectiveness of finding recurring itemsets with the help of genetic algorithm. Here, initially the population is created which consists of random transactions which were generated .This Algorithm then continually transforms the population by executing the steps of fitness evaluation, replacement, selection and recombination.
Till date, Arvind Jaiswal and Gaurav Dubey proposed the best association rule and their optimization using generic algorithm. Here the population is transformed continually by executing the following steps: Firstly Fitness evaluation is done to calculate the fitness of each individual , then Selection is done to choose the individual from the current population as parents are involved in the recombination ,then in recombination, new offspring (individuals) are produced from parents with the help of generic operators : crossover and mutation, At last , replacement of some offspring is done with some other individuals, usually their parents.
Algorithm which is used for automated extraction of large datasets of the Association Rule. The output of the paper was optimized with multiple quality measures like interestingness, confidence, support and comprehensibility.
Improved Cluster Based Association Rules (ICBAR) was proposed by Reza Sheibani and Amir Ebrahimzadeh. This mining algorithm can effectively explore large itemsets, This method lessens the large number of candidate itemsets . Also it compares the data with partial cluster table.
To extract coalition between the details of Social Network Data.
To design a programming model which can work in parallel form using MapReduce
The MapReduce Framework is used by Apriori Algorithm to find recurring itemsets which is generated by Social Network data and Genetic Algorithm is used for generating association rules from the recurring itemsets.
With the rapid increase in Telecom Industry, most of the users can now be able to easily access the Internet which indirectly increasing the popularity of Social Networking sites. Social networking is increasing at a tremendous rate. These sites contains a huge amount of data. So, Mining of data is useful. Our Developed System is fast as it exhibits parallel processing. The developed system finds association rules by using EAMRGA Algorithm. For Optimization purpose it uses Genetic Algorithm for finding optimized and relevant association rules. The experimental work shows that the efficiency of the implemented algorithm was improved by 39% and accuracy of the given rule obtained was increased by 25%. As a future work
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayWe will face the data in range of terabytes, handling of that much amount of data and reducing the processing time will be the main goal. Hierarchical or parallel approach can be used to handle this job and can be implemented with large scale use of the features produced by Hadoop.
Imagine a world where everything you use could capture your interactions and transmit that information to servers somewhere on the web. Imagine that toasters, washers & dryers, cars, refrigerators, phones, digital watches, TV sets, blenders, coffee makers, game consoles, smart meters, etc, recorded your usage, actions and preferences and fed that information to their home servers. This is not an implausible idea as there are already more than a few devices (Cable and Satellite box sets, game consoles) that already behave just like that. But in our not too distanced future all of our powered devices will follow that model. Internet of Things (IoT) is about physical objects reaching the Internet on their own. By using technologies like RFIDs, sensor networks, short-range wireless communications and LANs physical objects become smart devices that would make periodic calls to their data centers either to report on their status or transmit the latest batch of locally captured data. This model will gradually change the way we view and interact with the physical things around us and will offer great new opportunities to manufacturers, distributors, service providers, retailers and users alike.
Get original essayFor example, it is not hard to image that in the future appliances will schedule their own service calls, preempt real-time measures to remediate an issue or relay users’ inputs and usage data. Equally property-casualty insurance industry could use the information compiled by a person’s automobile’s IoT to more accurately assess and price a particular policy and prevent fraudulent claims by looking at the data provided by policy holders’ driving habits (Progressive Insurance has introduced Snapshot device which plugs into a car’s diagnostics port and keeps track of a person’s driving). Using information gleaned from the Internet of Things data, product design could be helped by examining user interaction patterns, supply-management and distribution logistics could be optimized by reviewing adoption rates - how quickly a device goes from manufacturer to distributor, retailer and finally getting connected to a home server from end users’ domiciles – and health care delivery could be made more efficient and effective by making common portable devices, like a cell phones or digital watches, health monitoring tools that could transmit bearer’s vital signs information. Welcome to the Internet of Things world.
It is expected that by 2020 about 50 to 100 billion things will be connected to the Internet. These smart objects will be using common connectivity devices to link to the Internet and exchange messages with arrays of dedicated servers, potentially generating a staggering 35 ZB/year of data. If you were wondering, a zettabyte (ZB) of storage capacity is 10 to the power of 21 bytes. Just to get a better perspective, as of 2009 the entire world wide web was estimated to contain close to 500 exabytes of data, which is half of a zettabyt. IoT will produce lots of data. IoT data won’t be at all different from that of Big Data which is heterogeneous, dissimilar, unstructured and noisy. But more remarkable will be the growth rate of IoT data. Currently the amount of data generated by social media, transactions, public and corporate entities are scaling faster than computer resources allow.
Add to that challenge the volume of data expected to be generated by IoT and it becomes clear that traditional solutions of data storage and processing could hardly be applied to ingest, validate and analyze these volumes of data. IoT data will be granular in nature and will have information about locations, temperatures, patterns and behaviors. In the IoT world the challenge will be to finding ways to analyze and capitalize on this information quickly and in near real-time. It should come as no surprise that organizations that are able to make business decisions using this data will have a strategic advantage over their competition. But as mentioned before to do so requires a robust computing infrastructure and that will not be cheap. IoT data, like that of Big Data, is unstructured and here lies one of its more significant challenges.
