Monday, September 30, 2019

James Dean

A Rebel With A Cause â€Å"Wash the dishes, and clean your room. Be home by 7:00, don’t be late. Study, study, study. † We have all heard these words uttered from the authoritative lips of our parents sometime in our life, however, these days most teenagers aren’t afraid to disobey their parents by responding with, â€Å"no. † James Dean was one of the first people to defy the strict rules of parents, and he did so on screen for the entire nation. Some sources claim that he is a label; a label that is intended for the sole purpose of resisting authority.He is not a label, rather more of an icon used to show that in certain circumstances it is okay to disobey the various rules that society has unwillingly placed upon us. Whether it be in black and white, or vibrant colors, the emotions in this picture speak loud enough for color not to be an issue. People perceive Dean as â€Å"trapped,† and after gathering some background information about him and h is career, I can clearly see why he is portrayed as this. His career peaked for three years, and then abruptly came to an end. However, for those three years Dean had to be everything that America wanted to see and idolize.Cameras surrounded him 24/7, paparazzi always wanted a comment from him, and fans simply couldn’t get enough. In the photograph that I have attached, it is as if Dean is trying to keep a hold on himself and his emotions; trying not to get too caught up in the crazy world he had been thrown in to. The â€Å"Torn Sweater† series was taken by photographer Roy Schatt. Schatt told Dean to pose as if he was trying to escape something that comes from within, a feeling perhaps, that only he himself is aware of – hence the attempt at tearing his sweater off.It is ironic in a sense that he’s standing in front of a camera, completely alone with a solid background looking into the distance. Being in front of a camera he had grown completely accusto med to, but he was never alone, and the background of his life is more chaotic than just a solid color. Dean is pictured gazing into a vastness that only he could imagine, imagining his life on the complete opposite end of the spectrum that he ended up being on. Even with his fame and stage-presence, Dean was an average guy who struggled to trying to get by with life.It is possible I’m biased due to myself being a teenager, struggling to get through this crazy thing we call life that I am able to relate to him. This photo stands out to teenagers in the sense that not everyone is perfect, nor knows how to be. At this time period, for many American teenagers, it must have been difficult to stand up to parents, and disobey the overbearing rules they had set-in-stone. Dean gave inspiration to them to stick up for what they believe in, regardless of the fact that they are younger and seen as less knowledgeable.Some people may know Dean from various old-time movies. He starred in E ast of Eden, Giant, and is most recognized for his rebellious character in Rebel Without a Cause. He was considered a good actor in the 1950s for the diverse character roles he took part in, and of course for his legendary sex-appeal. For half a century, he has captured the world with his casual style, fearless look, and rebel attitude. James Dean has defied the essence of â€Å"cool† and â€Å"without-a-cause† for generations.Rebel Without a Cause may be one of the most famous due to the fact that Dean got into a fatal car accident on September 30 1955, one month before the release date. Dean wasn’t only a sexy symbol of rebellion, he represented an every-day teenager that goes through social issues without having a clear direction for his life. In Rebel Without a Cause, he was shown as a delinquent in an urban slum. It is the story of a rebellious teenager who arrives at a new school, falls for the girlfriend of a school jock, and disobeys his parents trying t o defy the meat-head’s bulling.The directors of the movie casted him as a rebel, realizing that his attractive, edgy self would appeal to many teens being as they can relate. Dean was a product of this 1950s ideology. Percieving Dean as a good guy, desperately wanting to do the right thing, yet constantly getting caught up in doing the wrong, was appealing to teenagers around the entire nation. Teens didn’t challenge their parents rules back then, they listened to their elders, and did as they were told. People who did backlash and resist the authority were considered outlaws, who would never be successful.Making this movie and being allowed to see the inside world of a â€Å"true† rebel was one of the first opportunities both teens and parents had to see the two sides of a story. Dean’s performance spoke powerfully on behalf of teenagers going through this type of scenario themselves, and gave them a hero they could admire and respect. In today’s society, arguing with parents, or going against the rules trying to break the idea of a norm isn’t unusual. Yet, in the era that this movie was made, it was extremely against anything society really knew.The case isn’t about whether teens should, or shouldn’t argue, it’s the fact of respecting elders so much. His movies, all three of them, show that it isn’t necessarily bad to stick up for what you believe in whether you’re younger than the opposing factors or not. Going against society in ways that not a lot of people were brave enough to endure was something that really stood out, and made him recognizable for decades to come. Being a super-star is something that ordinary people like myself can only dream about.Not necessarily dream as in wanting it so badly it hurts, but dreaming in the sense that living the life of a celebrity would be such an out-of-body experience. Dealing with cameras constantly on a day-to-day basis isn’t some thing that I could put up with. Sure, all the money and fame would be nice for maybe a year or so, by eventually a person reaches a point where privacy is more important than materialistic items. Getting to know someone through the media could possibly be the worst way to get the true story. In pictures, you only get to see one thing, one significant moment that happened to be captured by someone’s Kodak.Gathering background information and searching a little deeper into something that interests you is really beneficial not only for yourself, but also the someone who is getting perceived as a single story. One of his most famous quotes is â€Å"Dream as if you’ll life forever. Live as if you’ll die today. † That’s exactly what he succeeded in doing in his life. â€Å"James Dean lived fast – and died young. † (Gilmore 32. ) Although his life was cut short by an unexpected car crash that ended up being fatal, Dean established a name for himself within the few years that he was an actor.That is astonishing. He has an outrageous amount of fans, and still continues to become known throughout the world today. Works Cited Gilmore, John. ^ John GiLive Fast – Die Young: Remembering the Short Life of Ja. New York City: Thunder's Mouth, 1998. Print. Herndon, Venable. James Dean: a short life. Garden City, NY: Doubleday, 1974. Print. Hofstede, David. James Dean: a bio-bibliography. Westport, CT: Greenwood P, 1996. Print. Springer, Claudia. James Dean Transfigured: the Many Faces of Rebel Iconography. Austin: University of Texas, 2007. Print.

