Wednesday, October 30, 2019

Role of Strategic Entrepreneurship in forming Temporary Competitive Dissertation

Role of Strategic Entrepreneurship in forming Temporary Competitive Advantage resulting in Value Creation - Dissertation Example rce orchestration 36 2.8 Theory construct of entrepreneurship 37 2.9 Theory construct of strategic entrepreneurship 38 2.10 Conceptual framework 40 2.11 The association between strategic entrepreneurship and competitive Advantage 43 2.12 Limitations of prior research 44 2.13 Summary 44 3 Research methodology 46 3.1 Introduction 46 3.2 Research philosophy and approach 47 3.2.1 Positivism 47 3.2.2 Deductive approach 49 3.3 Research strategy for qualitative and quantitative research 50 3.2.1 Qualitative research approach 50 3.2.2 Quantitative research approach 52 3.2.3 Biases in using case study, qualitative methods quantitative methods 53 3.3.4 Eliminating biases in case study methods, qualitative methods and quantitative methods 54 3.4 Research method and design 55 3.4.1 Case study 55 3.4.2 Interview 56 3.4.3 Survey 56 3.4.4 Observation 58 3.5 Sampling 59 3.5.1 The sample size 60 3.5.2 Simple random sampling 60 3.6 Data collection and analysis procedures 60 3.6.1 Structural equation m odeling 61 3.7 Summary 62 References 64 CHAPTER 1 INTRODUCTION Michael Porter promotes the idea that in order to grab hold of competitive advantage, competitive strategies are necessary for a certain organization to realize its corporate goal that would lead the firm to become a cut above the other (Porter 34). Porter tries to justify this point by embarking on the potential theoretical concepts associated with how a firm would achieve its competitive position in its industry or marketplace. As long as competitive advantage is a primary consideration, there is a relevant truth pertaining to the ultimate capacity of competitive strategies to help an organization realize its prevailing plans and objectives, as it could be either defensive or offensive actions that could ensure defendable position in the industry (Porter 34). The existence of competitive strategies is common everywhere today because of the tough competition, particularly in the realm of business. Strategic entrepreneur ship is one detailed subject in this area, where strategic management perspectives are present in order to pursue sound and excellent entrepreneurship for an existing firm’s competitive advantage, the very reason why many studies surfaces in order to understand why other firms generated successful performance and others do not (Rezaian and Naeiji 3). Strategic entrepreneurship is a common theme especially in the age of global economy, by which the organizations have the chance to explore a vast stretch of market area. Competition has become so tough, but one ultimate way out in order to make a difference is to secure a move towards strategic entrepreneurship to achieve competitive advantage. This is relevant to some existing companies at present where they initiated global strategic alliance for instance in order to define more critical point of doing entrepreneurship that would make a difference in their industry or specific market niche. They have strong orientation towards competitive advan

Tuesday, October 29, 2019

Enterprise, weekly blogs and Portfolio Coursework

Enterprise, weekly blogs and Portfolio - Coursework Example There are major benefits and value levels associated with implementing Enterprise 2.0. For example, the implementation of Enterprise 2.0 enhances the reputation of a company. Coca-Cola Company implements Enterprise 2.0 through the Coca-Cola fan page. This enhances the reputation of the company by allowing Coca-Cola fans to create and maintain content, which presents Coca-Cola as an attractive company. Moreover, the Coca-Cola fan page manifests how the company adopts new web technologies, which improve the company’s reputation. The fan page equally increases the company’s visibility in the market. Through the fan page, the company can establish and address various customer needs. The implementation of Enterprise 2.0 relates to specific functional areas. Indeed, the implementation of Enterprise 2.0 through the Coca-Cola fan page enhances product development and customer service across the enterprise. Indeed, through the Coca-Cola fan page, the consumers help in product development by giving their views and comments on various company brands. The company can draw the consumer’s response to various products by following their views and comments on the fan page. This will help the company to develop products that address consumer’s needs in diverse locations. The Coca-Cola fan page is a significant medium that fosters customer service in the company. Moreover, the company can access customer response and feedback on the fan page. By addressing these views and comments, Coca-Cola fosters customer service.

Monday, October 28, 2019

First flight Essay Example for Free

First flight Essay First flight The warm wind blows past me. Only two colours can be seen in all directions. The bright blue of the mid day sky and the bronze, bare earth carrying on for miles. Across the endless plains are plants speckled by plants that look more like scattered ants from here. I close my eyes and face the sun. Burning rays hit my face. I stand on the edge of a canyon, my bare feet burning on the hot desert sand. My toes curled over the edge. I imagine what may lie at the bottom of this seemingly endless fall. I think of a rushing river ripping at the walls, making the canyon deeper and deeper. I imagine myself falling through the air straight to the bottom of the canyon. I know if I dont do this now I will be stuck to walk this planet like every other being. I tilt my body forward, I start to lose my balance, my heart is racing, and with one last gulp of air and my eyes closed I dive forward. I feel the air separating as I cut through it. My body spinning as I fall. I open my eyes and watch the sides of the gorge rushing past me. It feels nice, no wonderful, superb, and magnificent, as if time has stood still. Faster, faster. I rush towards the end. The end of being trapped, without freedom to do what you want, go where you please. I close my eyes again and enjoy this amazing feeling. Voices mumble in the background. They grow louder as I drift back into reality, turning into shouts. I snap open my eyes. The bottom is very close, a tiny stream trickles through the giant crack in the earth, nothing like I imagined before. Is there anything I can do now? I try to remember what Im supposed to do. Before I could recite her lessons word for word but now when I need them most, my head is only filled with her face. The bottom is so close now I can see the ripples in the water; I can make out the colours of the stones underneath the clear running water. My heart is racing faster than ever before, I want to scream but nothing comes out. I pull my head up and the spinning stops. I realise Im dizzy and everything is swaying back and forth. I pull my wings out just in time and I glide above the tiny stream. The bottom, which was once so far away, my claws dangle just above. I flap my wings, pull my legs in and start to make my way back up to the top. My dizziness fades and I notice as I make my way back to the top, the plants clinging to the side of the beaten walls. When I reach the top I see the terrified look on my mothers face which she is trying to cover up with a smile. I plant my feet on the hot desert sand. I look at her and she shakes her head. I turn to my brothers talking about how amazing I was. Mum turns and they follow her talking about how it will be one of their turns tomorrow. I turn back to the edge of the canyon and face the sky with my eyes close. Ive done it. My first flight.