To address this issue effectively it is important that manufacturers, distributers, service providers and retailers agree on a simple, generic and textual format to build and describe IoT data, similar to XML markup language. This investment in standardization will affect the entire IoT/Big Data processing pipeline – data acquisition, extraction & cleaning, integration and aggregation and finally analysis – as some existing tools could be used to clean and transform this data more quickly and cheaply to a format best suited for analytics applications.
Technology challenge because of the exponential growth rate of IoT data, the need for a computing infrastructure that can balance performance, energy efficiency and cost becomes important. To scale successfully for the data growth patterns envisioned by IoT IT departments must prepare for hyperscale computing environments with thousands of computer clusters that can support scalable and predictable frameworks which process large data sets. This new computing environment is best achieved in the cloud where sharing of very large expensive clusters has become economical. Another benefit of cloud computing is its modular architecture where horizontal scaling can be achieved quickly and easily. A central challenge in IoT data processing is the limitations inherent in conventional computing resources. Largely due to power constraints, processor clock speeds have stalled and instead processors are being built with higher number of cores. As a result application developers must now be concerned with parallelism within a node, as well as across nodes. Because this architecture is very different – more shared processor caches and memory across cores - techniques for inter-node processing algorithms do not work for intra-node parallelism. As such application developers must reevaluate how they design, build and field data processing applications.
Another technology challenge is the traditional I/O systems which for decades were designed and optimized for sequential I/O performance rather than random access. But with advent of solid state drives this performance limitation is disappearing and hard disk drives are being replaced by the newer generation of I/O systems which in turn necessitate IT departments to rethink how they design and implement database systems for large data set processing.
Since an IoT/Big Data computing infrastructure requires large investments it is even more important that IT departments better manage their operations and resources. A user driven application optimization will fail to meet performance goals of process intensive jobs cost-effectively. Such architecture requires a holistic optimization approach. Remember that as jobs get bigger system failures become more frequent.
Should an appliance’s usage patterns, say how and when you use your dishwasher or your choice of washing liquid, be available to the appliance manufacturer? Is it legal for a gaming console to relay your favorite game’s information to the console maker? And should that information be shared with the game publisher? And if you passed a red light and your vehicle recorded your mishap is it ethical for your insurance provider to use that information to adjust your premium and reassess your policy? Should the insurance company pass that information to the local law enforcement agency?
Data privacy and security are not new topics and certainly are not exclusive to data generated by IoT. What is different here is the question of privacy “contract” between machine and human. We have come to accept that some of our smart devices, such as computers or phones, do capture our interactions with them – even the ownership of this data is a matter of conjecture - but we’ve never had to consider an appliance or a vehicle with that kind of potential.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essaySo the question becomes who owns the data generated by IoT and what is the acceptable or legal usage of this data. For some types of information there are already legislation to limit their usage and distribution, such as a person’s medical or financial information. But there are no legal remedies for controlling access to data generated by IoT. Eventually legislation will catch-up with technology but for now we can only assume IoT information won’t be used to the disadvantage of consumers.
Smart city is no more a future concept; now it is becoming the reality. A smart city is an approach of the city to provide core infrastructure and a decent quality of life to the people with a clean, sustainable environment and technologically evolved smart solutions. The concept of has been with us for a very long time. Scientists from 90s, they were already thinking about smart cities is the future but, due to lack of technological knowledge, resources and infrastructure, they couldn’t succeed to build one. However, now the things have changed, we have advanced technologies and peoples with creative, innovative and intelligent brains. Thousands of people, around the world, are working on various projects to make smart IoT (internet of thing) devices which will help to build a smart city and eventually a smart world. Kevin Ashton, who is known as father of IoT, once said” the internet of thing is about empowering computers so they can see, hear and smell the world for themselves”.
Get original essayThe basic idea behind developing IoT is to connect all the possible devices that we use in our daily life to the internet. Issues with resources like water and energy as well as increasing awareness of safety, security and efficiency are driving the need for more information and better option to connect and manage the advanced sensors to build the smarter world. In a few years, global national and regional networks will connect trillions of wireless devices. It could be anything that we can think of such as refrigerator, coffee maker, watches, microwave oven, washing machine, headphone, lights, car and many more. The space for IoT devices is growing and according to the statistic portal, there will 75.44 billion connected devices by 2025. Even a single house will be equipped with hundreds of sensors and devices, which will be sending and receiving data from and to the internet. The Internet of thing is going to connect the world. The best part is, we will be able to monitor and control all the device that is connected to the internet.
Benefits of deploying IoT:
It will help to make better transportation system. People are already using IoT devices to solve traffic problems in the road by placing different sensors which are sending real time updates about traffic, accident through the internet so that people can take better decision. Autonomous vehicles are the top example of IoT devices in today’s context, in near future IoT networks would help these vehicles to talk to each other. This will help to improve the traffic condition on the road and help to increase the traffic security. Monitoring, control, optimization and automation (this is where the machine learning and Artificial comes in).