Sunday, September 29, 2019

Message of the poem “On my first Sonne” Essay

â€Å"On my first Sonne† is a poem where Jonson describes his reaction to sorrow when his first son dies. Jonson confronts conflict, loss and despair when â€Å"Ben Jonson his best piece of poetrie† was â€Å"exacted by fate, on the just day†. He uses his son as an inspiration in this poem and describes his different stages that he has gone through by using language and structural features in this poem. The structural layout in this poem suggests that a progression of ideas is taking place. The first five lines indicate struggle, conflict, loss and despair. He experiences shock and guilt as he says, â€Å"My sinne was too much hope of thee, loved boy†. The feeling then develops to acceptance in line six, where he asks rhetorically â€Å"For why will man lament the state he should envie?† Jonson then follows this statement with various points trying to argue his bitterness and guilt. Simultaneously, he resolves his feelings in the last lines by saying â€Å"For whose sake henceforth, all his vowes be such,† Throughout the poem, modality in verbs changes, this supports the idea mentioned above. Jonson uses low modalities and conditional phrases at the beginning of the poem to show doubt, confusion and guilt. Because of the progression of ideas throughout the poem, the modality in the verbs change from low and conditional to high modality and declarative. He shows this by using this phrase at line nine: â€Å"REST in soft peace, and, asked, SAY here doth LYE.† These contrasts with the phrase used in line five when he says â€Å"O, COULD I loose all father now?† which has a low modality. Jonson uses part rhyme in the words â€Å"Sonne†, â€Å"sinne†, â€Å"soone† and â€Å"Jonson† to link them together. This highlights the development of ideas and the motif of the poem. These words are meant as metaphors of all his feelings towards the loss of his son. Jonson uses the phrase â€Å"Farewell, thou child of my right hand and joy† to describe what his first child meant to him. Jonson uses an intertextual link to the bible when mentioning â€Å"child of my right hand†. He is referring to Benoni, the eleventh son of Jacob [Israel] in the book of Genesis. Benoni means child of grief and Benjamin means the son of my right hand. The poet  uses this analogy to describe his feelings of the painful departing of his son and what it meant to him. â€Å"Joy† is used to contrast Benoni and causes confusion and uncertainty. Another language feature in this poem is presented in line three, â€Å"Seven yeeres thou wert lent to me, and I thee pay†. This phrase has twelve syllables and has three stresses at â€Å"SEVEN YEERES THOU†, meanwhile the other lines have ten syllables and are in iambic metre. This is used to emphasis the â€Å"seven yeeres† that his child lived. â€Å"Lent† and â€Å"pay† are contrasts. These two words illustrate that Jonson considered God as an owner of his child, rather than his own. â€Å"O, could I loose all father now.† (line 5) and â€Å"Ben Jonson his best piece of poetrie† (line 10) uses polysemy to interpret different characters. Jonson uses polysemy in line five to interpret three characters; Ben Jonson Sr., Ben Jonson Jr. and the Heavenly father himself. If the words are moved around, there will be different interpretation to the phrase. â€Å"O† signifies pain and clamor. â€Å"Could I loose all father now† can have different interpretations. Ben Jonson Sr. could have meant that he will lose his privilege as a father, Ben Jonson Jr. could interpret that he will lose his father and the â€Å"father† can be read as the heavenly father. Likewise, the line â€Å"Ben Jonson his best piece of poetrie† can be referred as Ben Jonson Sr. or Ben Jonson Jr. This polysemy can refer as the son being the â€Å"best piece of poetrie† that Ben Jonson Sr. has ever wrote or that the inner self of Ben Jonson Sr. â€Å"doth lye† dead. Rhyming couplets are used to indicate Father and Son are paired as one together. The poem is composed in twelve lines with the rhyming scheme of AABB. This suggests that the Father and Son are united even though that death has separated them. Line five and six has the same rhyme than line nine and ten. Line six set up a rhetoric question, â€Å"For why Will man lament the state he could ENVIE? Line nine and ten define the â€Å"state† that â€Å"man†¦could envie† in reference to the poet’s feeling, â€Å"Rest in soft peace, and, asked, say here doth lye Ben Jonson his best piece of POETRIE.† These four lines have the same rhyme. This language device is used to link the four lines together to indicate us a connection between the question and the answer. Throughout the poem, Jonson changes from first person to third person. This stresses the separation between the father and the departed son. Jonson uses first person in the first half of the poem, speaking to Jonson jr. directly as he is alive, when he says:: â€Å"My sinne was too much love of thee, loved boy,† This line puts the words into the reader’s mouth, making the reader think that Jonson was speaking to the boy. But as the poem develops; Ben Jonson Sr. and Son are being divided apart. Later on, third person is used to indicate separation. Jonson uses this technique to show polysemy and argue that the son and father are still together even though death separated them. The use of sibilance in the poem creates a peaceful and restful atmosphere. Jonson builds up sibilance consonants throughout the poem. This could mean that Ben Jonson Sr. is reconciling with the feeling of pain that he is undergoing with his struggle. A good indication could be line seven; â€Å"soone scap’d worlds†, it has three unstressed syllables in a row, suggesting a change of mood in the poem. This is followed by line nine that has five sibilance: â€Å"REST in SOFT PEACE, and, ASKED, SAY here doth lye.† This line possesses sibilance supporting the idea of a tranquil mood in line seven. Jonson concludes the poem by vowing not to love â€Å"he†¦never like too much†. This father’s feeling on the loss of his son, has brought Jonson to use various structural features to identify his stages of sorrow he has gone thought. The use of various language features, such as polysemy and rhyme describe his various interpretations to his grief and gives the reader the challenge to understand fully â€Å"Ben Jonson his best piece of poetrie†.