Sunday, October 27, 2019

The Impact of Increased Domestic Abuse Rates

The Impact of Increased Domestic Abuse Rates INRODUCTION 1.1Background of study According to the United Nations secretary, the general Ban Ki – Moon (2008) highlighted: one universal truth which always prevails in all countries, cultures and communities is that violence against women has never been accepted, will never be excusable and in any circumstance will be tolerated. Violence against women is an international concern since it is a national phenomenon that influences women of all races, ages, religions and economic statues. Every year as a result of violence, more than one million people lose their lives and many suffer from non- fatal injuries which are mostly women kids. Moreover, it is a huge expense for the economy since it erodes billions of US dollars worldwide mainly in health care expenditure and much more in national economies in terms of workforce absenteeism, new law enforcement or even loss investment. In 2012 there was an estimation of 475 000 deaths which was recorded as a result of homicide. Furthermore 1 in five women have been sexually abused when she was a child and 1 in 3 women have been victims of either physical or sexual violence by their intimate partner at some point in their lifetime. According to the late Nelson Mandela in the health organization in (2002:12) which emphasize in the world report on violence and Health that: ‘Many who live with the violence day in and day out presume that it is an innate part of the human state’ Brutality against women is a violation of the human dignity, the right to life and considered as an extreme inequality towards the women. According the world Health organization, 2004 in Europe North America nearly 3.9 men die from suicide for every 1 women they killed and in Asia the sex ratio are about 1.1. Unfortunately Mauritius, our small paradise is not to be left, the figure is even higher here where 1 women out of 4 are been battered. Between January to September, in 2013 nearly 1376 cases of violence against women were reported even though the ministry of gender equality had already allocated 12.8 million (320, 000 Euros) to combat against intimate partner violence declared by the Defi Quotidian. The Family Violence Prevention fund (2008) with the American Association of University Women announces that more than 1,200 women are been killed every year by their husbands or boyfriends. Violence is associated with health problems and it affect the person in all dimension, physical, sexual, mental. In UK it affects both the child and the mother’s health which often result in maternal mortality. In addition to it, 70 out of 295 women in UK (24%) died during their pregnancy or within 6 weeks they given birth and 19 of them were murdered according to the review saving lives: Maternal deaths to make motherhood safer in 2003. Last but not the least, 30 to 66% of the same abusive offender exploits both the mother and the child. In India, they used to beat their wife and death caused by means of fire was very common that is women were been douse with kerosene and then it was claim that she died as a kitchen accident. Public officials in 1980’s reveal that women who were mostly aged between 15 to 44 in Bombay or other urban areas of the Maharashtra where 1 out of 5 women were associated to accidental burns[S1].(world Report on violence and health, 2002) According to Durkheim (1800); Kushner, Sterk et al., (2005) which is disclose in Davis et al., (2011) research uncover that women were less expose to violence when they were residing in the protective domestic sphere, however it was when they started to undertake non traditional roles, according to Levinson (1999) that is been engaged more in the men’s role which lead them been more susceptible to violence. However, women are now emerging greatly in the world of business, thus they have a more independent lifestyle compared with their partner whereas some time back they were heavily depending on their partner causing them been more vulnerable to abuse and victimization. Culture depicts norms that women need to respect his husband thus if the women made a mistake at any level, the partner had the right to punish her. An Anon Pakistan (n.d) notes were publish that beating a woman is to chastise or to discipline her as it was culturally and religiously justified because men are t he owners of their wives and it is very much necessary to show them who is the boss so that the future transgressions are discourage[S2]d. The gender based violence is rooted in gender inequality, characterized by unequal power relation and the social structures are like factories which yields it to the society. The concept of masculinity has been integrated since civilization which is the main entrance for violence. The media also plays an important role in the sexualisation of women, portraying a negative image of the women to the society. Religion engage in the production of discrimination violence against the women, the speech, scared text and their meaning , the practice of exclusion and the sexist un equality in church for instance contribute to maintain violence against women Stroher 2009, p.101 mention in Krob and Steffen article in 2015. Authorities’ responses are crucial to domestic violence calls. However police officers are often reluctant to intervene, often performing their job in a leisurely manner in serious cases and most surprisingly they side with the offenders than been with the victims. Parnas 1967 and Browne 1995 disclose that police hesitation to deal officially with domestic assaults is due to insufficient law enforcement in response to this major concern. Rather than been part of the solution they been increasing the problem. The police officers categorized simple assaults as been of low importance thus the victim will have to wait for the officer’s availability or seek assistance with other agencies from Buzawa 1993 and Buzawa 1996. According to Waaland and Keeley in (1985) Â ½ of a sample of the survey they conducted indicated that the police officers did not give any arrest in cases of illegal assault. Thus it is been added to the debate of addressing violence against women and the intervention strategies of the officers 1.2 Problem statement According to the domestic violence Homicide Report (2003); the human death toll is grossly underestimated. In 2001, intimate partner violence against women account for 20% of all non fatal violence that is 600,000 crimes overall. (Matthews, 2004) In spite of women’s emancipation in the modern society, through its equal contribution at home and in society, we still perceive[S3] that women are been treated unequal to their husband or to other man in various settings. Domestic violence influence the women’s ability to participate in the world where they are unable to take care of their children due to various health problems that they experienced and pursue job careers normally. The government lost billions of money each year because of the enormous burden that violence leaves on the society. Mathews (2004), reveal that medical expenses from domestic violence range from $3 to $5 each year and this excludes the $100 million which are been lost by businesses from sick depart ure, lost salary, non productivity. No action is without meaning, Mahmood, 2001 stated that a women which is making use of a veil might be viewed in certain contexts as an oppression whereas in another might be a women’s resistance. Domestic violence also sends messages to the women that you must not breach this barrier. According to the European Parliament, 2006 violence is an exhibition of the historical unequal power relations between men and women leading to domination over and discrimination against the women by men preventing women’s full advancement. For example, the concept of the male honor is associated with purity of the women, if the women was raped or have sexual intercourse voluntarily outside marriage thus she was disgrace by the family. A study was conducted in Egypt where 47% of women were been killed by their relative after been raped. Women are unable to protect them from unwanted pregnancy and sexually transmitted infections. We note that the situation have become beyond control intern ationally. Children who witnessed violence have many health problems like behavioural, anxiety, depression and poor school performance. In North America, children who witness violence exhibit antisocial behavior due to psychological disturbances. Moreover, a research in Leon and Nicaragua (2013) shows those children of abuse women were 6 times more likely to die at age of 5. Children are dearly affected, 3207 cases of child abuse reported to the women’s Aid national Free phone Helpline (2013) and based on the women’s aid annual report (2013) 1,204 children were present at home during intimate partner violence. Unfortunately most of the authorities techniques are far of been protecting the victim. Ferraro (1989) disclose that despite having serious policies only 18 % of offenders are been arrested, they often very lenient in domestic violence incident by Eigenberg et al. However, it is far to be a simple issue, fault in the system is indeed contributing in the nurture of domestic violence where it create a need to address this issue. 1.3 Aim and objectives of the study The purpose of the study is to analyze the consequences of an increasing rate of domestic violence on the women and the responsiveness of the police authorities towards this major concern. The study will mainly focus on the impact that domestic violence have upon women kids, the forms of violence, sources, causes and how the authorities response to this alarming social phenomenon accordingly. Therefore, it will be interesting to know till what extent a women is been victimized in the 20th century. The objectives of this research are as follows: An insight of the different forms of domestic violence To disclose the voice of the stigmatized To investigate the effectiveness of the intervention strategies of the authorities upon violence To locate solutions to combat against domestic violence 1.4 Research Questions What are the forms of domestic violence and how does it impact women? What is the consequence of domestic violence upon the women? Are authorities’ intervention techniques effective in response to violence? What are the reasons for difficulty in combating against domestic violence? 1.5 Outline of the study Chapter 1: introduce the subject matter under study, how violence greatly influences the women, children and society and the response of the authorities towards this issue. The problem statement give a more in depth description how domestic violence has an impact on women, children and drawbacks of the police strategies. The aim and objectives and a brief picture of each chapter accordingly. Chapter 2: literature review Chapter 3: Methodology Chapter 4: Results and Discussions Chapter 5: Recommendations and conclusions REFERNCES World Health Organization (2013) Global and regional estimates of violence against women: prevalence and health effects of intimate partner violence and non- partner sexual violence. Switzerland: WHO publications. World Health Organization (2002) World report on Violence and Health. Geneva: WHO publications. World Health organization (2014) Global status report on violence prevention. Switzerland: WHO publications. European Union Agency for Fundamental Right (2014) Violence against women an EU –wide survey. Europe. Publications Office of the European Union. Devries k, watts C, Yoshihama M, Kiss L, Schreiber L.B, Deyessa N, Heise L, Durand J, Mbwambo J, Jansen H, Berhane Y ,Ellsberg M. and Moreno C.G. (2011). ‘Violence against women is strongly associated with suicide attempts: Evidence from the WHO multi –country study on women’s health and domestic violence against women’, Journal of social science and medicine, Vol. 73, pp. 79-86. Indian Ocean Times. (2013). Mauritius: 1,376 domestic violence cases recorded between January and September 2013, from: en.indian-ocean-times.com [accessed on the 12 April 2015 British High Commission Mauritius. (2015). Help and support available for victims of domestic violence in Mauritius from: www.gov.uk [ accessed on 12 April 2015] Women’s Aid. (2015). National and international statistics from: www.womensaid.ie [accessed on 12 April 2015] Council of Europe (2014) PREVENTING VIOLENCE AGAINST WOMEN: ARTICLE 12 OF THE ISTANBUL CONVENTION A collection of papers on the council of Europe Convention on preventing and combating violence against women and domestic violence. Europe: Council of Europe publications ([emailprotected]). Krob D.B and Steffen L. (2015). ‘Religious influence on education and culture: Violence against women as common sense’, Journal of Social and Behavioral sciences, Vol. 174, pp. 2374 -2379. Peter G; Sinder B and Stephens J. (1999), ‘Police perceptions of domestic violence: the nexus of victim, perpetrator, event, self and law policing,’ International journal of police strategies management, Vol.22 Iss 3, pp. 313-327. Chhikara P, Jakhar J, Malik A, Singla K and Dhattarwal S.K. (2013), ‘Domestic Violence: The Dark Truth of our Society’, Journal of Indian Academic Forensic Medicine, Vol.35 (1), pp. 0971-0973. Davis, R.L. (2010), ‘Domestic violence related deaths’, Journal of Aggression ,conflict and Peace Research, Vol. 2, Iss 2. Davis, D.M. (2013). Rehabilitation Counseling Master’s Students: Beliefs and Attitudes about Domestic Violence toward Women. Published PhD dissertation. Lowa: University of Lowa, 167 pages. Grovert, A.J. (2008). Domestic violence against women: A literature Review. Published Masters Literature review. Forest Grove: Pacific University, 41 pages. Rojas, L.D.A. (2010). Men and Domestic violence/Partner Violence in Santiago, Chile: the meaning of violence in masculinity. Published Master Dissertation. Gothenburg: Gothenburg University, 76 pages. 1 [S1]Source? [S2]discouraged [S3]percieve

Saturday, October 26, 2019

Acid Rain :: Free Essay Writer

When thought of acid rain, some people may think of green, burning acid falling from the sky, destroying everything in sight. This may be a bit ridiculous and hard to believe, but as absurd as it sound, it is not far from the truth. Acid deposition has long been a subject of debate because of the widespread environ-mental damage it is responsible for. As one of the major results of air pollution, acid rain can corrode metal and limestone structures, leach important minerals, decreased fertility of soils, and lower pH in lakes and ponds. For those who fear "the end of the world," acid rain may pose a threat as it creates a bad environment for both animal and human. And for those who care about our planet, maybe it is about time we stop destroying it and give something back to Mother Earth. There are numerous causes of acid precipitation, several of these are insignificant and accumulate into severe cases. However, there are also some sources that are menacing by itself, sources such as industrial emissions. In some cases, acid rain is caused when industrial fumes mix with moisture in the atmosphere. Acids are then carried in clouds for long distances before they are deposited through rain, which indicates that forests and lakes far away from factories may be damaged by acid rain. Another significant cause of acid rain is automobile exhaust. Research has shown that although industrial emission makes up for most causes, sulfur dioxide from oil and coal combustion and nitrogen oxides produced from automobile engines have greatly intensified the problem. Electric power plants are also to blame for this issue. Recent study has shown that power plants are accountable for the release of more than 20 million tons of sulfur Per. 3 dioxide each year. Meaning that 10 years from now, there would be around 30 million tons of acid rain components in our atmosphere. What's even worst than acid rain and its causes are the results. Acid deposition can cause a number of disasters, some of the serious effects includes structure eradication. The marble frieze panels on the Parthenon of Athens for example, has been transformed by acid rain into gypsum. Loosing much of its details, the exterior of the Parthenon is also beginning to crack and flake off. The effects of acid rain can also be seen in lakes, rivers, and streams and plant growth.

