Monday, September 30, 2019

Ethical Leadership Essay

In the healthcare setting, todays leaders face many challenges. One prominent and ongoing issue is the ability of healthcare staff to provide safe, quality care to patients, and to be able to provide this care efficiently. As healthcare professionals we understand that ethical issues along with cultural issues within an organization are very common. As healthcare professionals we work to improve access to healthcare, provide quality care, promote safety, and assure care is provided within a safe environment according to cultural beliefs. Things in the healthcare field are changing constantly and this in turn affects patient care, and employee satisfaction. End of life care has grown over the last decade as well as issues related to this area. We have also seen a push for organ donations. Leaders today face many ethical issues within the healthcare environment. This paper will focus on how leadership affects ethical issues that involve the ability of healthcare staff to provide effici ent, safe, quality care to patients observing their cultural beliefs. Key Strategies to Address Ethical Issue To address the ethical issue of the ability of healthcare professionals to provide safe, efficient, quality healthcare there must be a point of focus to get healthcare professionals to this goal. The point of focus would be providing efficient. If care is provided efficiently this in turn results in quality care because the patient’s needs are being met in a timely manner. If their needs are being met in a timely manner these results in safety. We must also be culturally aware. Leaders within the organization is constantly reviewing situations and making decisions. Every decision that is made addresses ethical issues that affect patients, family members, healthcare providers, and leaders. Leaders must provide orientation to new employees and in-services to current employees. Leaders must look at each healthcare provider’s competency and provide education in those areas that the provider  lacks knowledge in. Leaders must also assess the provider’s compassion for patient care. Education and understanding and using the Code of Ethics, is the key to efficient, safe, quality patient care. Patient must also have access to healthcare. Supportive Empirical Evidence There was a study that was conducted on ethical problems in nursing management and it states, â€Å"The most common ethical problems concerned resource allocation as well as providing and developing high quality care†(Nursing Ethics, 2010). This article addresses the fact that leaders used the â€Å"Professional Code of Ethics†, when addressing problems related to the care of patients. Following the code of ethics also results in delivery of efficient and safe patient care. According to Nelson, Taylor, and Walsh, after a â€Å"problem or ethics gap has been clarified† (The Health Care Manager 2014), then the team and leaders need to take this information and use it to develop a plan to assist healthcare providers to understand the mission and values of the organization and put them into practice to provide efficient, safe, quality care to patients. The plan should be comprised of goals that are both attainable and reasonable. Leaders and healthcare providers must also be culturally competent, because this leads to quality patient care. According to Slatten, David Carson, and Carson â€Å"compassion fatigue† is related to poor patient care and burnout of healthcare providers, (The Health Care Manager, 2011). Healthcare workers must be compassionate and caring. This can lead to what Slatten, David Carson, and Carson refer to as â€Å"compassion fatigue†. This article discusses the fact that leaders must allow healthcare workers you talk about what is bothering. If healthcare workers are not functioning at their maximum potential then they cannot provide safe, efficient, quality patient care. Examples of Importance to Nursing Providing quality care results in improved patient satisfaction. It assists the patient in achieving maximum health status. It decreases safety issues such as falls, medication errors, and improves a patient’s quality of life. Understanding and being culturally competent allows healthcare providers to provide care according to the patient’s beliefs. The care provided is what influences patient to select a hospital or stay away from a particular  hospital. Performance data is now shared and available to patient’s seeking healthcare. Patient outcomes affect overall cost of healthcare. Conclusion Leadership is important in the development of plans and goals to provide safe, efficient, quality healthcare. They must not only be concerned with patient’s and family members but they too must look at their employees and make sure they have a focus and the tools they need to reach the goals and provide safe, efficient, quality healthcare. They must be able to handle any ethical issues. There must be a focus point so that employees have a goal in site to reach for. Leadership is the backbone for nursing and healthcare providers. References Aitamaa, E., Leino-Kilpi, H., Puukka, P., & Suhonen, R. (2010). Ethical problems in nursing management: The role of codes of ethics. Nursing Ethics, 17(4), 469-482. Retrieved November 30, 2014, from PubMed. Nelson, W., Taylor, E., & Walsh, T. (2014). Building an Ethical Organizational Culture. The Health Care Manager, 32(2), 158-164. Retrieved November 30, 2014, from OvidSP. Slatten, L., David Carson, K., & Phillips Carson, P. (2011). Compassion Fatigue and Burnout: What Managers Should Know. The Health Care Manager, 30(4), 325-333. Retrieved November 30, 2014, from OvidSP.