Saturday, September 28, 2019

Educate the child according to his way

When one hears the words â€Å" particular instruction, † they automatically think â€Å" disablement. † However, that is non the instance. There is an old stating â€Å" Educate the kid harmonizing to his manner, even in his old age he will non turn away from it † ( Proverbs 22:6 ) . This adage had evolved over clip as the premiss for educating kids harmonizing to their single demands. The end of â€Å" particular instruction † as we know it today is to do acquisition accessible, relevant, and manageable for all kids. Children with particular demands frequently require individualised plans in order to larn. They can non maintain up with mainstream kids. The ends and impressions of Particular Education have progressed drastically over the old ages. From every bit early as the 1800 ‘s until today, pedagogues have been successful in polishing the course of studies and learning methods to profit the kids with disablements. In the yesteryear, those who were â€Å" different † did non have an instruction and the badly handicapped were frequently shunned or locked up or sent to the natural state to be torn apart by animate beings. Over clip, statute law and Torahs have reinforced for the right for each kid to have a just and optimal instruction. Any kid that has any signifier of cognitive, societal, communicative, emotional, behavioural, learning, physical or centripetal issues is entitled to individualise attending to heighten their learning experience. There have ever been kids with particular demands. However, for many old ages there were no schools or services available for them. Before the 19th century, during the Middle Ages, is was said that those persons who were mentally unstable were non held accountable for their ain actions or behaviours. Childs who were disabled were sent to refuges to be protected from the â€Å" barbarous universe † in which they did non suit. ( Fuller & A ; Olsen, 2008 ) . As the thoughts of democracy, single freedom and equalitarianism began to look in America and France, peoples attitudes changed. ( Hallahan, 1997 ) . The historical roots of particular instruction can be traced back to the early 1800 ‘s. Many modern-day instruction methods for kids with particular demands were used back so. ( Hallahan, 1997 ) . With the bend of the 19th century, things began to alter. In the early 1800 ‘s, Jean Marc Itard ( 1775-1838 ) , an Italian doctor and research worker for the deaf, found that acquisition is possible for anyone through â€Å" custodies on † experience in an environment that is decently stimulated. He is the individual whom most historiographers trace the beginning of particular instruction ( Hallahan, 1997 ) Three Frenchmans were researching in the forests and found a immature male child entirely, wholly wild and missing many accomplishments. They guessed the male child to be about 11 old ages old. He was taken to Paris, where he would be studied as an illustration of the human head in its cardinal province. The doctors who examined him declared that he was non â€Å" wild † instead the male child was mentally lacking. ( Plucker, 2007 ) No one agreed with Itard, nevertheless, he believed that the kid, Victor, the name he chose for the male child, was the manner he was because he had been populating in the wood for old ages and did non hold the proper attention. He claimed that Victor ‘s mental lack was due to the deficiency of human interaction. Itard believed that it can be overcome. He devoted the following five old ages to an individualised educational plan. This was the first illustration of an IEP, and the beginning of modern particular instruction. ( Plucker, 2007 ) Itard was successful in detecting many learning techniques that introduced many methods of direction to particular ed pedagogues. Subsequently, his pupil Edouard Sequin, brought this educational method to the US. During this clip, persons with disablements were put into restricting prisons without proper attention and nutrient. Many doctors such as Edouard Sequin, wanted to relieve the opprobrious ill-treatment from the people with disablements ( Ackerman, Jaeger, & A ; Smith, 2009 ) . In 1817, Thomas Gallaudet established the first institute for the deaf in Hartford, Connecticut which is now called â€Å" The American School for the Deaf. † In 1829, Samuel Gridley Howe ( 1801 – 1876 ) who graduated from Harvard Medical School in 1824, founded the â€Å" Perkins School for the Blind † in Watertown, Massachusetts in 1829. Howe was successful in learning Laura Bridgman, which had a large influence on the future instruction of Helen Keller ( Hallahan, 1997 ) . A miss like Helen Keller would hold ne'er imagined there to be a topographic point for her to larn. This was now a dream for Helen Keller. Anne Sullivan trained in Perkins School and turned Helen Kellers dark universe in to light. Sullivan enabled a blind, deaf, and muffle miss to pass on every bit best as she can with others. At the terminal of the 19th century, the authorities implemented juvenile tribunals and public assistance plans for both striplings and kids. Many particular categories were formed in many schools every bit good. However, many of the lesser disableme nts were non treated during this clip due to the fact that they were largely incognizant of these jobs unit subsequently on when the public school system evolved. The major focal point in the 1800 ‘s was chiefly on the terrible handicapped persons who suffered from mental deceleration, sightlessness, hearing loss, and emotional perturbations ( Myhill, 2008 ) . From 1817 to the beginning of the Civil war, more than 40 old ages, many provinces in the US set up schools for the blind, deaf, and mentally retarded or orphans. These schools tried to follow the ways of the European schools. In 1817, in Hartford, CT, the American Asylum for the Education and Instruction of the Deaf was opened. In 1959 the Massachusetts School for the Idiotic and Feebleminded Youth, now called the Fernald Development Center, was set up in Boston. ( Kirk, 2006 ) . The particular category for deaf kids was in a public school in Boston in 1869. Approximately 30 old ages subsequently, a particular category for the mentally retarded was organized in Providence, Rhode Island. In 1899, a category for kids with physical damages opened followed by a category in Chicago for kids who were blind. ( Kirk, 2006 ) . At the bend of the 20th century, pedagogues began to concentrate a batch more on the function of particular instruction. In the early 1900 ‘s, the figure of particular instruction categories drastically increased. There was more of an accent on mental wellness and kid clinics. In add-on, the rise in psychological science began and the usage of mental trials resulted in the growing for new surveies and methods in every country of particular instruction. In 1922, the Council for Exceptional Children was formed. This was the start of many establishments and organisations that would alter the instruction for particular demands people in America. In 1930 many parents gathered to organize a group on a national degree. In 1950, this group was subsequently known as the National Association for Retarded Citizens. In 1963 they developed the Association for Children with Learning Disabilities. ( Ackerman, Jaeger, & A ; Smith, 2009 ) . These new thoughts of instruction prompted many people to recommend for particular demands kids. Up until the 1930 ‘s, many believed that heavy concern should non be placed on persons who failed to maintain up with the criterions of a schoolroom. However, at this point, many were recognizing the deficiency of their ability that it was non the kids mistake. Yet, with the proper stimulation, they can win. ( Government, 2002 ) . In add-on, the book â€Å" The Child Who Never Grew † by Pearl Buck, stole the Black Marias of many parents and fostered the parental support groups. The book describes the experience of raising a kid with mental deceleration. It provided parents encouragement that they were non entirely, and that there were many others sing the same thing as they were. ( Fuller & A ; Olsen, 2008 ) . In 1954, the classical instance of Brown vs. Board of Ed took topographic point. This instance had a major impact on pupils with disablements. ( Pardini, 2002 ) The tribunals began to reconsider the rights of minority citizens in many different ways. One of the most influential advocators for the rise in particular instruction would be President Franklin D. Roosevelt. He demonstrated that person wheelchair edge can still execute expeditiously despite their disablement. Further more, while in office, President John F. Kennedy established the Task Force on National Action to Combat Mental Retardation, the President ‘s Commission on Mental Retardation, and the Bureau of Education for the Handicapped, which is now the office of Particular Education Programs. Turning up with a mentally sick sister, he strongly influenced the development of particular instruction, while stressing the importance of the right for those with disablements to a full chance of instruction. ( Fuller & A ; Olsen, 2008 ) . By 1975, the Education for all Handicapped Children Act, besides known as Public Law, and the FAPE, free appropriate public instruction, were implemented. They established the footing for instruction reform for babies through striplings with disablements and enabled pupils with disablements to assist fund the heavy costs for services. ( History of Spec ial Education, 2003 ) . It besides provided the same rights for instruction for pupils with disablements and those regular mainstream kids. ( Kiss, 2006 ) . In 1977 the EAHCA, Education of all Children Act was actualized. It stated that the Torahs protecting kids with disablements the right to free instruction, the FAPE. This besides included that pupils should be placed in the last restrictive environment LRE, and proper arrangement harmonizing to their demands. Teachers worked together with the kid and frequently used alternate methods or allowed the kid some excess clip to finish the assignment. Some schools set aside resource room to assist weaker kids one on one. This backfired because frequently kids who were pulled out were looked at as â€Å" different † and many â€Å" regular † instructors slacked off with their duties of their particular demands kids. ( Berger, 2005 ) . In 1990, to work out this job, the construct of â€Å" inclusion † was created. Th is was an attack in educating kids with particular demands in which they are included in regular schoolrooms with â€Å" appropriate AIDSs and services † as required by jurisprudence ( Berger, 2005 ) . This led up to the enlargement of the IDEA, the Persons with Disabilities Education Act in 1990. The IDEA is responsible for over six million kids having particular services today. ( History of Special Education, 2003 ) . The incredible advancements of past pedagogues in particular instruction were of import edifice blocks to what particular instruction has become today. What exists today in Particular Education is from the difficult work of pedagogues and parents of the old centuries. Today over two hundred thousand immature kids and 598,922 pre schoolers are having services through the Board of Education as of 2001. ( Fuller & A ; Olsen, 2008 ) . Particular instruction services are made to concentrate on the person in order to guarantee that the kid is maximising their full potency. It consists of either one on one little group direction, learning alterations, and physical, address or businesss therapies. Each kid is provided with an Individualized Education Program, or IEP, which targets the ends and demands for each specific kid. The schools must supply one-year advancement studies in functional and academic accomplishments. ( Fuller & A ; Olsen, 2008 ) . While seeking to keep inclusion schoolroom s, schools besides have to do certain they are run intoing the demands for the province appraisals. To reason, particular instruction has gone through a enormous sum of alterations. In the 1700 ‘s and early 1800 ‘s, there was no such thing as educating an exceeding kid. In add-on, instructors had small preparation in binding to understand the universe of a kid with disablements. ( Johnson, Dupuis, Musial, Hall, & A ; Gollnick, 1999 ) .However, in the 20th century, that began to alter quickly. Today, instructors are trained in specific countries and work with these kids to break their opportunities in taking a successful life. There is a uninterrupted sum of attempt put in to assisting those who needed excess aid. In is unfortunate that the exceeding had to endure so much for particular instruction to go a world. Hopefully we will go on to keep the advancement in the hereafter.