Friday, October 25, 2019

Honor in Thorstein The Staff-Struck :: Thorstein Staff-Struck

Honor in Thorstein The Staff-Struck    Honor is something that is earned, but it must also be defended in order to be upheld in the eyes of all.   In â€Å"Thorstein The Staff-Struck† one’s respect is based on their honor alone. Honor is the essence of a life worth living. In this story, a life without honor means that the life is worthless. Death is better than having no honor. Men will easily give their lives without second thought to earn, and protect it. Honor’s role in â€Å"Thorstein the Staff-Struck† takes on several roles, but all of them are to achieve one common goal. The various roles take on the common goal of achieving honor itself.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Thorstein’s nick-name â€Å"the Staff-Struck† is a strain on his honor because his masculinity is being questioned after his first bout with Thord. Thorstein’s first reaction to the blow to his head by Thord’s staff   is not thought of as being honorable. He didn’t respond in a way that would defend his honor. He needed to stand up for himself to accomplish that trying task.. His response to Thord’s   blow was thought of as a cowards response. That meant his honor had been shamed by his own action, or lack of the correct actions. After that, Thorstein’s integrity was belittled in the eyes of others. One’s honor lies not only in the eyes of one’s self, but also in the words, and eyes of all present, and around. Thorstein had to avenge his honor in the eyes of the spectators for himself. Thorstein’s father prompted his vengeance though. Thorstein could not simply sit back, and be humiliated by his own father. That was just too much for him to deal with, nor did he want to try. He knew he must honor his father by bringing, and restoring honor to himself. His response, although late, was honorable. Timing is a crucial part of vengeance in this story though. Bijarni, the ruler of Hof, had a different role in society, but his honor   was still of great importance. Bijarni’s honor was questioned by his servants, his wife, and others because they felt his reverence had been stained by Thorstein. His lack of action against Thorstein made him weak in the eyes of others. He had been challenged, but he had not yet accepted the challenge. When honor is seen as challenged there must be action taken or soundness will be questioned. Thorhall and Thorvald questioned Bijarni’s honor in gossip, and in rumor. Bijarni then instructed the two to leave, and return with Thorstein’s head, as he can not stand by while his servants

Thursday, October 24, 2019

Rapid Economic Growth In East Asian Countries :: essays research papers

Rapid Economic Growth In East Asian Countries Over the past decade, there has been rapid long-term economic growth for East Asian countries. These newly industrialising countries are experiencing growth rates in GDP per head at around 6% to 7% compared to the 2% to 3% for most industrial economies. If this growth continues, South Korea and Taiwan might take away America's distinction as the world's richest country. This rapid economic growth is a result of several economic and political factors. The pace of economic development, growth in world trade and communications, and the investment in physical capital and education have all played a role in the sudden rise of the East Asian economies.   Ã‚  Ã‚  Ã‚  Ã‚  One factor which has helped the long-term economic growth of South Korea and Taiwan is the pace of economic development. The pace has accelerated over time. As time progresses, countries seem to be able to grow at a much more rapid rate. From 1780, it took Great Britain 58 years to double its real income per head. It took America 47 years to double in the 1800's while Japan took 34 years from the late 19th century. Finally, South Korea was able to double its real income per head in an amazing 11 years from 1966. It would seem that the later a country has industrialised, the faster it has been able to do so. Another important factor is the degree to which a country is behind the industrial leaders. In the case of the East Asian countries, South Korea and Taiwan, both started out with an extremely low income per head. This allowed much faster growth when copying the leaders. It is important to realize that these growth rates should slow as the countries catch up.   Ã‚  Ã‚  Ã‚  Ã‚  An area in which East Asia is investing much of its GDP is in physical capital and education. Compared to the industrial leaders, the East Asian countries have sustained a much higher investment in these areas. South Korea invests 35% of its GDP which is more than double America's capital spending. The East Asian countries have placed much emphasis upon education. Education is the key to mastering the technologies which they have been borrowing from the economic leaders of the world. The standards of education for these countries have improved as rapidly as their economies.   Ã‚  Ã‚  Ã‚  Ã‚  Another factor which has helped the long-term economic growth of these East Asian countries is the global market. No longer is a country's economy hurt by a small domestic market. World trade has grown tremendously over the Rapid Economic Growth In East Asian Countries :: essays research papers Rapid Economic Growth In East Asian Countries Over the past decade, there has been rapid long-term economic growth for East Asian countries. These newly industrialising countries are experiencing growth rates in GDP per head at around 6% to 7% compared to the 2% to 3% for most industrial economies. If this growth continues, South Korea and Taiwan might take away America's distinction as the world's richest country. This rapid economic growth is a result of several economic and political factors. The pace of economic development, growth in world trade and communications, and the investment in physical capital and education have all played a role in the sudden rise of the East Asian economies.   Ã‚  Ã‚  Ã‚  Ã‚  One factor which has helped the long-term economic growth of South Korea and Taiwan is the pace of economic development. The pace has accelerated over time. As time progresses, countries seem to be able to grow at a much more rapid rate. From 1780, it took Great Britain 58 years to double its real income per head. It took America 47 years to double in the 1800's while Japan took 34 years from the late 19th century. Finally, South Korea was able to double its real income per head in an amazing 11 years from 1966. It would seem that the later a country has industrialised, the faster it has been able to do so. Another important factor is the degree to which a country is behind the industrial leaders. In the case of the East Asian countries, South Korea and Taiwan, both started out with an extremely low income per head. This allowed much faster growth when copying the leaders. It is important to realize that these growth rates should slow as the countries catch up.   Ã‚  Ã‚  Ã‚  Ã‚  An area in which East Asia is investing much of its GDP is in physical capital and education. Compared to the industrial leaders, the East Asian countries have sustained a much higher investment in these areas. South Korea invests 35% of its GDP which is more than double America's capital spending. The East Asian countries have placed much emphasis upon education. Education is the key to mastering the technologies which they have been borrowing from the economic leaders of the world. The standards of education for these countries have improved as rapidly as their economies.   Ã‚  Ã‚  Ã‚  Ã‚  Another factor which has helped the long-term economic growth of these East Asian countries is the global market. No longer is a country's economy hurt by a small domestic market. World trade has grown tremendously over the

High-school the best years of your life Essay

Being in high-school should definitely be the best four years of your life. Most people forget that these years is what usually makes up for the rest of your life. For example some people choose to study hard, pass their classes, and then have fun with the time they got left over. Others choose to use up all their time for fun and never pass classes or dedicate any type of time towards their education and usually get held back a couple of years like I did. If you really want to make high-school the best years of your life then I would suggest choosing option A so that you enjoy all the festivities and parties with friends without having to make-up for lost time. For some odd reason many kids believe that when you get into trouble, it makes you look like a cool guy or girl to all of your peers. In reality your only labeling yourself as being the troublemaker slacker that doesn’t make it anywhere in life to your teachers. Not to mention you make yourself look like an idiot to the smarter kids at your school. What most kids don’t know is that if your one of those kids that does good and gets his work done on time and passes all his classes then the counselors will give you a little less attention than to the kids who never do work and are always in trouble and never passes their classes. So if you’re a bad kid and you wonder why you get into so much trouble it’s because you’re causing too much attention to yourself and you never do anything that can justify your badness as being good or being minor. Read more: Essay examples for high school   So don’t get into trouble if you know that it can risk you getting kicked out and losing those years that should be the best of your life. Another thing that holds a lot of kids back is being in a romantic relationship with somebody. I’m not saying it’s not good to be in love or care for another person, but if that is what’s holding you back from achieving your goals then there has to be a problem with that relationship. This means that you should think about your education before anything else on your agenda for the year instead of focusing on keeping your loved one by your side. If that is too selfish for you to think about then do it for your loved one. If you really cared about another person you would care about their education as well. You wouldn’t want your other half to be dimwitted or uneducated. If you cared for that person you’d want them to be smart and knowledgeable and to be successful in life or maybe you should be the successful one to help your other half be something in life. If they cared about you they’d want the same for you too. Anything else would be selfish of them or you and that wouldn’t be fair to the person you thought you loved or to you at all. The most common thing that hold kids back in school is wanting to party all the time and drink and do drugs and look cool for everyone to see. This is the biggest problem because as a kid all you want to do is party and have fun but when you get older you realize that there is a time and place for everything and during the week is not the time and in school is not the place. School for most kids is their only job and you should treat your school like a job which means to never be late, be respectful to everybody at school, and don’t show up all tired and sick from partying the night before. I remember seeing kids at school on Monday morning throwing up their organs because they drank too much the night before and only slept for like two hours. That is totally irresponsible and should never happen at your job, so why do we let that happen to us in our schools. High-school could’ve been the best years of my life but unfortunately I was one of the kids who decided to waste all my time having fun and am now left to play catch-up with school credits and classes that should’ve been passed years ago. I should’ve graduated in the year 2010. It is now the year 2012 and I am still trying to catch-up on credits that I should’ve already completed two years ago. Luckily for me I found OFY and have been able to complete classes faster than ever and hope to soon reach my goal and graduate high-school. So don’t be like me, be one of the kids that was able to graduate with the rest of their peers and be one of those kids who will remember high-school as being the best years of your life instead of being like me and turning them into the longest years of your life.