IoT platforms:
As an ambitious student in the end of my 17 years of age, I am aware of the idea about IoT as it is very possible that in the near future we would all start using this concept of connecting devices that exchange information and act upon the received information to make decisions. Although, this idea is revolutionary and innovative, I genuinely think the cons would heavily outweigh the pros of using such technology.
Get original essayBy the year of 2050, the Internet of Things will have become more popular among youths and established itself as it is revolutionary and has numerous applications. In my genuine opinion, I don’t imagine a future with flying cars or skyscrapers reaching the vastness of space, but on the contrary, I expect people to have fully committed their free time to the Internet, thus being induced in Internet of Things more than they are now.
The suggestion that in 30 years the average number of connected devices per person will be 25 compels great interest in me as I’m young and my future depends on technological changes. The concept of connecting all of the devices we use is great, but wouldn’t this make us too reliant on technology. Already, people have started making changes in the form of applying IoT in their work environments and deduced that its appliance can be a very useful tool saving us numerous hours of work. An excellent example as to how IoT can be put in great use is if we take the agricultural industry. Even now, agricultural companies have decided to make use of the system and connect all machinery in one system, making it easy to set given parameters and leave the system to take action when needed to. The exchange of information between the interrelated computing devices acts as if it were humans exchanging thoughts and ideas, but in contrast of people, acts decisively when given a command, making it far easier for a company to work efficiently.
Yet again, all of the advantages can be disregarded if there is even a single flow in the complex system of IoT. Moreover, accepting the concept and application of Internet of Things can change our lives in a negative way. Allowing IoT to breach our privacy is a major flaw of the idea and is the fundamental factor making people hesitant to apply it in their lives, homes. Many sci-fi movies can be used as a suitable example to give an insight as to how such extensive amount of personal data can be abused against their owners. Additionally, another disadvantage of accepting IoT into our lives would be that many people would fall victim to unemployment, as it would make more sense to owners of companies to use and apply IoT to cut losses and maximize profits and efficiency. The last but not least important disadvantage of IoT is the over-reliance on technology it would impose on us. Automatizing homes and industries would take a devastating toll on people if the system crashes down and there is no way to restore information interloped in the communicating devices. Even the slightest error would plunge people in disaster if we were to be so reliant on IoT.
Although, IoT would prove to ease people’s lives and have a significant impact on our work environment, I cannot contain my concerns regarding the disadvantages of the concept.
Throughout the summer 2019 semester, I got the opportunity to receive a Management Information System internship in one of the various well-known corporations in Viet Nam. The association I connected to being HongLeong Bank Vietnam (HLBVN). ‘The Bank is technology-focused and emphasizes the development of financial capabilities to serve its clients across Singapore, Hong Kong, Vietnam, Cambodia, and China. Hong Leong Bank Berhad is listed on Bursa Malaysia Berhad and forms part of the Hong Leong Group. Headquartered in Kuala Lumpur, the Bank has a strong Malaysian entrepreneurship heritage (HLB About us).’ In the beginning, the financial division seems uninterested for me, yet my internship position by one way or another adjusted my thoughts regarding banks and their work. It began from the first of July and went on until the middle of August. However, therein short amount of time, I took in a few things concerning the banking industry, met attention-grabbing individuals and experts, and acquired various technique skills, which will be discussed in this internship reflection paper.
Get original essayMy jobs and duties as a Management Information System intern at HongLeong bank were an assistant to support my supervisor taking care of daily reports. I was further required to deal with all the adjunct documents that are associated with the sales division. For example, expense claim forms, admin tasks, market survey, broker commission, and so forth. The working hours will be 8 am – 5 pm from every Monday to Friday (including 1-hour lunchtime). During my internship period, I was ordinarily busier within the morning than in the afternoon, due to most of the report has to be sent out before noon.
In the first week at Hong Leong, I mostly learned from my associate in how to run regular reports concerning the bank sales and about the corporate work process. I became aware of the SQL programming system that the Bank was utilized. Later in the first week, I began completing and conveying daily reports, such as daily deposit, daily loans, sales activities. These reports were my work routine toward the beginning of the day to give the sales department to their regular updates.
The first task that I needed to complete was the ‘Daily Deposit’ and ‘Daily Loan’ reports. These reports expected me to download financial data of disbursement and priority banking customer for the previous day. I also needed to run the existing SQL code to get data in the past day and copy-paste the numbers we got in an all division offer Excel record. It usually took me around 30 minutes to finish these two reports.
The second task that I expected to complete was the ‘Daily Sales Performance’ report. The report required me to executing SQL code to find the Average Balance and utilized an update Excel record from the chief that I got each morning. I also needed to check whether if the report was correct by comparing the data with the ‘Daily Deposit’ and ‘Daily Loan’ reports. On the off chance that the data was correct, I can promptly send it out to the Direct Sale and Relationship Management. If the data was not accurate, I needed to recognize its problems and reported it to the manager for a solution.