Friday, September 27, 2019

Critical review on an article Literature Example | Topics and Well Written Essays - 1000 words

Critical on an article - Literature review Example As such, the policy document by the Basel Committee on Banking Supervision (2011, p. 7) has proposed the following reforms: â€Å"raising the required quality and quantity of capital in the banking system, improving risk coverage, introducing a leverage ratio to serve as a backstop to the risk-based regime, introducing capital conservation and countercyclical buffers as well as a global standard for liquidity risk.† These reforms are meant to improve the resilience of the banking sector during such trying times that are characterised by unprecedented changes in the global economy. It has been noted that international banks are often affected by externalities in their operations of which they have little control over them. For instance, G-SIBs in different countries had little control over the impacts of the recent global financial crisis that witnessed the closure of some financial institution which could not sustain their operations. Main objective of the policy proposal The main objective of the policy proposal suggested by the Basel Committee (2011, p. ... Therefore, in order for these policy frameworks to be effective, they should be developed from a global standpoint where different countries contribute towards the policy formulation which will guide the operations of all international financial institutions. The Financial Stability Board (FSB) in consultation with different nations will help implement these policy changes which will be applied on a global level. Indicator-based measurement approach The indicator based measurement approach has been recommended by the Basel Committee and this method is based on various indicators that have been carefully chosen to identify the factors that often generate negative externalities that can affect on the global financial institutions in cases of global financial crisis which require a global solution rather than a national solution. Both quantitative and qualitative methods will be used to complement each other in carrying out this measurement. The main advantage of this strategy is that i t involves many dimensions of systemic importance which include the following: size, cross-jurisdictional activity, interconnectedness, substitutability and complexity. Size- the element of size of a banking institution is very important given that if it is a large institution, its failure is likely to impact negatively on the global economy. Cross-jurisdictional activity- the activities of the bank in other countries can impact negatively on their economies in the event of failure or distress. Therefore, this indicator need to be established while there is still time so that it does not spill over to the economies of the other countries and the globe at large. Interconnectedness- the level of interconnectedness of the G-SIBs means that they can share the spoils in the

Thursday, September 26, 2019

Provide answer to 5 different assignments of Employability and Essay

Provide answer to 5 different assignments of Employability and Consulting Skills subjects - Essay Example According to Mankin (2009 p. 21) a good event manager should have the required human skills to develop and execute an event. The roles extend beyond personal attributes to professional qualifications that an individual poses. Event managers are responsible for all events that corporates engage in and thus are supposed to be competitive in boosting the image and profile of the company. I consider this position due to my undoubted professional and personal skills. Throughout my life I have displayed leadership skills that have earned me confidence in leading the right direction. Consequently, I am a person who puts every idea into a thorough process of reasoning to obtain workable solutions. Reasoning in decision making is not a choice but a core ingredient. Managing events require adequate Interpersonal skills since it involves people different personalities and calibers. As such, good interpersonal skills can act to create a good environment. My ability to communicate with different groups of people may justify my reasons for applying for the position of events manager. In agreement with Slater (2010 p. 43), the success of an event cannot be guaranteed if the manager does not poses team management skills. Usually, the team planning or attending an event is so large and may overwhelm the staff and the manager. This may raise confusion and subsequent failure of the event. However, with good team management skills, the manager can allocate roles effectively. With this in mind, I find my role very important in this position. Lastly, I find myself suitable for this role since it requires excellent communication skills. I will apply my skills in influencing success of events. Since all corporate events have objectives, communication skills may assist in attaining them. Marketing is challenging job that requires adequate preparation and experience. In my case, I have undergone a rigorous training at the Kasetsart University

Critique of Research Studies Part-3 Paper Example | Topics and Well Written Essays - 1750 words