Wednesday, October 23, 2019

Srs of Library Management

| |Software Requirements Specification | For A-Flex Automated Library Management System Version 1. 2 Prepared by A-FLEX Group |Jude Marlon B. Alegro |111694 |[email  protected] com | |Arnel G. Abagua |082198 |[email  protected] com | |Jun Jun G. Abanag |102206 |[email  protected] om | |Ronaldo R. Arbes |061491 |[email  protected] com | |Amado C. Tan |101078 |[email  protected] com | | | | | |Instructor: |Prescilla F.Catalan | |Course & Year: |BS in Information Technology 3 | |Schedule: |TTH 7:30 – 9:00 AM | |Date: |April 16, 2013 | | | | Table of Contents title pagei table of contentsii table of figuresiii Revisionsiv 1Introduction5 1. 1Document Purpose5 1. 2Product Scope5 1. Definitions, Acronyms and Abbreviations5 1. 4References6 1. 5Overview6 2Overall Description7 2. 1Product Perspective7 2. 2Product Functionality8 2. 3Users and Characteristics8 2. 4Operating Environment9 2. 5Design and Implementation Constraints9 2. 6User Documentation10 2. 7Assumptions and Depen dencies10 3Specific Requirements11 3. 1External Interface Requirements11 3. 1. 1User Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 2Hardware Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 3. 1. 3Software Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 4Communication Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2Functional Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 3. 2. 1Librarian Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 3. 2. 2Clerk Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 2. 3Borrower Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 4Other Non-functional Requirements27 4. 1Performance Requirements27 4. 2Safety and Security Requirements27 4. 3Software Quality Attributes28 4. 3. 1Functionality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 4. 3. Usability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 28 4. 3. 3Reliability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 4. 3. 4Supportability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 Appendix A – Data Dictionary. 30 Appendix B – Group Log. 31 InDEX. 33 Table of Figures Figure 1 Context diagram7 Figure 2 Operating environment9 Figure 3 Main interface11Figure 4 Logging station for Librarian12 Figure 5 Clerk station for connection13 Figure 6 Clerk station14 Librarian Use Cases15 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Search book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 Clerk Use Cases19 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 Search book †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Return book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Add book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 23 Borrower Use Cases24 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Borrow book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 24 Retu rn book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Revisions |Version |Primary Author(s) |Description of Version |Date Completed | |1. 2 |Jun Jun G. Abanag, Jude |The revision of this SRS was done by request. Error |04/16/13 | | |Marlon B. Alegro |corrections to some parts of the document were needed to fully| | | | |complete an accurate Software Requirements Specification.Some| | | | |specified features were removed because it was uncompleted due| | | | |to lack of time and preparation. Some small details in | | | | |chapters were also corrected and Content page was revised. | | | | |Finally, to finish the SRS, then Appendix B and Index were | | | | |added. | Introduction 1 Document Purpose This Software Requirements Specification will provide a c omplete description of all the functions and specifications of the project, A-Flex Automated Library Management System. It will explain the purpose and the features of the system, the interface of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both of the stakeholders and the developers of the system and will be proposed to the College Library of Samar College. Product Scope The A-Flex Automated Library Management System will be designed for the librarian, the staff and clerks and especially for the students of SC Library to maximize their productivity by providing tools to assist in automating the: production and transaction; logging in; monitoring materials; borrowing and returning of books and other library materials; assessing the overdue; inventorying; and creation of statistics and reports, which otherwise have to be performed manually in an ordinary daily basis.M ore specifically, this system will allow a certain user to manage, organize and monitor the data and attendance of the clerks, the status of the books and other library properties and the library records of the registered students to the library. Nevertheless the access to these capabilities will depend on the user privilege of an account. It will automatically provide statistical reports based on the data stored in its associate database which is updated consistently. Therefore the software will give an ease to do these tasks that are vital in managing the library. Definitions, Acronyms and Abbreviations |Term |Definition | |Borrower |Any person who wishes to borrow books inside the school library. | |Clerk |Any person who assists the librarian in minor tasks needed performed inside the library. | |Database |A collection of all data produced by the system. | |Librarian |A person who is assigned responsible in generally managing the school library. |QR Code |Quick Response code, a type of bar code/encrypted code that will be used for the project in identification | | |purposes. | |Requirements |Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC |Abbreviation of the name of the school where the system will be proposed. The Samar College | |SRS |Software Requirements Specifications.A document that completely describes all of the functions of a proposed| | |system and the constraints under which it must operate. For example, this document. | |Stakeholder |Any person with an interest to the project but is not a developer. | |User |Any person who operates or interacts directly with the product. | |VB |Visual Basic, a building/programming software used in creating the system | |XAMPP |An application used to have a connection between the product and its database. 4 References IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specifications. IEEE Computer Society, 1998. [IEEE] The applicabl e IEEE standards are published in â€Å"IEEE Standards Collection,† 2001 edition. [Bruade] The principal source of textbook material is â€Å"Software Engineering: An Object- Oriented Perspective† by Eric J. Bruade (Wiley 2001). [Reaves SPMP] â€Å"Software Project Management Plan Jacksonville State University Computing and Information Sciences Web Accessible Alumni Database. † Jacksonville State University, 2003. 5 OverviewThe next chapter, the Overall Description section, of this document gives an overview of the functionality of the product. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification section, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the product. Both sections of the document describe the same software product in its entirety, but are i ntended for different audiences and thus use different language. Overall DescriptionThis section provides a more detailed overview of the system, including a description of the product’s functions and overarching constraints. 1 Product Perspective A – Flex Automated Library Management System Figure 1 – Context diagram As shown in the Figure 1, A-Flex Automated Library Management System (A-Flex ALMS) is independent from other system and has three active actors and one database (where all information is stored and retrieved from). The Borrower, Clerk and the Librarian have a privilege to access the library system. However, the Librarian alone has the privilege to access the database, i. e. eleting, updating and/or adding such records and making reports. A-Flex ALMS uses Interaction Model, a Use Case Diagram, to make stakeholders easily view the system operation. 2 Product Functionality The product has the following major functionalities: †¢ Automated logging in of students into the library †¢ Automated borrowing and returning of books †¢ Enables to show the status of the books †¢ Enables the clerk to customize the due time of returning books for photocopying purpose †¢ Enables the user to search for a particular book using the system’s specialized built-in search engine †¢ QR code scanner functionality Database data storage 3 Users and Characteristics There are essentially three users for the system and are expected to be computer-literate: the borrower, as this project is being made so obviously the main client for this system who wishes to borrow materials in the library. The students of the school are not only the borrower, faculty and other employees of Samar College who are in the list of the school’s employees, for confirmation, may borrow books if they give envelop to librarian, this envelop will serve as their record of borrowing. The borrower may also be a student from other schools, that are required to register (P 50. 0) to school’s registrar to access a privilege and utilize the offered 8 hours services; the librarian, the main user of the system who manages the library and its database and responsible for activities such as adding book records, deleting book records, updating book status such as if book is issued and etc. ; the clerk, the assistant librarian and secondary user of the system who has a privilege to lend books, they are expected to have a different privilege as to librarian. 4 Operating Environment XAMPP Link from proposed system Figure 2 – Operating environmentThe system will be operated in the Samar College Library, as it was proposed to. When the user interacts into the system, the system will pass the user to the database, through XAMPP v. 3. 0. 