Wednesday, July 31, 2019

Explanation of Modern Physics

Explanation of Modern Physics While the term â€Å"modern physics† often suggests that all that came before it was incorrect, 20th and 21st century additions to physics simply modified and expanded the phenomena which Newton and his fellow scientists had already contrived. From the mid-1800’s onward, new advances were made in the way of physics, specifically the revolutions of Einstein’s relativity, removing mankind further from the absolute, and quantum mechanics, which replaced certainty with probability. All of this led to an advance in nuclear weaponry, the advancement of laser technology, and the information age of computers.Although it directly contradicted the classical equipartition theorem of energy, black body radiation was one of the first discoveries in modern quantum mechanics. This theorem states that within thermal equilibrium, where each part of the system is the same temperature, each degree of freedom has 12kBT, kB representing the Boltzmann con stant, of thermal energy associated with it, meaning that the average kinetic energy in the translational movement of an object should be equal to the kinetic energy of its rotational motion.By this point, it was known how heat caused the atoms in solids to vibrate and that atoms were patterns of electrical charges, but it was unknown how these solids radiated the energy that they in turn created. Hertz and other scientists experimented with electromagnetic waves, and found that Maxwell’s previous conjectures that electromagnetic disturbances should propagate through space at the speed of light had been correct. This led to the explanation of light itself as an electromagnetic wave.From this observation, it was assumed that as a body was heated, the atoms would vibrate and create charge oscillations, which would then radiate the light and the additional heat that could be observed. From this, the idea of a â€Å"black body† formed, an object that would absorb all radia tion that came in contact with it, but which also was the perfect emitter. The ideal black body was a heated oven with a small hole, which would release the radiation from inside.Based on the equipartition theorem, such an oven at thermal equilibrium would have an infinite amount of energy, and the radiation through the hole would show that of all frequencies at once. However, when the experiment was actually performed, this is not the result that occurred. As the oven heated, different frequencies of radiation were detected from the hole, one at a time, starting with infrared radiation, followed by red, then yellow light, and so on.This proved that high oscillators are not excited at low temperatures, and that equipartition was not accurate. This discovery led to Stefan’s Law, which said that the total energy per square unit of black body per unit time, the power, is proportional to the absolute temperature to the fourth power. It also led to Wien’s Displacement Law, stating that the wavelength distributions of thermal radiation of a black body at all temperatures have essentially the same shape, except that the graphs are displaced from each other.Later on, Planck characterized the light coming from a black body and derived an equation to predict the radiation at certain temperatures, as shown by the diagram below. For each given temperature, the peaks changed position, solidifying the idea that different temperatures excite different levels of the light spectrum. This was all under the assumption that radiation was released in quanta, now known as photons. All of these laws help modern physicists interpret radiation and make accurate estimations at the temperature of planets based on the radiation that comes from them.Einstein used the same quantization of electromagnetic radiation to show the photoelectric effect, which disproved the idea that more intense light would increase the kinetic energy of the electrons radiated from an object. Photo electric effect was originally the work of Heinrich Hertz, but was later taken on by Albert Einstein. Einstein determined that light was made up of packets of energy known as photons, which have no mass, but have momentum and energy given by the equation E=hf, h representing Planck’s constant and f representing the frequency of the light used.Photoelectric effect explains that if light is shone on a metal with high enough energy, electrons will be released from the metal. Due to the energy equation, light of certain low frequencies will not cause the emission of electrons, not matter how intense, while light of certain high frequencies will always emit electrons, even at a very low intensity. The amount of energy needed to release electrons from a metal plate is dependent upon the type of metal it is, and changes from case to case, as every type of metal has a certain work function, or an amount of energy needed to remove an electron from its surface.If the photons that hit t he metal plate have enough energy as the work function of the metal, the energy from the photon can transfer to an electron, which allows it to escape from the surface of the metal. Of course, the energy of the photon is dependent upon the frequency of the light. Einstein postulated that the kinetic energy of the electron once it has been freed from the surface can be written as E=hf-W, W being the work