Critique of Studies Part-3 - Research Paper Example The research had two groups, with one on the self-management services program while the other one was Non-SMS. The researchers assumed that the differences between the two groups were the result of the self-management services program. The research used Statistical Package for Social Sciences for Windows (version 16; SPSS Inc., Chicago, IL) as the main statistical analysis tool. Comparison of the two groups in the study relied on the v2 test and variance analysis. In order to estimate the time and ratings of the dialysis process, the researchers opted for the Kaplan–Meier method. These methods successfully helped control for the occurrence of confounding variables. The researchers minimized the occurrence of both type 1 and 2 types of errors by ensuring a careful calculation of a significant p-value that served as a guide in the rejection of either the null and the alternate hypotheses. The nurses charged with the role of data collection and entry did a diligent job because th ere was no issue of missing data since data was available for the 54 patients. Findings The researchers present comprehensive finding from the two groups with emphasis accorded to the statistical significance. In all cases, the p-value is provided and there is evidence of effect size as the researchers focused on establishing the differences between the two groups of patients suffering from chronic kidney disease. There is good user of tables and figures in the representation results. The confidence intervals seem reasonable in addressing the parameters for an unknown population. Moreover, the presented findings from both groups and variables considered suffice to allow a meta-analysis in comparison to different sets of data obtained from related studies. Discussion Interpretation of Findings It is evident that the researchers embarked on an extensive process of interpreting the presented results. There is an elaboration of the meaning and significance of measuring all the variables highlighted in the report. Apparently, the researchers have discussed the results within the framework described in the introduction. Therefore, the discussion exhibits relevance to the context of chronic kidney disease and the effect of the self-management services. The researchers have made a point of justifying all the causal inferences inherent from their findings. Evidently, all interpretations provided in the discussion section have a good basis contextually, making them well founded. In addition, there is evidence of consistency of the discussions offered and the research limitations. As expected, the research presented its unique limitations especially in definition of the effect size that highlights the difference between the SMS and Non-SMS groups. The researchers also paid attention to the generalizability of the findings to a greater population. Implications/recommendations The researchers highlight the implications of their study in accordance to the presented findings . It becomes apparent that the self-management services program designed to address the issues that the patients consider as critical effective in reducing the rate at which the

Wednesday, September 25, 2019

Socrates Essay Example | Topics and Well Written Essays - 500 words - 1

Socrates - Essay Example listening to both sides of the argument rejects the study of language altogether declaring it shallow and shoddier than the study of things themselves. If we go into the details of this argument, Plato’s seems to argue that nothing significant can be known about a particular thing by examining its name Keller(2000,pp. 285-305) . The actual worth of a thing lies in itself which seems convincing to some extent. However, at the same time, it seems a bit irrational to assume that the words or names have an intrinsic relation to the things they signify .A same thing can be viewed differently by different individuals depending on his mind set. It certainly will not be wrong to say that it is all a matter of perception. For instance, the word ugly sounds ugly but it certainly does not signify the essence of the thing it is referring to and it sounds ugly only because it has been inculcated in our minds from the beginning of our lives thereby making Hermogenes’ argument stronge r Robinson(1956,pp. 325). Even the educational psychology reveals that it is not the verbal utterances but the behavioral patterns that have a deep impact on a person’s mind. Socrates argument, on one hand, sounds convincing but on the other hand, the importance of language cannot be denied altogether and I firmly believe that the two of them go hand in hand. It is indeed more important to go into the depth of the thing itself in order to study it extensively, however, language is an essential medium to give one’s thoughts a voice with interesting corollary which basically is the most significant attribute of mankind and giving them equal importance sounds a lot better than the Socrates’ argument of rejecting the language altogether. Hence, it can be said that the name of a thing may not be as important as the thing itself but a thing without any apparent identity of its own makes it hard to describe. In fact, the plot of the argument shows a contrast between wh at Socrates is defending in

Tuesday, September 24, 2019

Measurement and Instrumentation(Hall Effect) Assignment

Measurement and Instrumentation(Hall Effect) - Assignment Example The separation of charge establishes an electric field that opposes further migration of charge and a steady electrical potential will be eventually established as long as the charge is flowing. The sensor experiment has a hall sensor rig that has been attached on the flat surface of the board. The board is calibrated with measurements showing how far the slider is from the sensor rig. The slider has a magnet attached to it. From the experiment, the DC voltage increases as the slider moves further away from the sensor rig and reduces when the slider is closest to the sensor rig. The slider has a magnet attached to it, while the sensor rig has current moving within it in one direction. When the slider is near the sensor rig, a strong magnetic field that is not parallel to the direction of the moving charges in the rig is formed. The magnetic field is perpendicular to the direction of the moving charges in the rig. This strong magnetic field causes the charges to accumulate on one side of the sensor rig. This leaves equal and opposite charges exposed on the opposite side which has few mobile charges. This results in asymmetric distribution of charge density across the hall element that is perpendicular to the line of sight path and the magnetic field. This separation of charges establishes an electric field that opposes further migration of charge (Ramsden, 2006). The strength of the magnetic field determines the concentration of charges on one side of the rig. When the slider which has a magnet is near the sensor rig, there are more magnetic fields felt on the sensor rig than when the slider which has a magnet is further away. Therefore, there is only a small charge that passes through when the magnet is closest to the rig hence the small voltage reading by the digital multimetre and a lot of charge is able to pass through when slider with magnet is further away from the sensor rig hence the high voltage reading by the

Monday, September 23, 2019

Fiat. A troubled European Giant. Answer 4 questions+Introduction and Coursework

Fiat. A troubled European Giant. Answer 4 questions+Introduction and Summary - Coursework Example The company fell because of embezzlement of funds by the Agnelli family, which owns about 34% of the normal shares through the holding companies Ifi and Ifil. The Agnelli Family control maintenance has been a priority hence making it hard for Fiat to enter into treacheries and joint businesses that are common among its rivals. Fiat has been investing slowly in the quality improvements and other innovations placing itself at a weak position of quality guarantees when competition was opened in the market. The company had many debts that amounted to 6bn, with its falling selling that fetched it losses. Still in this state about 6000 job were lost and production was stopped in 18 plants. The company offset some ventures such as insurance and aero- engines operations. Even though Mr. Berlusconi had promised to improve economy, cut taxes, and reforms in the structure, he faced troubles to accomplish them as he faced public rejection to the unpalatable changes. Intense competition and a declining market share is the main problem, which causes the following; as domestic brands tend to dominate home market, Fiat’s proportion of sales in Italy is high. Still, this dominance is on decline, as in 2004 domestic brands had fallen approximately for 30% of sales. Fiat’s business face generational turnover and increased overseas competition. Initially, Fiat was closely allied with the government which was instrumental to its post-war economic recovery and which enabled Fiat to shelter from international competition. In addition, the company concentrates on the compact market in European countries whereby with a small company they can continue to pay more attention to the quality of their products. Fiat’s vehicles have been enhanced greatly which made the company get over $ 70 million Euros as the demand of their cars increased. The company needs to turn around the business so that it would be attractive enough for General Motors to its shares. In