12 which allows Windows program to transfer data to and from the database to record every interaction of the user. 5 Design and Implementation Constraints The current constraints on the pro ject are related to the provision of hardware resources to implement and test high-performance features. At present, an Intel Dual-core processor is needed, with a 2 GB RAM, serves as the server, with XAMPP running on top of the Windows 7 operating system.For better performance analysis, a number of dedicated workstations would be beneficial for the student workstation. The hardware that the project will be running on may constrain some design decisions pertaining to real-time and performance, as well as the scanner’s accuracy. Also, certain required hardware within the library imposes specific requirements on the project. The following is a list of constraints pertaining to the accuracy of the library system: †¢ The information of all the users must be stored in a database that is accessible by the system. The students must have logged in upon entering the library before they can borrow materials or books. †¢ The librarian only has the privilege and responsibility for the system’s security and privacy. †¢ Clerk and librarian have different privileges upon using the system. †¢ LAN is not implemented. †¢ BIOS of the system unit should be working to get the real-time in issuing of the books to the borrowers. 6 User Documentation The user can easily understand of the usage of the system with a user’s manual to be delivered with the system.The manual would be helpful with the some screen shoots within it. User can easily learn operation of the system by displaying corresponding shortcuts on controls for simple task. Contacts numbers of the developers will be given to the school librarian for further assistance when complex problems arise. 7 Assumptions and Dependencies A number of factors that may affect the requirements specified in the SRS include: †¢ The users have sufficient knowledge of computers. †¢ The users know the English language, as the user interface will be provided in English. Hardware and syst em specifications might not compatible. †¢ System might not supported by the operating system. †¢ It is assumed that librarian and/or clerk might forget their password for logging in. Specific Requirements 1 External Interface Requirements Below is a list of enumerated requirements that provides additional specifications for the behaviour and functionality of the system. 1 User Interfaces Using this system is fairly simple and intuitive. A user, who has a familiarity with basic logging in navigation, should be able to understand all functionality provided by the system.As Figure 3 shows, the user with different privileges can now select his workstation, with corresponding shortcuts for options, so that the system may give the user an access to these and may let the not be able to use those of privilege he usually should not have. [pic] Figure 3 – Main interface If the user selects the Open Librarian (Ctrl + L), system now then identify him as Librarian, a Server, an d Figure 4 will display with a pop-up form that lets the Librarian to have a three (3) attempts of logging in. If the user failed to log in successfully, system then will automatically shuts down. pic] Figure 4 – Logging station for Librarian If the user selects the Open Clerk (Click + C), system now then identify him as Clerk and Figure 5 then will display asking for an IP address sin order to have a connection to Librarian Workstation, server. [pic] Figure 5 – Clerk station for connection As the Clerk workstation has successfully connected to its server, then Figure 6 now will be displayed. Letting the Clerk to log in, as same of Librarian, if the Clerk failed to log in successfully it will automatically shuts down. [pic] Figure 6 – Clerk station 2 Hardware InterfacesSince the system will be installed in a Local Area Network (LAN) for collecting data from the users and also for updating the Library System and making reports, it is recommended by the developers , in order to have a maximum usage of the system, that the library should have the following: †¢ at least one camera for students’ easy logging in and scanning of books; †¢ printer for making reports; and †¢ computer unit(s) for the Clerk Workstation(s). The librarian then has to decide the number of units whether the library’s clerks would use. 3 Software InterfacesThe system will use only one external software, XAMPP v. 3. 0. 12, for the connection between the system and database. The system has a built in QR (Quick Response) Code Reader. 4 Communications Interfaces The system will be installed and run in a LAN of computer units. 2 Functional Requirements This section provides the detailed list of all product operation with their corresponding specific use case. 1 Librarian Use Cases 1 Use case: Log in Diagram: Brief Description The Librarian accesses the system, and can do various tasks. Initial Step-By-Step DescriptionBefore this use case can be init iated, the Librarian has already set up or prepared the units to be used. 1. The Librarian hits Ctrl + L, the option log in for a Librarian. 2. The system displays the pop-up login for the Librarian. 3. The Librarian selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Librarian is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Librarian selects the OK button. 4. The system records the info into the database. 5. The Librarian has logged out. 3 Use case: Search book Diagram: Brief Description The Librarian gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian selects the form fo r books, borrowers, etc. then chose the book. 2. The system displays the list of books and shows the different categories. 3.The Librarian selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 6. 4 Use case: Issue book Diagram: Brief Description The Librarian is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Librarian confirmed the borrower that he has a validated registration. 1. The system Librarian searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. a.If the book’s copy is more than one (1) and is available, the Librarian sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Librarian that the requested book(s) is not available and thus will automatically gives the re ason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirmation that the transaction is successful. 5 Use case: Update database Diagram: Brief Description The Librarian wanted to do some tasks the he/she needed the data be manipulated in the database.He or she also can update the database. Initial Step-By-Step Description Before this use case can be initiated, the system has verified that the Librarian is logged in. 1. The system displays categorized options of the entire data. 2. The Librarian selects the category. 3. The system gives other options of that selected category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched selected category. 2 Clerk Use Cases 1 Use case: Log in Diagram: Brief Description The Clerk accesses the system, and can do various tasks.Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already set up o r prepared the units to be used. 1. The Librarian hits Ctrl + C, the option log in for a Clerk. 2. The system displays the pop-up login for the Clerk. 3. The Clerk selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Clerk is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Clerk selects the OK button. 4. The system records the info into the database. 5. The Clerk has logged out. 3 Use case: Search book Diagram: Brief Description The Clerk gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk selects the form for books, borrowers, etc. then chose the book. 2. The system displays the list of book s and shows the different categories. 3.The Clerk selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 4 Use case: Issue book Diagram: Brief Description The Clerk is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Clerk confirmed the borrower that he has a validated registration. 1. The system Clerk searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. . If the book’s copy is more than one (1) and is available, the Clerk sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Clerk that the requested book(s) is not available and thus will automatically gives the reason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirma tion that the transaction is successful. 5 Use case: Return book Diagram: Brief Description The Clerk returns the book he/she has borrowed. Initial Step-By-Step DescriptionBefore this use case can be initiated, the Clerk, now as borrower, must return the book on time. 1. The Clerk himself may return the book he has borrowed. 2. The Clerk selects the Borrowed tab on the Borrowed form. 3. The system will display on the grid the borrowed books including his book. 4. The Clerk may scan the book with QR Code, or he may manually put the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the clerk wasn’t able to return the book on time. 6. The system records info into the database.Note: All Librarian assistants in the school’s library are working students, so therefore they may somehow be a â€Å"borrower†. 6 Use case: Add Diagram: Brief Description The Clerk adds some info, it might be addi ng books or borrowers to the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has given permission from the Librarian and thus he has already data to be stored in the database. And he has successfully logged in to the Clerk’s form. 1. As he logged in, the clerk clicks the â€Å"Add† tab on the Clerk’s workstation. 2.The system displays an option on whether what the clerk wants to add or store. 3. The clerk chooses an option. 4. The system displays needed data to be filled out whether it’s either a new book or new borrower. 5. The system then evaluates the input before storing to the database. a. If the required data is completed, the system displays a message box as notification of a new data. b. If some required data is missing, otherwise, a message box will be displayed to notify that some important data are not properly filled out. 7 Use case: Update database Diagram: Brief DescriptionThe Clerk modifies some d ata that are stored in the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk scanned some info, might in the book or borrower, and is incorrect. 1. The Clerk selects the â€Å"Update† tab on the Clerk’s workstation. 2. The system displays the pop-up options of the data to be updated to be edited. 3. The system displays the info that the Clerk wanted to update. 4. After the Clerk verified the correct records, the system then will display the updated data of a specified record. 