Sunday, September 29, 2019

Apollo Shoe Inc

Date: 19 Jan 1:30:27 From: Dennis Reese Subject: Revenue Cycle Problems I have looked over Bradley’s report and yes we do have some issues with the Sales, and Account Receivables. The fourth quarter deviations overstated are the worst because they can have the most effect on the Financial Statements. The controls need to be more uniform as Bradley stated because then they would even out through the months instead of hitting us mostly on the fourth quarter.The company reports financial Statements each quarter and they are the months: March, June, September, and December. In their last quarter they are facing financial problems because of incorrect record sales. Some of the sales records are missing bills of lading. Also the credit approval controls are not emplaced our lack of them will cause a greater liability for collection. Will need to verify all the charges to the customer because there is many overcharge and undercharge amounts.The overcharge delay from invoice date and credit memo averages 24 days to correct the mistake. Apollo’s controls are un-reliable and we will need to follow up on all Revenue and Accounts Receivable. Also positive confirmations need to be sent to customers with accounts greater than 1,000,000 and negative confirmations need to be sent to customers with less than 1,000,000. But all the customers need to be verified that their information is correct before they are sent. Also we need to ask the customers to verify all sales they made from us for the year.

Saturday, September 28, 2019

Alternative Energy Sources Essay Example for Free (#3)

Alternative Energy Sources Essay What does a car, heater, and stove have in common? They are all powered by fuel sources. The most popular being fossil fuels. Fossil fuels are dead plant and animal matter that has been compressed and heated over millions of years. They are burned to create heat, which in turn creates energy. However, with heavy industrialization (agricultural and manufacturing), transportation, and personal energy use, our world’s fossil fuel supplies are rapidly depleting. Even more, fossil fuels pollute our environment. Scientists are on the search for alternative energy sources so the world can be weaned of its fossil fuel supply. Out of the many alternative fuel sources, I will be focusing on solar and wind power. Solar power is simply the conversion of energy from the sun into usable energy. Solar energy can be harvested in two ways: indirectly by using the heat of the sun and directly by utilizing its energy to turn it into electricity. What makes solar power so popular is the fact that it can be used anywhere that has sunlight. Solar power can be collected in 3 different ways: solar heat collectors, solar thermal concentrating systems, and photovoltaics. Solar heat collectors are collectors that are designed to absorb the heat from the sun. The most common ones are flat plate collectors that have a dark absorber plate that is covered with a transparent plate (usually glass). In between the two plates are pipes that are filled with heat-transferring liquid like antifreeze. When sunlight strikes the absorber plate in the collector, the heat is absorbed into the liquid, which is then passed through pipes to the water heater. When the liquid is finished being used, it flows back up to the plate where it is heated again and repeats the process. Solar thermal concentrating systems use mirrors and lenses to concentrate the energy of the sun into a small area to produce energy. The energy heats up molten salt in pipes that run along the concentrating system which is the power source of a generation system. The concentration system can make the liquid in the pipes heat up to 3000 degrees Celsius in some cases, which makes this method preferable for industrial use or electricity. Finally, the use of photovoltaics directly converts light from the sun into electricity at the atomic power. The system consists of a solar cell, which is made of semi-conductive materials like silicon. The solar cells are made to create an electric field. When the light from the sun hits the cell, the lectrons are separated from the atoms and form an electric current, which produces electricity. There are many benefits for using solar power as an alternative fuel source. 1) Solar power is constantly renewable. The energy from the sun will virtually never run out. 2) The sun is also available world wide so it is a power that everyone can use. 3) Solar energy is also very low maintenance; after installation of the systems there is barely any other work involved with it. In addition, 4) it is a silent producer of energy, even with the photovoltaic cells. However there are a few cons that go along with solar energy. ) Even though the sun is a free source of energy, the cost of solar cells can be quite costly with most cells starting a $1000 for one. 6) Solar energy can only be produced when the sun is out so that means about half of the day solar panels aren’t generating electricity. Lastly, 7) weather can affect the efficiency of the solar panels. Wind power is the conversion of wind energy into a useable form of energy. Wind power is used widely around the world since there is wind everywhere, however you are most likely to find wind power being used in higher elevations (such as hills) since that is where the wind is the strongest. Wind power is harvested with wind turbines. The process is pretty simple: the wind spins the turbines, which activates a generator, which converts the energy into electricity. Like solar power energy, 1) wind power is sustainable and renewable since wind will always be around to move the turbine. 2) Wind power is also free. 3) The land that the wind turbines are on can be shared for other uses such as farming. 4) Since wind power is available worldwide, the US can use the turbines as its own fuel source and free its dependence from foreign oil. On the negative side, 5) wind turbines can take up a lot of space. ) Even though it is a clean source, the turbines can be very noisy which may be bothersome to nearby communities. Lastly, 7) the cost of wind turbines and the generators are far more expensive than fossil fuels, which makes it a poor competitor cost-wise. With the depletion of fossil fuels, alternative fuel sources are the obvious choice for the present and future. Two of these sources, solar and wind power, are both revolutionizing the way we produce electricity, while benefiting the environment. Even though they both have a few cons, the fact that we have energy sources that are both sustainable and renewable is far superior to the latter. Alternative Energy Sources. (2017, Jan 25).