Sunday, September 22, 2019

Operational Management at Mcdonald Essay Example for Free

Operational Management at Mcdonald Essay One aspect of facilities layout for McDonalds is that when customers come into the building, they line up in one of several lines and wait to be served. In contrast, customers at Wendys are asked to stand in one line that snakes around the front of the counter and to wait for a server to become available. a) What is the rationale for each approach? b) Which approach do you favour from (1) a customers perspective and (2) managements perspective? Explain. A Rationale for McDonald approach McDonalds success had been built on four pillars: limited menu, fresh food, fast service and affordable price. Intense competition and demands for a wider menu drive-through and sit-down meals encouraged the fast food giant to customize product variety without hampering the efficacy of its supply chain. McDonalds use assembly line procedures in their kitchen for mass production so as to keep prices low. Speed, service and cleanliness is one of the critical success factors of the business. Lining up in one of the several lines tied into McDonald’s capability statement on speedy service, efficiency and good customer service. Each staff at McDonald is trained to change roles within shifts and this makes resource management during peak and off peak hours manageable. At all times there is enough staff on hand to take care of business and overall effectiveness is improved Drawback to this approach includes huge rental space to accommodate large operational facility. It could also become very costly on staff training. Workforce productivity are not usually related to the number of staff working on a task, and productivity variance may tilt negatively for McDonalds on this. Operating cost are very high and unless this is well managed, it may not necessarily be profitable. Rational for Wendy’s approach The rationale for Wendys old fashioned hamburgers could be traced to the history of unsuccessful attempts to outperform the competition which created the low profile structure. Wendy’s headquarters shifted to Dublin after a merger with Triac, Arby’s parent company and the very conservative style of  European business. Structure of business is very simple and easier to manage; it does not envisage much growth and cater mainly for the bottom line. It will require less space and resources to manage. Also less inventory and therefore less operating cost, however this will also impact on profitability. Drawback to this approach includes disorganized premises during peak hours, unsatisfied customers due to longer wait times for service. Wendy at some point was also suspect for cleanliness and this approach would add more to the problem. Managers Perspective The two approaches shows different business and strategic objectives. McDonald approach depicts a growth oriented organisation that wants to create market dominance in the sector. Wendy concentrates on its core traditional product, so that those who appreciate the product will be kept in the customer chain. The McDonalds style will require acquisition of new business skills and technology while Wendy traditional styles will require less technology. Looking at the management styles, McDonalds is poised to remain the leader in the food chain industry with concentration on their supply chain system and product differentiation methods. McDonalds work with farmers to ensure that produce are sized right and grow to specification, while Wendy concentrates mostly on the beef. With these different styles, McDonalds will be my preference for growth and bottom line. Wendy cannot compare to Mac in the business because more and more happy customers are trooping to Mac for what they see as 21 cent ury improvements.