3 Borrower Use Cases 1 Use case: Log inDiagram: Brief Description The Borrower, if student, logs in through the scanner by swapping their IDs with QR Code. Otherwise, if the scanner is not available he can manually input his student number. The faculty who wants to borrow has no record of logging in but they have to provide an envelope that the librarian refers to. Initial Step-By-Step Description Borrower enters the library. 1. The Borrower looks for the needed book(s) to borrow. He can ask the clerk to search the book(s) through the system. 2. The system displays the possible results for the input info. Use case: Borrow Diagram: Brief Description The Borrowers, either a student or faculty, borrows their needed book. Initial Step-By-Step Description Before the Borrower can have the needed book(s), he successfully logged in inside the library. 1. The Clerk selects the tab for borrowing within the Clerk’s workstation. 2. The system displays the required data to be filled out for the borrowing. 3. After the Clerk or Librarian hits the OK button, the system will evaluates the borrower if he or she has due book(s) that not yet been returned. 4.The system displays the notification and due date and time of the borrowed book(s) upon the request of the Clerk for borrowing the book then records it to the database. 3 Use case: Return Diagram: Brief Description The Borrower returns the book he or she has borrowed. Initial Step-By-Step De scription Before this use case can be initiated, the Clerk Borrower must log in inside the library. 1. The Borrower asks anyone among the Clerks for returning assistance. 2. The Clerk selects the â€Å"Borrowed† tab from the Borrowed form. 3. The system will display on the grid all the borrowed books including his book. 4.The Clerk may scan the book with QR code or he may manually input the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the Borrower wasn’t able to return the book on time. 6. The system records info into the database. Other Non-functional Requirements 1 Performance Requirements 1. Response Time – The Splash Page should be able to be load within seconds using a Windows 7 32-bit Operating System and at least 1 GB memory (RAM). The information is refreshed every two minutes. The access time for the computer unit should be less than a minute.The system shall respond to the member in not less than two seconds from the time of the request submittal. The system shall be allowed to take more time when doing large processing jobs. 2. Administrator/Librarian Response – The system shall take as less time as possible to provide service to the administrator or the librarian. 3. Throughput – The number of transactions is directly dependent on the number of users, the users may be the Librarian, employees of the Library and also the people who use the Library for checking-out books, returning books and checking library account. . Resource Utilization – The resources are modified according the user requirements and also according to the books requested by the users. 2 Safety and Security Requirements The server on which the Library System resides will have its own security to prevent unauthorized write/delete access. There is no restriction on read access. The use of email by an Author or Reviewer is on the client systems and thus is ext ernal to the system. The PC on which the Clerk resides will have its own security. Only the Editor will have physical access to the machine and the program on it.There is no special protection built into this system other than to provide the editor with write access to the Library System to publish reports. 3 Software Quality Attributes 1 Functionality Logon Capabilities The system shall provide the users with logon capabilities. Alerts The system can alert the Librarian or the administrator with notifications regarding the status of the books and in case of any problem. 4 Usability †¢ The system shall allow the users to access the system from a stand-alone client or its derivative technologies for public inquiries of the students.The system uses another computer unit for the client interface. †¢ The system is user friendly. 5 Reliability The system has to be very reliable due to the importance of data and the damages incorrect or incomplete data can do. Availability The s ystem is available 100% for the user. The system shall be operational 8 hours a day and 7 days a week. Accuracy The accuracy of the system is limited by the accuracy of the speed at which the employees of the library and users of the library use the system. Access Reliability The system shall provide 100% access reliability. 10 SupportabilityThe system designers shall take in to considerations the following supportability and technical limitations. Information Security Requirement The system shall support the information security requirements. Maintenance The maintenance of the system shall be done as per the maintenance contract. Standards The coding standards and naming conventions will be as per the American standards. Appendix A – Data Dictionary |Borrower – Any person who wishes to borrow books inside the school library. | |Clerk – Any person who assists the librarian in minor tasks needed performed inside the library. |Database – A collection of all data produced by the system. | |Librarian – A person who is assigned responsible in generally managing the school library. | |QR Code – Quick Response code, a type of bar code/encrypted code that will be used for the project in identification purposes. | |Requirements – Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC – Abbreviation of the name of the school where the system will be proposed, the Samar College | |SRS – Software Requirements Specifications.A document that completely describes all of the functions of a proposed system and the | |constraints under which it must operate. For example, this document. | |Stakeholder – Any person with an interest to the project but is not a developer. | |User – Any person who operates or interacts directly with the product. | |VB – Visual Basic, a building/programming software used in creating the system | |XAMPP – An applic ation used to have a connection between the product and its database. Appendix B – Group Log Notes Taken during our first meeting with Jun, Arnel & Marlon on January 23, 2013. †¢ Interview the librarian †¢ interview the library employees †¢ understand the flow of data in the library †¢ understand the processes used in transactions in the library †¢ new design †¢ lan network †¢ create a floor plan including 3 units for 3 stations of the whole system †¢ 3 stations: Admin station, Clerk Station, Log in Station †¢ provides photocopies of authentic documents from the library †¢ learn the penalty system of the library copy the list of books †¢ list the basic requirements †¢ Software Requirements Specification for Page 12 †¢ fix the QR scanner †¢ dry run the system †¢ Should we try this for different operating system environment? †¢ We might need licenses, ask if necessary. †¢ Given our budgets, th is is the best we can do. †¢ Set up servers. †¢ Began looking through test cases †¢ Will work on SRS †¢ Jun Abanag †¢ Created QR code samples for ID †¢ Will work on SRS. †¢ Marlon Alegro. †¢ Will work on SRS. †¢ Jun Abanag. †¢ Will work on SRS. †¢ Scrum Meeting 2/8/2013 †¢ Marlon Alegro Downloaded licensed software. †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Nicholas Cross †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Jun Abanag & Marlon Alegro †¢ Worked on SRS. †¢ Will wait on feedback from mentor to finalize SRS. Group activities †¢ Overnight sessions (starts at 10 in the evening up to 5 in the morning: 7 hours) Most of us have part time jobs during day time and we have different schedules for Software Engineering so we used our time to work during evening and midnight because of the busy schedule during day time.We spend seven hours during midnight to work on our system and the SRS. ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 †¢ Group meetings Since we have different schedules for Software Engineering, we try to meet up during free hours. And most of the times we are not complete because of the busy schedule. So what we do is two of our group mates meet up at certain time and the other one would discuss it to the other member when they meet.So in that way we can exchange ideas even though we don’t meet properly. Afterwards, the other few members will also catch up with updates from the recent group discussion. ? Samar College, twice a week. Every Monday, Wednesday and Friday ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 Index |A |Log out (use case), | |A –Flex ALMS, 5, 7, 8 | Clerk, 19 | |Add book (use case), 22 | Lib rarian, 16 | |Assumptions and Dependencies, 9 | | | |O | |B |Operating environment, 9 | |book, (use case) |Overall Description, 7 | | Borrow, 24 |Overview, Product, 6 | | Issue, 21, 1 7 | | | Search, 16, 20 |P | | Return, 21, 25 |Performance Requirements, 27 | |Borrower, 5, 7,8 |Product | | | Functionality, 8 | |C | Perspective, 7 | |Clerk, 5, 8 | | | use cases, 19 |Q | | station, 14 | QR (Quick Response), 5, 13 | |Context Diagram, 7 | | |Communication Interface, 15 |R | |References, 6 | |D |Reliability, 28 | |Delete (use case), 7 |Requirements | |Document purpose, 5 | External Interface, 11 | | | Functional, 15 | |E | Other Non-Requirements,27 | |External interface, 11 | Performance, 27 | | | Safety and Security, 27 | |F | Specific, 11 | |Functional Requirements, 15 |Return book (use case), 21, 25 | |Functionality, 8, 28 | | | |S | |I |Safety and Security Requirements, 27 | |Interfaces |SC, 6 | | Communication, 15 |Search book (use case), | | Hardware, 14 | Clerk, 20 | | Software, 14 | Librarian, 16 | | User, 14 |Software Interface, 14 |Issue, 17, 21 |Software Quality Attributes, 28 | | |Specific Requirement, 11 | |L |SRS, 6 | |Log in (use case) |Stakeholders, 6 | | Borrower, 24 |Supportability, 28 | | Clerk, 19 | | | Librarian, 15 | | | | | U | | |Use cases | | | Borrower, 24, 25 | | | Clerk, 19, 20, 21,22, 23 | | | Librarian, 15, 16, 17, 18 | | |User, 5, 6, 8 | | | characteristic, 8 | | | documents, 10 | | | interfaces, 9 | | | | |X | | |XAMPP, 6, 9, 14 | | ———————– Borrow books Librarian Clerk Search User System Database Librarian Update database Log in Article Borrower Issue book DATABASE Issue books Add Article Report Delete Article Update Librarian < include > < include > < include > < include > < include > Librarian Search book Log out Return books Log out Librarian Log in Librarian Log in