Friday, September 27, 2019

Effective Project Financial Management Tools Case Study

Effective Project Financial Management Tools - Case Study Example However the above mentioned studies will not be discussed in details. This paper will only evaluate the effectiveness of using cost estimations and budget in financial management project of the two companies. Project financial management is a process which brings together planning, budgeting, accounting, financial reporting, internal control, auditing, procurement, disbursement and the physical performance of the project with the aim of managing project resources properly and achieving the project's development objectives (world bank group). Financial management is the main character for the success of a project process. An accurate and relevant financial information provides a basis for better decisions, thus speeding up the progress of the project and the availability of the funds. An effective financial management provides the following: An effective financial management system is vital for projects because of the need to deliver services to target groups quickly over a large geographic area to a wide variety of stakeholders. One of the tools in financial management that is widely used is the Cost estimation and budget. Budgets are the financial work plan for projects, programs and organizations. Budgets that work are based on realistic assumptions, use good cost estimates and come from organizational processes that include board and staff members (J. Rouse, P.Rouse). Project financial management processes are organized into five groups of one or more processes each: Initiating processes-authorizing the project or phase. Planning processes-defining and refining objectives and selecting the best of the alternative courses of action to attain the objectives that the project was undertaken to address. Executing processes-coordinating people and other resources to carry out the plan. Controlling processes-ensuring that project objectives are met by monitoring and measuring progress regularly to identify variances from plan so that corrective action can be taken when necessary. Closing processes-formalizing acceptance of the project or phase and bringing it to an orderly end. Cost Estimations and Budgets In the financial management done by the ISS (International Space Station) for NASA has shown that the cost growth is contributed to many factors that are beyond the control of the project manager. The Project Manager was not able to clearly communicate the justification for his budget requests and the rationale for the cost growth because NASA has lacked a single standardized accounting system and the program has not developed and maintained a baseline lifecycle cost estimate. Past efforts to control costs through budgetary constraints have failed to achieve their stated purpose and have probably exacerbated the cost growth. The Arizona Department of Transportation (ADOT) was not able to determine the reasons for the cost increases because the data is not readily available from the Federal Highway Administration.

Thursday, September 26, 2019

Campus Discipline Problem Assignment Example | Topics and Well Written Essays - 250 words

Campus Discipline Problem - Assignment Example Miami university-Oxford has a total population of 17191 students whereby 7560 of them are men and the remaining 9631 are women. It is a four-year public university. From the clergy data, it is seen that the university had zero incidents of students in possession of the weapons between the year 2006 and 2007. However, in 2008 there were two students who were reported having weapons. In matters to do with drugs, one in every 905 students were reported in 2006. In 2007, the number rose to one in every 452 students and the situation worsened in 2008 where one in every 1910 students were reported to be in possession of drugs. The school either didn’t do very well on the issue of illegal liquor. One in every 22 students were reported to be in possession of illegal liquor in 2006 and 2007. The number changed to one in every 23 students in 2007 and the situation was no good in 2008, one in every 31 students were reported. In comparison to other colleges in the United States, Miami University didn’t do well in matters to do with liquor and drugs. There were many cases of violation reported as compared to other universities. It also didn’t perform well in the category of four-year public universities in United States. In the category of four-year public universities in Ohio, the University had a poor performance with only Ohio University (main campus) and Ohio state University (main campus) performing worse than it. However, from the data, there was a remarkable reduction of violations from 2006 to

Research and Statistics Essay Example | Topics and Well Written Essays - 1500 words

Research and Statistics - Essay Example The undertakers of the research may not be cognizant of the underlying level of understanding of the questions by the respondents because there is no personal contact with them. There are specific questions contained in the questionnaires, the researcher may miss important information that could help to deduce the attributes of the people that are the topic of research (Kothari, 2005, pp 47-50). Interviewing is a qualitative method of research where there is a conversation between the researcher and the interviewees. It is a strategy used by researchers to deduce the experience of the targeted group by asking a set of relevant questions via the telephone, the internet or in physical contact with them. The interview should be clear, interpretative, knowledgeable, and critical and should remember the subject matter. Interviews can target individuals (personal interview) or target a group of people (group interviews). An example of interview is the one to investigate the thoughts children have about education and their mental state regarding this issue. This may be to assess the mental state of children (Rubin & Babbie, 2011, pp 82-84). Interviews have their limitations. It might be difficult to plan the time and meeting point for the interview. The participants can reschedule the interview or worse even sabotage it. Interviewers have the task of making the interviewees feel comfortable. There are instances where interviewees are hostile to the interviewers based on race, culture or even personal feelings (Tarantino & Peary,1998, pp 65-70). The main purpose of the research is mainly to define effect the expectations would have on the performance of the children in the reading test. This is a mental hypothesis; increase in the performance of the children with increased expectation in the reading test. The dependent variable within the research is the performance of the prevailing children and it is measurable. It is mental since it is