Saturday, September 21, 2019

Basic resource for any organisation

Basic resource for any organisation Introduction: Information is basic resource for any organisation to its management. If the information is available on time its really effective for the management in its operations. The term information system usually refers to a system based on computer which is designed to support the operation, management and decision function. Management information system collects, transmit, process, store information and the system convert this data for management to make decisions and the strategy in the organisation. Reason for information system strategy First let me clear the misunderstanding for those who dont understand that whatever we do we have a strategy.im sure everything we do we have an objective to achieve that plan we make a plan that plan is strategy. Problem is strategy can be good or it can be bad or we may not have spotted that we can do much better if take the opportunity and environment into account. But there can be certain things give us a push to adopt a strategy and to achieve the better results for our business. There are two distinct phases, the first one is quantitative and the second one is qualitative. The first part we talk about the research of different organisations. In each organisation we will talk about different key stake holders in formulation of strategy process. This phase of the research will be started when different stakeholders will be interviewed over 100 interviews have been conducted so far. For the second phase the potential sample size will be every HEI in the UK. The first method tool which is being used to get samples in the first part is based on interviews and observation from which case studies are being created. The case studies created in part one will then be used to enlarge and increase upon present theory to grow a survey. This will be directed, using the results already recognized in qualitative research and different other organisations. This will bring the experimental sample to lots of other organisation which is adequate to learn any main defects in the survey. The second data-gathering tool will be a organized survey. The small size of the real people means that the survey can be given in all the organisations to at smallest three key stake holders or alliance frontrunners. Earl suggests a multiple methodology to formulate an information systems strategy. Earls multiple methodologies Earls multiple methodology provides a means of: Clarification of the business needs and strategy in information systems terms. Evaluation of current information systems provision and use. Innovation of new strategic opportunities. 1. Top down clarification Earls definition of a suitable method to clarify business needs in IS terms: ‘A methodology that is easily understood and used by line and general managers, it can cope with varying robustness of business strategy, it does not consume too much time or resource, it can be repeated as circumstances inevitably change and, as a result of these needs and because it could not achieve anything else, it points to directional IS needs and not detailed specifications. The ‘Critical Success factors approach meets many of the requirements of the definition. There are otherssee ‘Strategic Management and Information Systems Wendy Robson See ‘IT Strategy for Business Joe Peppard 2. Bottom Up evaluation Most organisations only have a vague understanding of the potential and capacity of their present IT systems. The technical perspective and backroom perception of IT may create a barrier. To understand the present systems a bottom up analysis is carried out. This involves an audit or survey. As well as the technical detail the user/specialist interface is examined. The value of the system to the organisation must also be ascertained. In this evaluation the following questions must be asked: How reliable is the system? How easy is it to maintain? How cost effective is it? What is the impact on the business? How easy is it to use? How often is it used? What is the state of our specialist user relationship? Other considerations might be the interactivity of the systems. These interactions and the evaluation can be shown graphically using systems maps or other means. The present systems can then be examined for strengths and weaknesses. The top-down business approach and the bottom-up systems approach do not provide an opportunity to exploit radical new ideas for exploiting the competitive advantage of IT. The business approach examines the ‘what and does not examine the ‘hows. The bottom-up approach is constrains radical thinking by the presence of the evaluation process and the strengths and weaknesses of the existing systems. A more detached approach is needed. 3. inside out thinking lateral thinking It is often inspiration and creativity that produces the bright spark ideas that can produce the beginnings of an IS strategy for competitive advantage. Ideas brought from unrelated sectors can often be successfully applied. The right atmosphere must be nurtured to produce this creativity. Runge suggests the following six characteristics associated with IT innovation|: The idea often emanates from a commercial manager. The idea was backed by a senior manager who became the project champion. The competitive advantage was added to an existing system; evolutionary process. The idea was developed outside of the IT control constraints. Customers were involved in the development. The application was given a high profile and was marketed. External Analysis The three legs of Earls multiple methodologies have considered IS strategy from an internal perspective. It is important to also view this strategy from an external point of view i.e. competitors, customers, consumers etc. There are techniques that can help clarify this approach. The SWOTmethod is a suitable candidate that explores both internal and external perspectives. A technique such as SWOT is useful when considering an external view of the three legs of the multiple strategies. Porters five forces model is a useful model for considering the external perspective on IS strategy. Boddy et al suggest that Porters model can be used to construct an IS strategy. Considerations when using the multiple methodologies. The use of methodologies does not mean a ‘cookbook attitude should be taken the implementation of strategies. Methodologies are useful overall frameworks but the context in which they are used needs consideration as well as experience. Experience suggests that: Significant differences existed in different firms; IS strategy formulation inherently seemed a more complex matter in some firms than others; and approaches in practice did not always match either the popular prescriptions or the accounts in case documented articles. Infrastructure-led may emphasise leg 2 bottom-up approach. Business-led may emphasise leg 1 top-down approach. Opportunity-led may emphasise leg 3 inside-out. Alternative approaches There are many other approaches in structuring IS strategy. One such approach is Porters five forces model. This is also useful in conjunction with Earls methodology. The following is reproduced from Body et al. IS changes the basis of competition: opportunities and threats Computer-based information systems are changing competitive conditions in many Indus-tries. There are many tools and techniques which can be used to analyse the relationship between strategy and information systems, depending on their purpose. In this book we can only illustrate one of these approaches, and the Five Forces model originally developed by Michael Porter seems the most appropriate to introduce. It can be used at the level of the individual firm to assess the possible impact of information systems on the competitive position of the firm. A comprehensive account of the many other perspectives on the topic will be found in Robson (1997). Figure 4.5 is based on Porters framework, and a show that IS represents an opportunity to secure a strategic advantage by using it to strengthen one or more of these forces. Similarly, it represents a competitive threat, if other organisations are able to use IS more effectively in these ways. Information systems and the threat of new entrants Managers can use IS on this force by using it to reduce the threat from new entrants by raising barriers, or by using it themselves to enter new markets. Using information systems to raise entry barriers The Caterpillar case illustrates that the manufacturer of the machine links the customer electronically with the service organisation. Because of that electronic link, it is not easy for a customer to go to another service organisation for repair and maintenance. This strengthens Caterpillars position as a manufacturer and as a service provider. The system is so complicated, advanced and expensive that it is hard for existing competitors to imitate. It is even more difficult for new entrants in this market to develop a similar system. The box gives two other examples. In the IS industry itself ‘setting the standard is very important to gaining a strong position. Most customers want to use equipment that has become established as the industry standard. Examples are Microsoft word-processing software, Intel computer chips and Netscape Internet browsers. It is very hard for new entrants to overcome these entry barriers, leading to a winner takes all situation in many sectors of the market. Using IS to enter markets more easily The Caterpillar case illustrates how the company uses its information system to attain a stronger position in the maintenance market. The system can strengthen the relationship with buyers of Caterpillar equipment and provide them with a broad after-sales service. Caterpillar becomes a stronger competitor of independent maintenance companies in new markets. Information systems and the threat of substitutes Companies can use information systems to alter this force by differentiating their products, or by creating new ones which they can use to threaten competitors. Using information systems to differentiate products and services The Caterpillar case shows the company using the information system mainly to improve the speed and quality of customer service. When the system notes deterioration the service starts immediately and the very capital-intensive machine will be repaired soon. This saves the customer a great deal of money. Other companies use the Internet to create and orchestrate active customer communities. Examples include Kraft (www.kraftfoods.com), Intel (www.intel.com), Apple (www.apple.com) and Harley Davidson (www.harley-davidson.com). Through these communities the companies become close to their customers. They can learn and innovate with product or service improvements that would otherwise be impossible. The research summary box below explains why it is essential for information service providers to differentiate their products. Using information systems to create new products and services Telephone and Internet banking are relatively new phenomena which have only become possible with new systems. The same is true of companies that use the power of database technology to offer new services in customer relationship management and direct market-in. Wide Internet access has generated a huge increase in businesses offering new