Another task that I needed to finish was ‘Broker Commission’ report. The report required me to update whenever I received a commission form from a broker in the sales division. This report has to be done and sent to the financial department twice a month for payment. In this report, I needed to get the financial data from SQL and copy-paste it to the existing excel file. Then, I needed to search for every broker’s customer name that I received and updated it in a financial sheet in Excel. The report used to take approximately 30 mins – 40 mins depending on the numbers of Broker Forms received. Other than doing reports, I also helped my team to translate bank policies or guidelines from Vietnamese to English or English to Vietnamese and helped create market surveys for the bank tariff. The task required to research about the other banks saving or deposit rate in-state and out-state, and different administrations charge inside a bank.
Other than that, I got tasks from Finance and Direct Sales division. Often, these divisions will demand a rundown of the transaction from a selected region in Vietnam from my manager to do crosscheck with their data. For instance, Direct Sales needed to know how many new customers they have made and their remaining fund in-out throughout the month. I expected to create an Excel file that satisfies all their solicitation. But before I start my task, the manger often demonstrated to me how the completed work should look like and where to get the data for the request. These advance reports regularly took me around 45 minutes and required approval from the manager before conveyed. Moreover, I also helped my manager to create a PowerPoint for a training program called ‘On-Boarding Customer Process’ and helped create a new monthly Sales Recognition certificate by using Adobe Photoshop.
Next in this internship reflection, I will mention the skills being useful during my internship. I found that ISQS 2340 and ISQS 3348 helped me a lot when I was doing my internship at the HongLeong Bank. Through the Introduction to Information Technology (ISQS 2340), I have learned many Microsoft skills by doing MOS Excel certificate and creating Access database and its relationships among tables. I also learned by creating a presentation for a company and practicing Pixlr Editor or Adobe Photoshop for pictures. By taking the course Database Management System (ISQS 3348), I have learned how to design relational databases using Entity-Relationship (ER) models. Then, develop an SQL that manipulate relational databases and their data.
During my internship, I was utilizing Excel every day. This experience has helped me work quicker and learned various types of commands at work. The other programming I learned was SQL, and most of our financial data were copied from it. I believe that the knowledge I have gained from the Database Management System class was useful. Since it gave me a fundamental comprehension of what the code was about and where its data originated. Overall, I believe my knowledge of banking framework has enhanced a lot. Particularly in the Priority Banking office, I learned numerous things about monetary standards and the methods for directing cash stream in the Bank. Through this experience, my time management abilities improved a lot as well due to all the deadline undertakings that I needed to complete.
As I have not taken many major courses in ISQS, yet with all the upper-division courses, I would say the entire curriculum did help me a lot in the company. For sample, Accounting 2301 gave me a general thought of how to pursue credit and debit for every transaction. These essential aptitudes were useful when I was required to compare the raw data about the net fund in-out from the Direct Sales official deposit account. Next, I have also learned how to write a memorandum and a routine message through the course Business Communication 3373. Often time, I was required to write a routine message for the group learning exercise meeting or write a memorandum that requests money to obtain vouchers for a customer survey.
Next in this internship reflection essay I will discuss the challenges I faced. One of the challenges for me was to adjust to the new condition and adjust to the associates. From the outset, I was apprehensive that I would not become acclimated to working with something very similar consistently, yet I figured it out that it was not exhausting by any stretch of the imagination. This was a challenge for me because I only have a short amount of intern time to learn so I was hoped to do more than just manual work, yet I found that repetitive work might make one feel safe and secure from running reports. Frequently, the financial data that I got or the data that I executed from SQL wasn’t right, and by distinguishing which part wasn’t right from those raw data was a satisfying moment for me. Likewise, I was afraid that associates would treat me differently since I was the youngest in my division and that I wouldn’t learn various things with such a short intern time contrast with others understudy I met at the Bank. Luckily, everyone in the team was delightful towards me, explicitly my manager, she extremely minded to me. She showed me heaps of things and included bunches of undertakings from various office as my task for me to learn. Things that I liked/disliked/surprised about the internship I surprised how welcome the head of each department is toward the intern. They regularly planned to have lunch with us and give out accommodating tips in work life. One thing I disliked about the internship was the slow PC performance when update files. Frequently, this led to the problem of losing unsaved data and required more time to redo the work. In like manner, I have discovered that I wanted to work in the financial division since I delighted in the work they are doing. I think beginning a profession in the financial division was a decent choice for me. But I also would prefer not to devote all my youth to work in the banking area and attempt myself in various enterprises and various positions.
The internship program is an excellent opportunity for understudies to enhance themselves and to recognize more about where they want to be after graduation. I feel that it is easier if understudies could get an internship and ask for a full-time job after they completed the intern. Nowadays, most organizations are following those approaches to set aside the training time when hiring new workers. I would encourage other interns to applied organizations from various business and positions that relevance to your major, for instance, hotels, telecommunication, real estate, nourishment organizations, and so forth. By working in a different field and position can help you explore new things and learned how to communicate or deal with different types of people. I would also encourage interns to voiced out to their supervisor if they wished to learn something else in a different department.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayIn conclusion, I was pleased with my two-month internship program at HongLeong Bank, Vietnam. I have gained vital information about the financial part, increased delicate aptitudes, and met great colleagues. I trust this entry-level position is a decent indication of my initial profession.