Wednesday, September 25, 2019

THE LEGAL ENVIRONMENT OF BUSINESS Essay Example | Topics and Well Written Essays - 1250 words - 1

THE LEGAL ENVIRONMENT OF BUSINESS - Essay Example The Chief Financial Officer and other senior officers are known to have misled the audit committee when it came to issues of high-risk accounting practices. Following the confusion brought about by the Enron’s complex financial statements to both the shareholders and analysts, speculations were raised enquiring on the sustainability of the company. One partnership created by Enron had allowed it to keep $600 debt off the books it availed to the government and its shareholders. The problem in the company became evident in 2001. In August the same year, Jeffrey Skilling the CEO of the company tabled his departure. His position was resumed by Lay. On March, Bethany Mclean, a Fortune Magazine writer wrote an article inquiring Enron’s ways of making money. The reality of its collapse surfaced on October 16th when the company announced a loss of $638 million in connection with its internet investment failure (Barbara, 12). The shareholders of the company filed a $40 billion c ase after the stock price fell from us$ 90.75 per share in mid-2000 nose-dived to less than 1$ by the end of November 2001. The U.S Security and Exchange Commission launched (SEC) an investigation in October. The investigation later exposed the multifaceted web of partnership specifically engineered to hide the debt (Barbara, 14). In November, it was revealed that the company had overstated its earnings for the past four years by $586 million. It was also revealed that Enron owed over $6 billion in debt by the following year. This is what led to the drastic fall of its stock prices that saw investors lose billions of money. The company agreed to repay its investors immediately. It could not come up with the money to repay the debt therefore it filed for bankruptcy in accordance with chapter 11. In pursuant of justice, many senior executive officers were brought to trial which formed a point of reckon for the many citizens whose lives had been destroy. Fastow, the then Chief Financia l Officer and his wife, Lea, pleaded guilty for the charges against them. He had been initially charged with 98 counts of money laundering, fraud and conspiracy among other crimes. He pleaded guilty to two counts of conspiracy and was sentenced to 10 years without parole in a plea bargain to testify against Lay, Skilling and Causey. His wife Lea was sentenced to year imprisonment for aiding her husband hide government income. Lay and Skilling were brought to trial in January 2006 (Barbara, 15). Skilling was convicted of 19 of 28 counts of murder. He pleaded not guilty and attributed the cause of the company’s downfall to Fastow. Lay was found guilty of 6 counts of security and wire fraud and was subjected to a total of 45 years in prison. Unfortunately, Lay passed away in July, 2006 before his sentence was scheduled. Rick Causey the then Chief Accounting Officer was charged with six wrongdoing charges for non-exposure of Enron’s financial condition during his term. He was sentenced to seven years in penitentiary after pleading guilty. Arthur Andersen was charged with impediment of justice because of destroying documents, erasing emails and files that were affiliated to his auditing firm dealings with Enron. He was found guilty and was sentenced and his company was made to surrender its CPA license in August 2002

Tuesday, September 24, 2019

Argumentative on Prison Overcrowding in the United States Research Paper

Argumentative on Prison Overcrowding in the United States - Research Paper Example As a result of this, prison overcrowding is a cause of major inefficiency in correctional facilities in the USA and the world over. This paper will be an argumentative essay on prison overcrowding in the United States. Over the last forty years, the United States increasingly tough response to crime and punishment has resulted in an overwhelming rate of incarceration within its states, thus overcrowding its correctional facilities. This is due to the criminal justice policies that the United States has adopted. Between 1972 and 2008, the number of men, women and children locked up in the United States has grown by 705 percent (Johnson & Johnson 4). Harris County is one of the most affected, despite the fact that they tried to increase the number of these facilities, the problem has not been solved as more and more people got arrested for misdemeanor crimes including minor drug offenses, filling the new facilities. As a result of this detainees are not provided with adequate medical c are, mental health care, protection from serious physical harm and protection from life safety hazards (Johnson & Johnson 5). The idea of mandatory minimum sentences is another factor for prison overcrowding. These laws were enacted in 1986 and are fixed sentences to individuals convicted of crimes regardless of proof whether they were guilty or not. The mandatory minimums were set with the objective of capturing the leaders in drug distribution networks. Thus low level drug sellers are the ones that are being held in most federal prisons in the United States. Room has to be made for the non-violent crimes yet the violent crimes are released on parole (Pollock 62). The three strikes law is another factor for prison overcrowding in the United States. This is a law that was created to control the rate at which offenders were received in courts. The law states that after a third major felony, an offender is eligible for 25 years of life in prison (Moore 1). Many of the offenders sent i n prison under this rule are the non-violent offenders especially those held because of petty theft. Thus people that have committed violent crimes tend to spend less time in prison than those who commit the less violent crimes. The offenders that commit petty crimes are many than the ones who commit the violent crimes, thus prisons end up being filled up due to the large number of petty offenders that are locked up (Moore 1). When prisons are filled up, it means that many law breakers are being punished; hence a peaceful and more secure society. This is the reason why the federal government is not disturbed with the idea of having to accommodate more inmates in gymnasiums. It is an indication that the society is rid of the people that hamper its peaceful coexistence. Therefore, it is in order for the prison department to lock up all the people that commit crimes so that they can serve as an example to potential and other wrongdoers as well as have a secure society. This is also an opportunity for the prisoners to change and integrate back to the society as proper persons when their terms end. Prison overcrowding puts the state on toes. It gets aware of the citizens that it harbors and this way, the state and the society as a whole knows that it has a lot of obligation to ensure that its citizens are well behaved. The overcrowding serves as a challenge to the society to know that the obligation of ensuring that the obligati