services. These include electronic auctions, search engines, electronic retailers, electronic hubs (Data and Segev, 1999; Timmers, 2000; Kaplan, 2000), and Internet providers. Caterpillar created new maintenance services, and the next box gives another example. Information systems and the bargaining power of suppliers Increasing power of suppliers can increase their power by using information systems to track much more closely the costs of providing services to customers. They can set prices accordingly, or decide that they do not want a particular piece of business. For example, airlines use yield management systems to track actual reservations against traffic forecasts for any flight, and then adjust prices for the remaining seats to maximise revenue. Stepanekz (1999) reports how Weyerhaeuser Doors uses an Internet-based system to, amongst other things; manage orders from its distributors. This allows the company to manage its internal processes more efficiently, but also to assess much more accurately the value of each order, and the overall performance of its distributors. This enables it to refuse unprofitable orders, and to be more selective about the distributors which it supplies. Customer relationship management systems are a currently popular example of suppliers ability to track customers requirements more accuratel y, thus increasing the suppliers power over the customer. Decreasing power of suppliers Information systems can also be used the other way around. Customers can use information systems to strengthen their position in the marketplace at the expense of suppliers power. Ford and General Motors have set up electronic marketplaces and urge their suppliers to use that system to match their supply with the demand of Ford and GM. The Economist (6 November 1999) commented: Ford and GMs e-business revolution will not be confined to them alone. Their decision to go online will ripple through the 50,000 or so firms they trade with. The car makers are careful to say that none of their suppliers will be compelled to use their new portals, preferring simply to express that the benefits-cost savings, the access to new customers, the faster time to market, the sheer value of the information will make it an obvious choice. But the reality is different. Ford and GM are investing a lot in their e-business infrastructure and great hopes are riding on it. Suppliers that want to continue to do business the old way will rapidly become ex-suppliers and before long ex-companies. The next section about the use of information systems to change the power of buyers explores this theme further. This illustrates that information systems are increasingly inter-organisational phenomena, rather than hidden back-office systems. Inter-organisational systems can be used to co-operate as well as to compete with business partners, whether suppliers or customers. Powerful parties tend to urge less powerful ones to adopt their systems. Information systems and the bargaining power of buyers a good example of the balance of power being altered is when retail chains use modern communication technologies to make electronic links with their suppliers. Such systems reduce inventory costs and warehouse expenses and improve fulfilment time and information flows. For instance, they encouraged the further concentration of retailing firms which then had much more power over their suppliers. The retailers computer continually monitors its suppliers finished goods inventories, factory scheduling, and commitments against its schedule. The purpose is to ensure the stores always have adequate stocks. A supplier that is unwilling to join the system is likely to lose business. The box illustrates how Wal-Mart used this idea. More generally, buyers can use the web to access more suppliers, and to compare prices for standard commodities much more widely than was practical with earlier technologies. Information systems and the intensity of rivalry two ways of using information systems in the process of competitive rivalry are by reducing costs and through more effective management. Using IS to reduce costs On-line inventory systems make it possible to make radical changes in manufacturing supply systems. This greatly reduces inventory levels, and the costs associated with them. Car manufacturers are only invoiced for components when the completed assembly leaves the factory. When the system knows that X headlamps have been used, it passes the information to the component supplier. They send an (electronic) invoice for the components used, and supply replacements. There are similar systems in retailing, where suppliers like Unilever and Procter Gamble manage the inventory of their biggest customers. These inter-organisational systems reduce inventory costs but not only through lower inventory levels. They also reduce the need for working capital and allow a (smaller) purchasing department to focus on non-routine orders and strategic supply matters. The Internet enables large companies to transfer their purchasing operations to the web. Secure web sites connect suppliers, business partners and customers all over the world. This makes it easier for new suppliers to bid for a share of the available business, makes costs more transparent, and improves the administrative efficiency of the supply process. Using IS to enable more effective management A travel agents branch accounting system can now provide detailed patterns of business to managers, enabling them to monitor trends more closely, and to take better-informed pricing and promotional decisions. Another example is Ahold, a Dutch retailer, which achieved much greater performance in the supply chain by using its data-mining capability and knowledge extraction in its customer database. Management information systems can expand the span of control of individual managers, which can support the flattening of organisations. These examples show that information systems may become opportunities for creating, supporting or changing generic strategies. On the other hand competitors have similar opportunities there are also costs and risks associated with using information systems in this way. IS can also be a threat New entrants in the financial services sector have been able to introduce telephone bank-in through call centres very quickly. They were able to take advantage of the fact that they did not have an established branch network, and so could use the new technology very quickly. The technology worked to the disadvantage of established banks with many local offices. They found it costly to close branches. The technology was an advantage to the new, a disadvantage to the old. This illustrates a more general point that, for all the potential opportunities, IS can also be a threat. Information systems enable new competition Computer-based information systems represent opportunities for one business and threats to another company. In retailing, large chains have benefited at the expense of smaller shops, large suppliers have benefited at the expense of smaller ones, and large retailers have more power over suppliers. Any use of IS by one company to enter a new market, reduce costs and so on, is a potential threat to a competitor. They lose out if they have not seen the possibility, or have managed implementation less effectively. The London Stock Exchange is threatened by the fact that modern technology allows major institutions to trade shares directly, rather than use the market institution. The problem is increased by the fact that competing exchanges have implemented new information systems more effectively. They are likely to gain a larger share of a smaller market. Information systems place new demands on management time Implementing a major system takes a great deal of management time a cost that managers rarely include when evaluating investments. They require managers to look inward at (important) operational problems of staff, system design, and security. The danger is that they do not look at (even more important) issues of how to use the systems for strategic advantage. In other words: managers are often balancing between a ‘problem orientation and an ‘opportunity orientation. Senior management frequently underestimates the resources required to implement new information systems, especially of managing the many organisational implications. Implementing an information system successfully is difficult many research reports comment on the difficulties of implementing information systems. This is especially true of systems which involve many stakeholders with different interests or those which are innovative in other respects. They often take place in an uncertain environment, from a competitive as well as from a technological point of view. These uncertainties make it difficult to plan a change over a longer time. At the same time, the stakes are getting higher in terms of costs, people and other resources. Even when applications work, there may be downsides Managers often buy in expertise for development, operations and consultancy. These suppliers become the main experts of a companys IS resource. This dependency can be misused. Their lack of knowledge and insight in the organisation causes major problems. They have difficulty in negotiating successfully with the external providers and crucial company knowledge becomes the asset of other companies. References Achterberg, J.S., Gerrit, A. and Heng, M.S.H. (1991) Information systems research in the post-modern period. In Nissen, H.E., Klein, H.K. and Hirschheim, R. (eds.) Information Systems Research: Contemporary Approaches and Emergent Traditions. Elsevier Science Publishers BV, North Holland. Anderson, M. (1992) Implementing an information infrastructure strategy: the University of Edinburgh experience. University Computing Antill, L. (1991) Selection of a research method. In Nissen, H.E., Klein, H.K. and Hirschheim, R. (eds) Information Systems Research: Contemporary Approaches and Emergent Traditions. Elsevier Science Publishers BV, North Holland. Baroundi, J.J. and Orlikowski, W.J. (1988) A short form measure of user information satisfaction: pychometric evaluation and notes on use. Journal of Management Information Systems Boaden, R. and Lockett, G. (1991) Information technology, information systems and information management: definition and development. European Journal of Information Systems Breaks, M. (1991) Information systems strategies. British Journal of Academic Librarianship Burrell, G. and Morgan, G. (1979) Sociological Paradigms and Organisational Analysis: Elements of the Sociology of Corporate Life. Ashgate Publishers. Campbell, W.G. and Fiske, D. (1959) Convergent and discriminant validation by the multitrait- multimethod matrix. Psychological Bulletin Creswell, J.W. (1994) Research Design: Qualitative and Quantitative Approaches. Sage Publications.Return to text Fitzgerald, E.P (1993) Success measures for information systems strategic planning. Journal of Strategic Information Systems Galliers, R.D. (1991) Strategic information systems planning: myths reality and guidelines for successful implementation. European Journal of Information Systems

Friday, September 20, 2019

Automation Process in Online Shopping

Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the Automation Process in Online Shopping Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the