What Are The Fuels For The Future Environmental Sciences Essay

All of the fossil fuels in being today were created 1000000s of twelvemonth ago when aquatic workss and animate beings were burried and compressed by beds of deposit at the bottem of swamps and seas. Over clip this organic affair was converted by bacterial decay and force per unit area to crude oil ( oil ) , gas, and coal, which are heavly dependant on in todays socity, nevertheless these nonrenwable engery beginnings are consuming. Figure n gives the per centum of the entire energy consumed in the Earth from verious beginnings. Together, fossil fuels account for about 90 % of the sum. Part 1 Non renewable fuels used in vehicles: Propane LPG or liquefied propane gas is a three C methane series, normally in a gas signifier but can be compressed into a movable liquid. This fuel is formed as a reverberation from other crude oil merchandises throughout the natural gas or oil processing and is drawn from the fossil fuels. Most motors, barbeques, centered warming and oxy-gas torches use this fuel ( Serra 2006 ) .Propane and butane are the chief hydrocarbons in LPG When LPG is wholly combusted it has a inclination to act like other methane seriess. Complete burning will merely happen if the ratio of air to fuel contains precisely plenty air to wholly fire all of the fuel, the ratio is known as the stoichiometric mixture. When propane and butane are wholly burned it will bring forth H2O and C dioxide. Propane C3H8 + 5 O2 > 3 CO2 + 4 H2O + heat Propane + O > C dioxide + H2O Butane C4H10 + 6.5 O2  ® 4 CO2 + 5 H2O Butane + Oxygen > C dioxide + H2O However when an improper stoichiometric mixture is present, uncomplete burning occurs. This can bring forth C monoxide, a deathly merchandise. Propane 2 C3H8 + 7 O2 > 2 CO2 + 2 CO + 2 C + 8 H2O + heat Propane + Oxygen > Carbon Dioxide + Carbon Monoxide + Carbon + Water butane: C4H10 + 5O2 > 2CO2 + CO + C+5H2O+ heat Butane + O > Carbon Dioxide + Carbon Monoxide + Carbon + Water Name Molecular Formula Molecular Mass Melting Point ( oC ) Boiling Point ( oC ) State ( 25oC, 101.3kPa ) Density ( liquid g cm-3, 20oC ) Flashpoint ( oC ) Enthalpy of Combustion ( kJ mol-1 ) Uses propane C3H8 44 -188 -42.1 gas-2217 constituent of liquefied crude oil gas ( LPG ) , bottled gas ( fuel ) butane C4H10 58 -138 -0.5 gas-2874 constituent of liquefied crude oil gas ( LPG ) , coffin nail igniters ( fuel ).talk about graphs Fuel HHV MJ/kg HHV BTU/lb HHV kJ/mol LHV MJ/kg Propane 50.35 21,700 2,220 46.35 Butane 49.50 20,900 2,877 45.75 Gasoline Petrol is a mixture of a big figure of volatile distinguishable hydrocarbons, derived from crude oil and utilised in internal burning engines, dissolvers for oils and fats. ?†¢ & A ; deg ; ch p? µtrl? µum V & A ; deg ; ri? µty h & amp ; deg ; s & A ; deg ; uniqu? µ mix f ml? µcul? µs, which d? µfin? µ its physic & A ; deg ; l & A ; deg ; nd ch? µmic & amp ; deg ; l prp? µrti? µs, lik? µ clr & A ; deg ; nd viscsity ( K? µmp 2006 ) . Pentane hexane and octane are the chief hydrocarbons in gasoline. When gasoline is wholly combusted it has a inclination to act like other methane seriess. Complete burning will merely happen if the ratio of air to fuel contains precisely plenty air to wholly fire all of the fuel, the ratio is known as the stoichiometric mixture. Pentane, hexane and octane are wholly burned it will bring forth H2O and C dioxide. Hexane 2C6H14 + 19O2 — – & A ; gt ; 14H2O + 12CO2 Pentane C5H12 ( g ) +16 02 ( g ) — – & A ; gt ; 5 CO2 ( g ) + 6 H20 ( g ) Octane 2 C8H18 ( cubic decimeter ) + 25 O2 ( g ) > 16 CO2 ( g ) + 18 H2O ( g ) However when an improper stoichiometric mixture is present, uncomplete burning occurs. This can bring forth C monoxide, a deathly merchandise. Hexane C6H14 + 5O2 – & A ; gt ; CO2 + CO + 4C + 7H2O Pentane Octane 2C8H18 ( g ) + 17O2 ( g ) > 16CO ( g ) + 18H2O Name Molecular Formula Molecular Mass Melting Point ( oC ) Boiling Point ( oC ) State ( 25oC, 101.3kPa ) Density ( liquid g cm-3, 20oC ) Flashpoint ( oC ) Enthalpy of Combustion ( kJ mol-1 ) Uses pentane C5H12 72 -130 36.1 liquid 0.626 -49 -3536 constituent of gasoline ( fuel ) hexane C6H14 86 -95.3 68.7 liquid 0.659 -22 -4190 constituent of gasoline ( fuel ) octane C8H18 114 -56.8 126 liquid-5506 major constituent of gasoline ( fuel ) CoalCH4 + 2O2 CO2 + 2H2OFossil Fuel Emission Levels – Pounds per Billion Btu of Energy Input Pollutant Natural Gas Oil Coal Carbon Dioxide 117,000 164,000 208,000 Carbon Monoxide 40 33 208 Nitrogen Oxides 92 448 457 Sulfur Dioxide 1 1,122 2,591 Particulates 7 84 2,744 Mercury 0.000 0.007 0.016 Beginning: EIA – Natural Gas Issues and Trends 1998 Part 2 In today ‘s society there is a turning concern sing the correlativity between fossil fuels and the annihilating pollution produced in the environment. Fossil fuels are a unrenewable energy beginning, aside from the ecological impacts, the disbursal in excavation and polishing them is get downing to demand notice. One of the largest factors escalading the release of nursery gases is the burning of these fossil fuels. When a fuel that is made up of H and C Burnss wholly, O in the air combines with the H to organize H2O, and combines with the C to organize C dioxide. However when the burning of the hydrocarbon fuel is non complete, some C atoms will merely unite with on O atom instead than two. This forms a extremely toxicant gas called C monoxide. A figure of C atoms will go on to remain conjoined together and besides fall in the H atoms ; this allows the unburned hydrocarbon molecules which are smaller than the original fuel to get away from the vehicles exhaust. Fuel hydrocarbons that have undergone vaporization before come ining the engine accompany the unburned hydrocarbons, finally they react with the N oxide that was produced from earlier burning. This reaction has taken topographic point in the presence of sunshine which forms ozone. Although the ozone bed in the stratosphere Acts of the Apostless as a shield against the suns UV visible radiation, at land degree it is the chief factor behind photochemical smog which is a lung thorn. Carbon atoms can go on to remain joined to one another or no H atoms attached, practically in the procedure of uncomplete burning of Diesel fuel, bring forthing carbon black. Air pollution is going a critical issue, smog and carbon black from the unsafe gasses and particulates are non merely increasing human unwellness. Smog and carbon black besides affect the sustainability of harvests, this is done by the pollution being absorbed into the protective bed of the foliages destructing the indispensable cell membranes. This forces the workss to concentrate on internal fix and non to maturate. Energy companies that are firing fossil fuels are one of the largest manufacturers of atmospheric pollution today. The procedure involved in change overing fossil fuels into energy consequences in legion destructive results such as, air pollution, H2O pollution, accretion of solid waste, land debasement and human unwellnesss. Power workss produce electricity by firing coal. Combustion of coal similar to all fossil fuels produce C dioxide, nitrogen oxide and S dioxide. The S dioxide reacts with the O to bring forth sulfur trioxide, this so reacts with H2O bring forthing sulphuric acid. The sulphuric acid enters the Earth in the signifier of acerb rain. When the dodo fuels are converted into energy it consequences in the accretion of solid waste. This extra waste has a black impact on the environment. Not merely does this waste demand to be treated but it besides needs sufficient land infinite, every bit good as fiscal support to supervise and dispose of it. This quickly increased the opportunity of toxic overflow which can be deadly ; it could poison land H2O beginnings, affect environing flora, marine life and wildlife. 0rganic sulfur is a important issue in the power industries today ; it is chemically bound to all fossil fuels such as natural gas, coal and crude oil. When these fuels are combusted the organic sulfur is released into the air where it reacts with the O to organize sulfur dioxide. Unfortunately this is kept in the ambiance for 100s of old ages. Although it is an unseeable gas, it has inauspicious affects one the quality of the air we breathe. It is besides believed to lend to acid rain, environmental pollution to marine life and woods. Carbon dioxide plays a important function in the addition of planetary heating. The impact affects many countries of the environment. In Antarctica the clime alteration has increased the temperature which could ensue in more rapid ice thaw, this Domino consequence will increase sea degrees and compromises the composing of environing Waterss. The lifting H2O degrees entirely obstruct the class runing from colony, agribusiness and fishing both commercially and recreationally. Fossil fuels need to be delivered to power workss and all sorts of industries daily, this increases the opportunity of oil spills, which would destruct Marine and flora life. Oil rigs and grapevines could leak which besides wipe out wildlife. Coal elimination is believed to be one of the important factors of H2O pollution today. The universe today as we know it has become highly energy greedy, the demands for electricity and fuels are dramatically increasing with the turning population. Equally long as these harmful dodo fuels are still utilized the effects of pollution to our environment will merely acquire worse. An alternate demands to be sought that can run into the required supply which will halt the awful impacts future coevalss will confront. Part B There is more H in gasolene than there is in unstable H. Configuration of H atoms in gasolene is much more infinite maintaining than in stainless liquified H, therefore larger storage containers is needed to shop it. Electrolysis is non by and large the best manner to germinate H. Most of the today ‘s H reaches from natural gasoline as one of the byproducts of crude oil processing. Harmonizing to connected States alternate Fuels Data Center now, H is made using the following two methods. Electrolysis: utilises electric goaded power to divide up H2O compounds into H and O. Using reduced DC electromotive force will conclusion in passing out H on one electrode and O on the other. The electric power can get from electric power output determiners embracing renewable fuels. Connected States Department Of power ( DOE ) has resolved that electrolysis is improbable to go the prevailing method for big sums of H output in the hereafter. The best electrolysis is merely 62 per century efficient. Synthetic gas ( methane ) reformation: Prevailing method of Hydrogen bring forthing is stream restructuring or partial oxidization of natural gas, where other hydrocarbons can be utilised as feedstocks ( for presentation biomass or coal can be gasified and utilised in a vapour restructuring method to gestate H ) . Commercial methane reformation can be about 68 per century efficient. Harmonizing to Stanford University survey of H the first present manner of acquiring H is vapour methane reformation and this will likely remain the most economical manner every bit long as methane ( natural gas ) is accessible cheaply and in big measures. When the cost of methane returns up to more than three times it will be cheaper to do H by dividing up H2O compounds – H2O into H – H2 and oxygen – O2. 2H2O + power  ® 2H2 + O2 this is carried out by electrolysis. Part 3 Ethanol, as in the intoxicant can be altered to be utilized as a fuel for burning engines, this is done by a procedure called agitation. Ethanol is a by-product of sugar and starches, nevertheless in recent research it has been confirmed that it can be produced form hempen substance that are contained in the majority of works affair ( the cellulose and hemicelluloses ) ( kemp 2006 ) . Ethanol is normally used as a blending agent with gasoline to hike the octane degrees ; this besides reduces the C monoxide and other toxic smog that ‘s causes emanations. Glucose is of course created in the works by a procedure called photosynthesis. light + 6CO2 + 12H20 — & A ; gt ; C6H12O6 + 6O2 + 6H20 C dioxide +water — & A ; gt ; glucose + O In the agitation procedure, glucose is decayed into both ethanol and C dioxide. C6H12O6 — & A ; gt ; 2C2 H5 0H +2CO2 + Heat During the burning procedure a reaction between ethyl alcohol and O occurs organizing C dioxide. C2 H5 0H+ 30 2 — & A ; gt ; 2CO2 + 3 H2 0 + heat The burning procedure is doubled due to two ethyl alcohol molecules are produced for each glucose molecule. By adding all three equations together, it is made evident of the equal Numberss at each type of molecule on either side of the equation. This the concludes the overall reaction of the production and ingestion of ethyl alcohol can be displayed as: Light — & A ; gt ; heat