Sunday, September 22, 2019

Female Entrepreneurs Essay Example | Topics and Well Written Essays - 4500 words

Female Entrepreneurs - Essay Example The paper has clearly brought out the fact that the managerial qualities of women are entirely different from male entrepreneurs and it rests a great deal on the circumstances that motivate her to establish her own business set-up, apart from her own characteristics and qualities that she has imbibed. The management techniques adopted by them and their impact on the organizational performance are brought to fore by interviewing few female entrepreneurs in UK by providing them with a questionnaire. The result showed that though charismatic and transformational leadership are made use of by the women entrepreneurs, the driving force that makes them into a success story is the relational approach practiced by them, which includes open communication, sharing of information, empathising and nurturing of the employees. The management techniques adopted by women have shown more number of employees in female owned enterprises than others. Consequently, the number of female entrepreneur billionaires has been increasing at a fast pace and we hope to have double the number of women entrepreneurs in the next five years. The importance of women entrepreneurs has been greatly fe... 1. Introduction The importance of women entrepreneurs has been greatly felt across the globe in the last decade. Interestingly, in developed countries, women own 25% of total businesses and are starting up new ones at a faster rate than men (Woldie and Adersua, 2004). Infact, besides making a contribution to the economy, women through their different management styles have been adding innovation, diversity and choices to the business organizations they own. While studies done in the past have improved the understanding about female entrepreneurs, the issues which have not been addressed in-depth are - What are the management styles adopted by women and how do they affect or have an impact on various aspects of organizational performance. This paper, will, therefore, focus on the growing number of women entrepreneurs in the last decade, their management styles, the impact of their management strategies on the success of the organization and whether their style is different from their male counterparts or not. The purpose of this report is to provide information on this research topic which will be used as a basis for my third year project for the BA Honours for Business degree with a management minor at Croydon College. As a woman in business I have spent over twelve years conversing and engaging in business activities with many other women and it has intrigued and inspired me to investigate, explore and examine a few of the variables that make a woman into a successful entrepreneur. As part of the research, I also want to investigate management styles to understand if there are any particular types of management styles which assist the women in becoming successful and how do they differ from management styles adopted by their male counterparts. I have personally