I’ll start my accounting internship report essay with an overview of the company I temporarily worked at – AMAC. AMAC was formed in 2006. It is engaged in the services, supplies, distribution and marketing of petroleum & petrochemical products. It has expertise in fuel and lubricants industry. Being in the business since last ten years and having worked for market leaders like Shell and Chevron, AMAC has ample experience in this field. Company obtained its National Tax Certificate in July, 2007 and also registered in General Sales Tax (GST) in May, 2008 to expand nationwide operation; AMAC has also registered in Company Act 1984, as a Private Limited Firm in Pakistan since Feb-2012. AMAC PVT LTD worked with Shell Pakistan Lubricants as an Authorized Agent in 2013 and 2014. Then resigned from Agent-ship to acquire Distribution ship of Chevron Pakistan Lubricants in late 2014, and now working as Authorized Industrial Distributor.
Get original essayFinance department is one of the most important department at AMAC. This department is merely responsible to keep a check on the operations happening inside and outside the AMAC House mainly at the Terminals in all over karachi. This department is responsible for the accounting for product purchases, hospitality, and costing and product profitability analysis, in addition to that it also accounts the transshipments and sales that are made through tank Lorries, rails and pipelines to different depots in the country. This department also manages audit and recovery of PDC from the government of Pakistan, and conducts financial analysis of new business opportunities that arose in the country. Another major function of this department is to set the prices of fuel on monthly, fortnightly and in some conditions on need basis as well.
Whole department is subdivided into 3 subdivisions, Purchasing, Inventory and Pricing. In purchasing we have Hospitality income as well. The inter-department structure is as follows.
Pricing includes costing of both regulated and deregulated products. Regulated Products are those products whose prices are regulated by Oil and Gas Regulatory Authority (OGRA) (such as PMG. Deregulated products are those products whose prices are determined by Oil Marketing Company itself (such as Lubricants) with concerned with marketing department with an eagle eye on their competitor. Cost plus margin technique is used to determine selling prices and OMC’s and Dealers Margin are set by Oil and Gas Regulatory Authority. Inventory Accounting is another function of finance department which involves day to day accounting of their inventory because AMAC has immense storage capacity therefore inventory accounting plays important role in decision making. It also provides check in balance on those responsible for operational activities relating to inventory. For financial reporting purposes First in First out (FIFO) basis is used to account for inventory. Purchasing is also very important part of this department which involves ordering inventory at appropriate level which does not give rise to unnecessary holding cost and availing discounts by negotiations. It also involves accounting of Goods and Services Tax which is imposed by Government of Pakistan on purchase of products.
Purchasing section basically estimates the demand of the oil in the Pakistani market and place order to refineries. They purchase the petroleum products from local and international markets. The process flow of the purchase department basically starts with estimating the demand, placing the order & forecasting for the next order placement.
The department also manages the agreement of National refinery limited (NRL), Pak-Arab refinery limited (PARCO), Attock refinery limited (ARL), Bosicor Pakistan limited (BPL) and Oil & gas development corporation of Pakistan limited (OGDCL). Some of the below mentioned points were found similar in the agreements.
The Hospitality Income section deals with the hospitality income from the tanks storing of fuels for other OMCs by charging rent on them so it has kind of a secondary functions such as management and accounting of Hospitality income. As AMAC believes in welfare of whole society therefore it also allows small Oil Marketing Companies which do not have much storage capacity, to use their storage tanks for which AMAC charges them rent to cover the maintenance and opportunity cost. This income is then accounted as other incomes in profit and loss statement.
In this section there are two main functions regarding managing inventory;
Inventory Accounting involves day to day accounting of their inventory because AMAC has immense storage capacity therefore inventory accounting plays important role in decision making. It also provides check in balance on those responsible for operational activities relating to inventory. For financial reporting purposes First in And First out (FIFO) basis is used to account for inventory. In the end Comparative Analysis of TSLR of same month with comparison of previous year is made in the form of reports.
Common tasks that fall to this function include sourcing and diversification into lucrative businesses, deals, raising debt and equity financing, best suitable location from which company can take benefits, making capital structure decisions and providing insight into high level strategic decisions such as entering a new market.
At AMAC Finance is a vast department with several assignments taking place. Different employees work on different assignments with just one major objective, which is the transparency of all operations.
The assignments that I was assigned during my 6 weeks included the following ones.
I started my first week of internship with the introduction, functions of all the departments and its importance. The first week was mostly aimed at me observing different departments and how departments coordinate with each other. At the end of the 1st week I was able to think that how all the departments of the company work together and there is a chain of command that goes from Person A to Person B and so on.