Tuesday, October 22, 2019

Stinky Pinky Definition and Examples

Stinky Pinky Definition and Examples A rhyming epithet, such as glad dad for a happy father, or wild child for an uncontrollable youngster, is called a stinky pinky. Made up of an adjective and a rhyming noun, a stinky pinky is a type of rhyming compound that functions as a playful definition. As a word game, stinky pinky goes by various names, including hink pink, hank pank, wordy gurdy, and brain train. Examples and Observations 50 Stinky Pinkies an artificial body of water fake lakea bashful insect shy flya bed on fire hot cota better cafe finer dinera better knife nicer slicera boxer who has lost weight lighter fightera cautious bird wary canarycerebral overwork brain strainthe chief of police top copa chubby kitty fat catcolored lemonade pink drinka dark-colored sled dog dusky huskya deceased Marxist dead reddehydrated soup chowder powdera dismal chorus dire choira ditch in Paris French trencha fast elevator swift liftthe funniest joke best jestan explosion in a hen house gizzard blizzarda fanatical slave zealot helota fat fish - stout trouta fuzzy fruit - hairy berrya greased hen slick chicka group yell team screama grumpy mountaintop cynical pinnaclea happier small dog merrier terriera holiday in Panama isthmus Christmasthe home of a small rodent mouse housean impolite man rude dudean inactive flower lazy daisyan ink-stained little finger inky pinkya large toupee big wigpermission to take so mething away removal approvala rabbit that makes you laugh funny bunnya sensible pupil prudent studenta skinny little horse bony ponya smarter author brighter writera smelly finger stinky pinkya smiling father happy pappya Snickers bar dropped on the beach sandy candya strange looking goatee weird bearda superior pullover better sweatera supervisor in a bad mood cross bossa suspicious looking clergyman sinister ministera tardy spouse late matea temperate youngster mild childa tiny insect wee beea useful rule effective directivea wet puppy soggy doggya young cat in love smitten kitten Shawn Colvin on the Stinky-Pinky Game To play Stinky Pinky, you thought of an adjective and a noun that rhymed, hence the name Stinky Pinky, and described the thing without rhyming in order to challenge the other players to guess your Stinky Pinky. You started out simply; a farm animals sea vessel would naturally be a goat boat, and so forth, although single-syllable answers were called Stink-Pinks, two-syllables Stinky Pinkys, and of course three-syllable rhymes were Stinkity-Pinkitys. One of my fathers favorite words to rhyme was gherkin, as in pickle. Dad thought of a loitering picklea lurkin gherkina saucy picklea smirkin gherkina busy picklea workin gherkin.(Shawn Colvin, Diamond in the Rough: A Memoir. William Morrow, 2012) How to Play Stinky Pinky This game has acquired more elegant names since I first played it as a child, but this is the name I knew . . .. The game requires two or more players. One player thinks up a rhyming pair of words and provides a verbal cluea non-rhyming definition. The other player(s) must discover the rhyming word pair. The example that comes immediately to mind from my childhood games is this one: Player A: obese feline animalPlayer B: fat cat I actually remember, at the age of seven or eight, learning the meaning of the words obese and feline in this context.The game encourages careful listening to the clue and narrowing down the possibilities for an answer, constrained by the syntax of the clue and the need to find rhyming words.(Margie Golick, Playing With Words. Pembroke, 1987) Stinky Pinkies in the 1940s Atlanta subdebs [teenage girls] have a little patois somewhat like old Pig Latin which they call Stinky Pinky. It contains words like Super-Snooper (a G-man), Flyer-Higher (an aviator), Snooty-Beauty (a debutante), Hen-Pen (a girls school), Jug-Mug (a man in jail), and Silly Filly (a young girl). (Subdebs. Life magazine, January 27, 1941) A Double Stinky Pinky A stinky pinky is a rhyming pair of words; one gives a paraphrase and the challenge is to recover the stinky pinky. I believe Paul [Halmos] is responsible for the following excellent double stinky pinky. Give a stinky pinky for an inebriated scoundrel. Answers: a drunk skunk or a plastered bastard. (Irving Kaplansky, Reminiscences. Paul Halmos: Celebrating 50 Years of Mathematics, ed. by John H. Ewing and F.W. Gehring. Springer-Verlag, 1991)

buy custom External Financing essay

buy custom External Financing essay External funding is a highly variable figure for the United States corporate sector. Acme can raise its funds from sources outside of the company. There are various types of external financing which the company may use. These sources include debt financing, equity financing, cash flow lending and corporate bond and debentures (Schulz Wasmeier, 2008). Megginson Smart (2000) say that external funding is extremely unpredictable in the United States because of the market trends and lending rates. The use of external financing involves high legal and transaction costs. The company should note that the outstanding nature of external funding needs of Acme means that $500M will be exceedingly variable from year to year for the company (Megginson Smart, 2000). Sources of external funding Debt Financing Acme can obtain external financing from debt financing which means borrowing money. Schulz Wasmeier (2008) says that in the course of debt financing, in return the creditor will receive the promise that the principal and interest on the debt will be repaid by the company. The interest rate to be paid by Acme characteristically includes the so called market rate of interest rate plus a risk premium because Acme is a well established company and certain will be collaterals used to secure the debt. Acme will pay its interest rate depending on the maturity of the loan and the volume of the loan. Apart from specific loan agreements such as mutual or syndicated loans, common types of debt financing that Acme can use includes overdraft funding, and loans against asset (Schulz Wasmeier, 2008). Merson (2011) noted that debt finance will allow Acme to raise cash without giving any share capital or equity. This type of external financing can balance interest payments against tax and therefore there is a good reason to expect debt finance to be relatively cheap. Merson (2011) noted that in theory debt finance has a lot in its favor. However in practice, it may not be asy to obtain. Banks lend their money in return for interest. There are several types of debt finance which include overdraft and obtaining loans against assets. Overdraft funding is uncertain for the bank and Acme. This is because an overdraft can be called in at any time, hence it is a high-risk strategy for the multinational to rely on it for longer-term financing (Merson, 2011). From Acmes point of view it will pay high interest rates to reflect the risk. Obtaining financing through loans against asset is the most common way a bank can make sure that its position is protected. This implies that if Acme goes under, the bank can lay claim to and sell the asset against which it had secured the debt (Merson, 2011) Cash Flow Lending The second type of external financing that can be used by Acme is cash flow lending. Since Acme is an established company with a good track record, the firm can take advantage of cash flow lending. Merson (2011) noted that in this type of financing, instead of taking security against specific assets, a bank relies on the cash flow that the business expects to generate (p. 124). In this context, the bank will look for safeguards in the form of guarantees based on such measures as profitability, enterprise value and ratios comparing profit with interest. If the agreements are breached, the bank has the right to recall the loan (Merson, 2011). One disadvantage of this type of financing is that the bank generally puts measures in place that allow it to take control of the companys cash flow if it defaults on loan repayments. Its advantage is that cash flow lending is more focused than asset based lending on the ability for a business to repay its debts (Merson, 2011). Corporate Bond and Debentures Acme can also obtain financing through corporate bond and debentures. Merson (2011) mentioned that a corporate bond or debenture is long-term debt instrument with a maturity date, a redemption value and a coupon. Acmes bbonds will be traded on markets. Merson (2011) noted that the markets discernment of the riskiness of the debt is mirrored in its market price, which in turn affects the real interest rate earned by the obtainer of the bond. The main disadvantage of this form of financing is that bond markets are regulated, and sourcing money in this way can be costly, and consumes more management time. Its advantage is that a corporate bond will enable Acme to access financing without the help of a bank. This might allow Acme to raise money for a lower interest rate. Merson (2011) says that this type of financing may allow Acme to put its debt out for a longer period than a bank might be prepared to countenance. The fourth type of external financing that can be used by Acme is equity financing. In the United States this is known as stock ownership. Merson (2011) says that equity financiers of Acme will not be comfortable with security but they look instead at the robustness of the offer, the quality of the prospect, the return it will generate and the companys ability to repay the investment. Through equity financing, Acme is likely to incur high cost of capital than a debt financing and will likely cause a drop in earnings per share for the company and in turn unenthusiastically impact the companys share price (Stowell, 2010). The equity financing option will strengthen the companys balance sheet and may lead to a higher bond rating from a credit financing agency. This may result in lower future bond financing costs and higher long term value for the company (Stowell, 2010). Debt financing usually has a lower cost of capital, but may weaken Acmes balance sheet and reduce financial flexibility. Acme and its banker must consider the risk adjusted cost of debt when comparing this form of financing with an equity financing. Equity financing and cash flow lending are the best options for Acme. Cash flow lending is the best option is because it is more centered than asset based lending on the capability of the company to repay its debts. Buy custom External Financing essay