Saturday, September 21, 2019

Writing an excellent outcome Essay Example for Free

Writing an excellent outcome Essay Always remember that the experiences and outcomes should have an impact on classroom practice and learning. The outcomes should not be written in the form of assessment criteria, nor should they constrain learning. Every outcome should therefore be tested against the following criteria: 1. It should express learning that is clear to the teacher, and where possible the young person. This will promote the application of formative assessment strategies. 2. It should indicate the purpose of the outcome and/or direct the selection of learning activities for all children and young people. 3. It should allow evaluation of the outcome. In other words, it should be clear from the outcome what evidence might be observed to demonstrate progress by the child or young person. Also bear in mind that there is no intention to produce an elaborated curriculum. Outcomes should therefore offer and support opportunities for enrichment and development for those young people with additional support needs who may not progress beyond the first levels. As you complete blocks of work a further test is to consider the extent to which you have prioritised and simplified existing guidance and to ask yourself if any changes are robust and justifiable. As a general rule outcomes should begin with the ‘I can’ stem. Experiences describe purposeful and worthwhile tasks, activities or events that contribute to motivation, personal development and learning. As a general rule they should be signalled using the ‘I have’ stem. The following additional general parameters will help you get started. †¢ Simplification and prioritisation should result in time and space being made to operate the seven principles of curriculum design. For example, teachers should have time for greater depth of study, to introduce topics or ideas in a relevant context or to respond to local events or circumstances and to ensure progression. †¢ Assume your outcomes can be taught within the time allocations typically applied in schools at present.   Some outcomes should ask young people to draw together, consolidate and synthesise their earlier learning in some way e. g. by summarising, generalising or applying earlier learning.   You should aim to embed cross-curricular aspects, including skills, within the outcomes. To help you a cross curricular skills set is being identified. The’ Core Skills’ of Communication, Numeric, Information Technology, Problem Solving and Working with Others are part of the National Qualifications framework. In due course the two sets will be assimilated. Skills will be embedded in the outcomes using the skills reference set.   Progression within and between levels will be indicated through the chosen content or context. During the next stage you will be refining the outcomes and experiences in light of feedback and these will be built up into a database. This is under development, and may include the following fields: Curriculum area and level, Outcomes, Links with the 4 capacities, Links with cross-cutting themes, Links with other curriculum areas and Links with the skills set. There will be important work to ensure that cross-curricular aspects including skills development are being addressed in a consistent and coherent way across the entire curriculum. The quality assurance process Please remember that until final versions of the guidelines are prepared, all work is ‘works in progress and therefore subject to scrutiny and change. While work is in preparation for engagement it should be treated with an appropriate level of confidentiality. Opportunities will be found to bring all writers together from time to time to compare notes on progress to allow debate and challenge and to ensure everyone feels supported as part of a bigger team.