Every month the transactions of the lubricants are measured in two ways; one is done physically/manually, the other is done on QuickBook. At the end of every month, the two entries are compared, this is known as the reconciliation. The values of both the records are matched, and if there is some difference, then that can be tried to justified, in terms of some physical or computer error. Otherwise the difference, is questioned, and has to be justified. I was able to reconcile of two months August and September 2018.
TSLR stands for Tank Stock Loss Report in which the losses/gain in the oil, are mentioned. The objective of this analysis was to determine the total loss/gain of specific tank at a specific terminal. The tank’s net of every month was noted separately and was punched in the excel sheet to prepare a proper analysis of the TSLR for the last fiscal year.
In case of some abnormal behavior of the performance of certain specific terminal, Finance department questions the operations department about the abnormal behavior in writing. The operations department is bound to answer those justification based on certain facts and figures. After receiving those justifications, they need to be verified. If the answers are justifiable then the questions are removed, others are then questioned in the CFT meeting of the month.
A research report was assigned to every finance intern individually, the topic that I was assigned was the Impact of CNG Products on Petrochemical Products. We were bound to submit the report on the final day of our internship, we were suggested to interview supervisors of different finance departments, read articles & news, and surf on the internet to find the adverse effects of the CNG Products on petrochemicals. My report was prepared after I had interviewed many supervisors and after researching the online journals and articles, and finally concluded that CNG has many positive points, one is the high amount of gas in the country, it is less harmful to the environment and the government support with it. So initially it had affected the petrochemicals really badly, but as the decrease in the government support with CNG, which can recently be observed by the prices of CNG, and the closure of CNG stations is leading a rise in the petrol/diesel consumption yet again.
My internship at AMAC was a great learning experience. It helped me get a practical insight on how departments work in such animmense organization. Finance being one of the most important department in the purchasing process of AMAC, Private limited, gave me a lot of experience.
I studied this course in my first semester and this really helped me out as Microsoft Excel is a very important application which is being used in all the organizations. While preparing the monthly Reconciliation report, major help was acquired with MS Excel, in which functions like VLOOKUP, SUMMATION, IF, AND & HLOOKUP were used. Other simple functions of MS Excel like making tables, merging cells etc. were used for the other assignments.
BPS was studied by me in my 7th semester and it really helped me a lot because as most of the time employees/supervisor used to talk to me in English and I was able to reply to them with confidence and in a clear way so that it was a two way communication. When I took this course, my teacher helped me in gaining my confidence to speak more fluently.
This course really helped me in understanding of financial statements. One of the major issue that was constantly being discussed with the interns for a unique solution was of the Circular debt, that AMAC is facing. I studied the concept of circular debt in Financial Management, which refers to as the debt prevailing among different companies. Each company is liable to pay to the other company, and is dependent on the other company to pay. In Financial Management, during the preparation of the report on the Working Capital Management of Oil & Gas Marketing Companies, we analyzed the performance decline because of the circular debt as well.
Pakistani Economic Policy was another important course that I studied and realized its importance while serving as an intern in the finance department. While being briefed about the purchasing section, I found out that the order for the delivery of petrochemicals is placed at least 15 days before. Keeping in mind the economic conditions of the country, the estimated requirement of the country is calculated and the order is made. As per the confidential information provided, if in case of war, Pakistan can survive without oil supply for the next 21 days. Hence the requirement is calculated to keep the country running for the next 21 days without any oil supply.
As a part of our internship, we were assigned a topic to every individual finance intern to research on a topic, the topic I was assigned was “Impact of CNG Products on the POL Products”, for this research I was suggested to interview different executives and senior in my department, as well as other departments. So I personally interviewed quite a few senior employees to complete my research. The research interview skills that I learned in the Methods in Business Research course were really helpful, and my research was supported by many of the senior employees in the finance department of AMAC, Private limited.
My experience at AMAC was quite amazing. It opened up my mind how to work efficiently in a systematic way. My internship was filled with responsibilities and I did them carefully and timely but this would not be possible without the help of supervisors and some employees who showed me how the work is done. Moreover, I was able to apply the theoretical knowledge I learnt from IOBM into the projects and I realized how useful were all those core courses and electives and how they helped me in my entire tenure of internship at AMAC. I was able to perform all the tasks efficiently and was able to come in the good books of my supervisor and colleagues around. I learned in my electives in the practical world and I also learned that how you should get the work done through third party. Hence, I would like to conclude that internship at a Oil marketing Sector was the best experience I could have up till now.
Keep in mind:
This is only a sample.
Get a custom paper now from our expert writers.
Get custom essayMy recommendations to AMAC are:
Since the very beginning of the company in 2011, Antila has worked towards emerging as a niche in a highly-regulated and controlled business. Over 7 years, Antila has created a High valuation within just 7 years in Indian Market, with establishing world-class integrated business model that helped garner Expanding Market through our PAN INDIA and several stringent international regulatory approvals.
Get original essayAntila also entered in Contract Manufacturing business in India and within a short span of time, nowadays Antila is awarded as leading contract manufacturing company in India.