Friday, September 20, 2019

Development of Human Computer Interface

Development of Human Computer Interface Development of Human Computer Interface Based on Cognitive Model Integrated With Data Mining Techniques M. Mayilvaganan, D. Kalpanadevi Abstract First review concern about the relevant literature survey in order to evaluate the performance of learning ability and knowledge, behavior, attention, by the category of cognitive skills which is analyzed by various data mining techniques. In this paper focus the concepts of cognitive process and data mining techniques which are used to evaluate the usability of system based on metrics for analyzing problem solving resources. The implementation of cognitive process in the Human computer Interface(HCI) system contributes to give better performance of the human behavior which will be analyses by data mining technique of classification and clustering process can be proposed to evaluate the knowledge of person in efficient manner. This implies that the skills will be stimulated over time through intentional support and also helps for various resources based on different categorize. Keywords: GOM Model, Data mining techniques, Human Computer Interface system, Observational method, C4.5, Naà ¯ve Bayes, K-means, Weka Tool. Introduction Data mining also called Knowledge Discovery in Databases (KDD) in the field of discovering novel and potentially useful information from large amount of data. In recent years, there has been increasing interest on the use of data mining to investigate scientific questions for problem solving analysis, an area of human thinking, behavior, analyse the performance from the knowledge criteria are gathered by the techniques of data mining [1]. An ability of cognitive performance is essential in various environment, which is influenced by many qualitative attributes are included for forming the data set. Data mining techniques such as K-nearest neighbor, decision tree, Naà ¯ve Bayes, Neural network, Fuzzy, Genetic and other techniques are applied in various environments [3]. This paper describes about literature survey on to analyse the cognitive performance integrates with data mining techniques. 2. Cognitive process in Human Computer Interaction (HCI) Human computer interaction is concerned with how people use computer system to perform tasks, usually in a real life work setting. To evaluate the competing task by using usability criteria based on cognitive models. Cognitive processes is the process that involve knowledge, attention, memory, producing and understanding the language, problem solving and decision making. All these are very important for human behavior. The working process of each task can be analyzed by data mining techniques for finding the human behavior, attitude and attention performance in respect way. 2.1 Collecting Qualitative Data through Cognitive process Scope of knowledge is accumulated information, problem solving schemas, performance skills, expertise, memory capacity, problem representation ability, abstraction and categorization abilities, synthesis skills, long-term concentration ability, motivation, efficiency and accuracy. Data which is collected by using variety of techniques like Video and audio recording, software logging, Scan converters, think- aloud protocols or pencil and paper field notes. These techniques can be followed by several cognitive models such as GOM model, KLM model, Cognitive complexity which has to be evaluating by language based model such as Command Language grammar, Task Action Language, Task Action Grammar, and Knowledge Analysis of tasks. In cognitive complexity, the tasks can be assessed by analysing the number of entities that have to be related in a single representation. For eg: The hypothesis ideas such as collecting the personal data, family background, academic details, extracurricular activities, activities while during studies etc., are the basic attributes for analysing the performance skill for required person. The techniques are outlined for analysis of cognitive complexity in general cognition, cognitive development, mathematics education, reasoning tasks, psychometric test items, and industrial decision making, problem solving etc. The role of questionary format on the basis of problem solving, reasoning task, behaviour methods to analyse in effective way. 2.2 GOMS Model GOMS model stands for Goals, Operators, Methods, and Selection rules needed to perform a task. Tasks are broken down into their components to predict performance times. Figure.1 represents the process of GOM model describe as Goals are objectives Operators are the actions that change the system state or the cognitive state. Methods are description of procedures for achieving goals stored in the user’s knowledge structure of the task built-up for the problem solving. Fig.1 GOM model Selection Rules are If †¦Then statements to enable the user to choose between the methods under the time complexity. 2.3 Keystroke Level Model (KLM) KLM is derived from GOMS and describes the time taken to execute sub-task using the system facilities. Total time taken for an action is arrived at by simply adding together the times for each component task. To obtain the predicted time for a task and add the times for individual operators based on Fitt law, Steering Law. 2.4 Cognitive Complexity Theory Cognitive complexity theory is an extension of GOMS. It attempts to predict how difficult learn and use a system will be base on a GOMS model of the task and its required knowledge, a model of the user current knowledge and a list of the items of knowledge to be learned in order for the user to be able to make error- free use of the system. 2.5 Knowledge Analysis of Tasks (KAT) KAT is an evaluate model to identify the task gathered from variety of techniques including interviews and questionnaires, observation, rating scales, repertory grids and conduct online test for problem solving. The completed tasks will analysis for the performer by producing the result. KAT involves several stages such as Identify the person goals, sub goal and subtasks Work out order in which sub goal are to be carried out. Identify task strategies. Identify procedures. Identify Task Objects and Actions. 3. Data Mining Concepts Integrates To HCI The variety of domain values which are related with performance based on their required result carried out by cognitive process model. From fig.1 shows such factor may be founded by means of analysis based on data mining techniques. Usability criteria can be measured by setting performance targets in the system design at the stage of effectiveness, learning ability, and flexibility, attitude which is evaluated by either survey or experimental method. An analytical evaluation method is followed by the GOMS model, KLM model and Cognitive complexity theory for end-user testing through knowledge task analysis. After observational evaluation happened, the collection of data will be stored in the database. Using data mining techniques, preprocessing, data cleaning and transformation are carried out for avoid the redundancy and clear the noisy data from the database. After preprocessing, several algorithms are applied to discover the knowledge and performance factor are analysed to identify the human ability. 