Coupled with the strength of technical know-how & professional expertise, Antilas’ growth elevated through the diligence in work carried out by the members to take the organization to newer heights each passing year. This proficiency was reconfirmed through the thoughts about Antila as being amongst one of ‘India's Best Companies to Work For’ and one of the best companies in ‘Healthcare’ industry by professionals & Leading consultants in India. Antila currently exports its products in more than 25 countries.
Running parallel on path of striving excellence, Antila is serving as a socially responsible organization, fulfilling goals beyond the business commitments as well. Hence, always supports various social causes aimed at promoting good living through sports, culture, education etc.
Antila is now a financial management and marketing company, with interests in investing in new businesses with specialty Nutraceuticals and FMCG as focus. With the determined notion to prosper in all the endeavors we undertake, we will always make every effort to grab an opportunity to take the organization to the next growth trajectory. Antila have added new feather as “Antila Wellness Private Limited “for Nutraceutical and heath supplement products and have recently started world class manufacturing plant for Wellness Products and within just one year have launched and enter in entire India for nutaceutical Market. Antila have started regulatory works and registration process in Africa, Philippines, Nepal, Kenya, Myanmar and several ASEAN countries to expand their International market in nutraceuticals product also.
Being a people sensitive organization, Antila believes in the philosophy of ‘people power’. Elements of fun are essential parts of ‘Life at Antila’, which ingrain a feeling of involvement & connectedness among the members with the organization. Being a family-oriented organization, Company believes in their members to have a healthy work-life balance, so they can be their best. Due to value-based culture is of utmost significance to company and the company makes sure to hire talent that is a values-match, solely to preserve their culture.
Antila is driven by a professional approach, offering each individual a challenging career rather than a mere job. Ensure comprehensive development of all members, instilling their principles in them and fostering the unique environment of accountability, quality, and winning. They grow with the organization, building competencies, careers, and long-term relationships. HR & Higher Management has initiate culture for inspirational & motivational atmosphere; keeps more than 100+ employees/members propelled throughout the day, serving as the hub of the corporate wheel.
My Duties & Internship:
Being a part of Product Management Team and Marketing support executive in Antila my duties and responsibilities for providing the sales team with the necessary technical expertise to enable team to sell the product throughout working hours from morning 10:00 am to evening 6:00 pm. This involves fieldwork and Office works i.e. printed and electronic promotional material, product training support and relevant clinical papers. Responsible for reviewing product data to ensure that the field force kept on new developments regarding companies or competitors’ products and information regarding newly launching products. Act a point of first reference for all products related inquires and work collaboratively with colleagues in clinical research and regulatory to address any issues may arise.
Close liaison with the field force to assess the response to and suitability of current promotional material and to ensure that the printed promotional material is being optimal. Design market research projects to access customer attitudes to current product range and new product introductions. Either conduct this research without in-house staff to manage and outside or manage an outside agency i.e., initial identification of suitable partner, the definition of responsibilities, communication plan, division responsibility, milestone, contract with company, review transcripts and reports, and recommended action plans for research. I am responsible for preparing product forecasts and constantly monitoring inventory levels held at central and interstate warehouses including liaison with production (Local & Globally) to ensure supply on time. Liaise with the advertising agency regarding the product campaigning include journal advertisement, direct mail, and conferences. Assist with development of annual marketing plan and controlling advertisement, promotion sales aids in accordance with annual marketing plans.
In a Nutshell, responsible for successfully launching new products in the market as well as play a crucial role in marketing strategy formulation and strategy execution (through the field staff) leading to brand building and brand consolidation.
Pharma Product Management and Marketing is an action–packed world that is full of tactics, a world of intelligence, investigations, insight and much more. Product management, as a career option, is very actively sought after by pharmacy graduate today. A field that was not very well known to the average pharmacy graduate of yesteryears who primarily pursued job in either production, quality control (QC) and R&D, this field now holds great appeal to many youngsters. The tremendous growth in the pharmaceutical industry has created an increasing demand for trained professionals industry demand for trained professional and industry reckoned as fast growing sector of the Indian economy.
Keeping all above in perspective, the role of product management team becomes crucial for success full commercialization operation of organizations and through this skill and experience during internship. Inspired to make career in Pharma Product management and marketing positively. The role in pharma marketing helps gain confidence as you consider the product to be your own and the success and failure of the product solely depend on you.
Over and above the Stipend amount I have earned skills, experience, product knowledge, new market, client`s like and dislikes, patients and their relatives feelings & expectations etc.
The skills that have helped the most, taken from my classes are designing promotions and designing incentives for the distributors. The basics of marketing have come into action a lot during my internship career. The different tools and methods of IMC are pretty much helping me to design plans here. I have not come across any difficulties yet where I can spot my weaknesses in performing any work. The constant motivation and the supervision by the supervisor has helped a lot in understanding the work.
I hope to register my own brands in export oriented business and support the marketing activities of those brands with the ownership of the brand remaining with me. I also wish to manufacture my own brand medicines and run a domestic market with my brand. This is a pretty good internship for me being a pharmacist, apart from being from a pharmacy background, students will be able to learn a lot here regarding the marketing activities that are being carried out by the company.
Working in the industry of IT, people communicating across the globe is something that is highly likely, recognising other people’s backgrounds and their culture is important to do. Having different religious beliefs require some people to leave during the work hours to practice. This is a cultural difference and can therefore affect communication between some people, hence why businesses and individuals need to recognise this. While time away is necessary companies will need to be able to find a way of communication. When communicating with people from different backgrounds people need to consider how audiences reacts to the way a person speaks. Signs or words may have different meanings in some cultures. Being aware of the issues has to be done by the person that is attempting to communicate as something may be said or done that could be misunderstood and thus the audience could find it offensive. The addresser is allowed to change gestures or words to make it more suitable for the audience by knowing the words or symbols that are banned by the audience’s culture.
Get original essayIt is important being able to understand the audience’s background because it permits the addresser to adapt to be able to suit the audience that they are addressing. The audience is dependent on the way a person communicates – whether their cultural background differs, their age or what job they have. The way that the person chooses to communicate is affected by these factors. The addresser could use a microphone, moderate or increase their vocal sound for some audiences in order to capture the interest of the audience. The addresser considers the needs and backgrounds of the audience by using the voice to speak clearly and therefore makes communication clearer between two people. Being selective in terminology is another way that addresser can adapt their communication with audiences. This way makes everyone understand messages the addresser is communicating – people that are from different sections of a company that are in the audience, the audience may not understanding certain terminology. The people within IT require to be able to familiarise the terminology so that understanding their message can be understood by people outside IT. If people in a team that use comparable terminology that communicate, key technical terms and acronym would need to be used by the addresser in order to get the message across for the team to understand. After the communication is used to adapt, the information that is being communicated needs to be accurate by the speaker. A good communicator and a liar can be differentiated by accurate information. Far-fetched statements or emotive statements some people like to use and this can leave the audience in doubt whether the addresser is trustworthy enough or isn’t. Losing credibility and the audience trust is done by speakers that use false statements when communicating. The person is shown as a trustworthy source and can differentiate fact and opinion by providing information that is accurate in communication.
Engaging the audience in communication is what needs to be done by a person, putting aside the style of communication that they use. To keep audiences engaged there are different techniques that are used for written and spoken communication. Being able to use your voice and generate interesting forms of communication for the audience verbally can be done by spoken communication. Modulating their voice and have music played, change pitch or to be using visual presentations and props can engage the audience. Changing intonation is a technique that can be used and so is using props because this will stop people losing their interests and the speaker has all their focus. Written communication can use similar techniques. When long presentations or documents are being read, becoming bored is what usually happens to the reader. Bullet points or varied sentence lengths is techniques in presentations that can be used, also including pictures and diagrams , attention of the reader is less likely to be lost by the writer. Including images to make writing seem more interesting should be done by the writer, the audience’s attention could be drawn away from the message and therefore the amount of multimedia that is used needs to be controlled Communication has been made more manageable and engaging by the use of technology in this century. Face-to-face communication is harder than before because of companies expanding overseas, but with video conferencing software for example: skype, communicating is easier and manageable when communicating with different parties. Email has taken over phones when companies are communicating. Email has become more popular through recent technology as information is communicated efficiently and doesn’t require taking notes from the audience. Communication is more interactive and engaging because the audience is more directly involved by using technology.
The final way that the speaker establishes the message in order to gather opinions from everyone is through question and answer (q and a) sessions. When using oral or face-to-face presentations to communicate, the audience feeling involved is important. Allowing the audience to ask questions can be done through having question and answer sessions if the speaker’s points were vague – as well as feedback being given to improve it can also benefit the speaker for their next presentation. In some cases, audiences are required to submit questions so the speaker is able to be prepared before the talk, broadcast presentations are an example of this. The audience asking questions after the talk is done with face-to-face communication. Change of intonation is a technique that is used in IT and this is important when the members of a project team and trying to get motivated and engaged. When lowing the tone of voice is done by someone, listening is more likely by the people surrounded because the tone of voice is intriguing. Getting the message across is helped by this and it is also easier because people are listening. After IT talks it is required for there to be question and answer sessions because opinions can be voiced by technical and non-technical voice, this the audience will feel valuable contribution towards the project was made.
Allowing communication to be done by colleagues in a workplace is done by different methods. The most common communication method between co-workers is verbal exchange. Being confident is what relies on having verbal exchange that is good and be able to share information when approaching people. Being clear and having verbal communication that is good is required by the speaker when the audience is spoken to so that they can comprehend and be sure what the message is. In a workplace, employees may be dead and therefore they cannot use verbal exchange when communicating. This means lip reading and signing are methods which are required to be used when there is a deaf audience being communicated to. The method that is most common communicating with hearing injuries is signing. Teaching sign language is a course that some people may partake in which means that they can effectively communicate with deaf co-workers. Signing words and finger spellings is usually taught by these courses. Deaf workmate is an example of an app which signing can be done with phones. A communication skill which is important is lip reading deaf people tend to use this when communicating. If understanding colleagues by lip reading is done by someone with a hearing impairment, slowing down speech is and option the speaker may choose to do to allow the deaf person to follow the speech.