4. Data mining techniques An application of Data mining is a rich focus of Classification algorithm, Association algorithm, Clustering algorithm which can be applied to the field of some resources it concerns with developing methods that discover the knowledge from data originating from any other resource environment. Fig.1. Methodology Process of analyse skill by Data Mining Techniques 4.1 Classification Techniques In Classification process, the derive model is to predict the class of objects whose class label is unknown. The derived model is based on the analysis of asset of training data. In educational data mining, the work of data was predicted by logical rule of the Classification algorithms with the represent of common domain values for analyzing the qualitative performance of required details. In this case study, it can be predicting the human behavior through HCI by given the problem solving question, observational process and other resources. In this technique, it can be classified the functioning of cognitive style such as logical reasoning, analytical ability, Numerical ability, balanced profile for skill learning, personality analysis and other styles for analyzing the skill for the human user from the collected dataset systematically. In C4.5 algorithm construct in which enhanced by ID3 algorithm and it works in divide and conquer method. At the beginning stage the root is present to associate with training data set. The rule set is formed from the initial state of decision tree. Each path from the initial state, the condition will be evaluate and simplified by the effect of rule and an outcomes will put on the required leaf, the step will continuous when it comes discarding the condition. Let freq (Ci, S) stand for the number of samples in S that belong to class Ci (out of k possible classes), and à ¯Ã¢â‚¬Å¡Ã‚ ½Sà ¯Ã¢â‚¬Å¡Ã‚ ½ denotes the number of samples in the set S. Then the entropy of the set S: equation (1) After set T has been partitioned in accordance with n outcomes of one attribute test X: equation (2) gain (x) = info (T) infox(T) In Naà ¯ve Bayes algorithm, to reduce computation in evaluating P (X|Ci), the naive assumption of class conditional is made. This presumes that the values of the attributes are conditionally independent of one another, given the class label of the tuple. The data set predicts that tuple X belongs to the class Ci. equation (3) By Bayes’ theorem, the classic for which P (Ci |X) is maximized is called the maximum posteriori hypothesis. P (Ci |X) = P(X|Ci)P(Ci) / P(X) equation (4) The classic for which P (Ci |X) is maximized is called the maximum posteriori hypothesis. It can easily estimate the probabilities P(x1|Ci)Ãâ€"P(x2|Ci)Ãâ€" ·Ã‚ ·Ãƒâ€"P(xn|Ci) from the training tuples by the following relationship. equation (5) 4.3 Clustering Techniques Cluster analysis is used to segment a large set of data into subsets called clusters. It is the process of grouping or organizing a set of objects into distinct group based on some similarity or dissimilarity measure among the individual objects, such that the objects in the same group are more similar to each other than those in other groups [2]. Through this technique, it can be cluster the skill level in style wise or any other pattern and analyse in each cognitive style in grouped manner. In this paper, K-means clustering can be used to analyse the classification of training tuple from the rule base relation, then it can be grouped the performance of skill in pattern wise. K-means algorithm takes the input parameter and partitions a set of n objects into k clusters. Cluster similarity is measured in regard to the mean value of the objects in a cluster based on center of gravity. For each of the remaining object is assigned to the cluster based on the distance. Iteration can be repeated until the function can satisfied. equation (6) where E is the sum of the square error for all objects in the data set; p is the point in space representing a given object; and mi is the mean of cluster Ci, the distance from the object to its cluster center is squared, and the distances are summed. The resulting of k clusters as compact and group can be formed for the required pattern. Experimentation of Training Data set and Result Analysis Using Data mining Techniques From this research survey, it can be analysed and produced an idea to propose the human performance based on cognitive process through Human Computer interface by interacting from computer system. The training data set can be experimented in data mining techniques to analysis the behavior of the human user via computer system. In this experiment, Classification technique approach was obtained accuracy to classification for forum data. Using Weka tool the classification algorithm was provided to experiment with sample data set by the given attributes like logical reasoning, numerical ability and personality for analyse the skill level of human user. Through clustering technique it can be analysed the performance of skill level from the classified training data set. Weka provides the range of the functioning in style wise and estimates the accuracy of resulting predicting model in classification algorithms are C4.5 and Naà ¯ve Bayes techniques used in the analyzing process. These techniques are decision making rule process which can be worked in probability evaluation model on the analysis of a set of training data. If logical_reasoning = good and Numerial_ability = good and personality=good then Performance= Good_skill_user If logical_reasoning = poor and Numerial_ability = poor and personality=good then Performance= Average_skill_user If logical_reasoning = poor and Numerial_ability = poor and personality=poor then Performance= below _average _skill_user TABLE.1: PERFORMANCE MEASURE FOR TRAINING DATA OF 200 SAMPLE INSTANCE From table.1, shows the measuring the performance of execution time and correctly classified instance based on the proposed algorithm for predicting in rule. In second experiment, the data clustering method can be used for checking the similarity based on the criteria of performance like Good skill user, Average Skill user and below average skill user using K-means algorithm technique. Fig. 2: Clustering Performance in pattern wise analysis 6. Conclusion In this studied, it can be concluded that an idea of Human computer interface which integrate with respect to cognitive models for analyzing human behavior of skill gathered by using problem solving using data mining techniques. By using 200 instance of sample training data set, which can be predicted by the rule of classification techniques of C4.5 and Naà ¯ve Bayes algorithm which can be produced their efficiency are C4.5 classified by execution time of accuracy is 0.25 second and 170 instance are correctly classified. Naà ¯ve Bayes algorithm classified by execution time of accuracy is 0.1 second and 142 instances are correctly classified. From the above analysis more instance of classifier is C4.5 algorithm was well suited for classification to skill analysis. Finally, it can be analysis by category wise based on pattern then produce 80% of Good skill user, 40% of Average Skill user and 5% below average skill user using K-means clustering algorithm. References 7.1 Book [1] Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, 2nd ed., Morgan Kaufmann Publishers, 2006. Arun K Pujari, â€Å"Data mining techniques†, University Press (India) Private Limited. David Hand, Heikki Mannila adhraic Smyth, â€Å"Principles of Data Mining†, MIT Press, 2001. Anderson, J.R, ‘The Architecture of Cognition’, Harvard University Press, Cambridge (1983). 7.2 Journal Article [5] Richard E.Clark, â€Å"Cognitive Task Analysis†, October 14, 2006. [6] Chipman, S. F., Schraagen, J. M., Shalin, V. L., â€Å"Introduction to Cognitive task analysis† [7] David H. Jonassen, â€Å"Analysis of Task Procedures†, Copyright [emailprotected] 1986. 7.3 Conference Proceedings [8] Bainbridge, L. â€Å"The change in concepts needed to account for human behaviour in complex  dynamic tasks†, IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and  Humans, 27, 351–359. [9] Arbi Ghazarian, â€Å"Pauses in man-machine interactions: a clue to users â€Å" Skill levels and their user  interface requirements†, Int. J. Cognitive Performance Support, Vol. 1, No. 1, 2013. [10] Sheikh,L Tanveer B. and Hamdani,S., Interesting Measures for Mining Association Rules.  IEEE-INMIC Conference December. 2004. [11] M. O. Mansur, M.Sap and M. Noor, â€Å"Outlier Detection Technique in Data mining: A Research  Perceptive†, In Postgraduate Annual Research Seminar, 2005. 1