function of the material. Prior to Einstein’s work in photoelectric effect, Hertz discovered, mostly by accident, that ultraviolet light would knock electrons off of metal surfaces.However, according to the classical wave theory of light, intensity of light changed the amplitude, thus more intense light would make the kinetic energy of the electrons higher as they were emitted from the surface. His experiment showed that this was not the case, and that frequency affected the kinetic energy, while intensity determined the number of electrons that were released. By explaining th e photoelectric effect, scientists find that light is a particle, but it also acts as a wave. This help support particle-wave duality.In order to explain the behavior of light, you must consider its particle like qualities as well as its wave like qualities. This means that light exhibits particle-wave duality, as it can act as a wave and a particle. In fact, everything exhibits this kind of behavior, but it is most prominent in very small objects, such as electrons. Particle-wave duality is attributed to Louis de Broglie in about 1923. He argued that since light could display wave and particle like properties, matter could as well.After centuries of thinking that electrons were solid things with definite positions, de Broglie proved that they had wave like properties by running experiments much like Young’s double slit experiments, and showing the interference patterns that arose. This idea helped scientists realize that the wavelength of an object diminishes proportionally to the momentum of the object. Around the same time that de Broglie was explaining particle-wave duality, Arthur Compton described the Compton effect, or Compton scattering.This was another discovery which showed how light could not solely be looked at as a wave, further supporting de Broglie’s particle-wave duality. Compton scattering is a phenomenon that takes place when a high-energy photon collides with an electron, causing a reduced frequency in the photon, leading to a reduced energy. Compton derived the formula to describe this occurrence to be ? ‘-? =hCme1-cos? = ? c(1-cos? ), where ? ‘ is the resulting wavelength of the photon, ? is the initial wavelength of the photon, ? is the scattering angle between the photon and the electron, and ? c is the wavelength of a resting electron, which is 2. 26 ? 10-12 meters. Compton came about this by considering the conservation of momentum and energy. Although they have no mass, photons have momentum, which is defined by ? =Ec=hfc=h?. In order to conserve momentum, or to collide at all, light must be thought of as a particle in this case, instead of a wave. Quantum mechanics is not the only facet of modern physics, and it shares equal importance with relativity. Relativity is defined as the dependence of various physical phenomena on relative motion of the observer and the observed objects, especially in relation to light, space, time, and gravity.Relativity in modern physics is hugely attributed to the work of Albert Einstein, while classical relativity can be mainly attributed to Galileo Galilei. The quintessential example of Galilean relativity is that of the person on a ship. Once the ship has reached a constant velocity, and continues in a constant direction, if the person is in the hull of the ship and is not looking outside to see any motion, the person cannot feel the ship moving. Galileo’s relativity hypothesis states that any two observers moving at constant speed and direction with respect to one another will obtain the same results for all mechanical experiments.This idea led to the realization that velocity does not exist without a reference point. This idea of a frame of reference became very important to Einstein’s own theories of relativity. Einstein had two theories of relativity, special and general. He published special relativity in 1905, and general relativity in 1916. His Theory of Special Relativity was deceptively simple, as it mostly took Galilean relativity and reapplied it to include Maxwell’s magnetic and electric fields. Special relativity states that the Laws of Physics are the same in all inertial frames.An inertial frame is a frame in which Newton’s law of inertia applies and holds true, so that objects at rest stay at rest unless an outside force is applied, and that objects in motion stay in motion unless acted upon by an outside force. The theory of relativity deals with objects that are approaching the speed o f light, as it turns out that Newton’s laws begin to falter when the velocity gets too high. Special relativity only deals with the motion of objects within inertial frames, and is quite comparable to Galilean relativity, with the addition of a few new discoveries, such as magnetic and electric fields and the speed of light.The theory of general relativity is much more difficult to understand than special relativity due to the fact that it involves objects traveling close to the speed of light within non-inertial frames, or frames that do not meet the requirements given by Newton’s law of inertia. General relativity coincides with special relativity when gravity can be neglected. This involves the curvature of space and time, and the idea that time is not the definite that we have always assumed that it was. General relativity is a theory that describes the behavior of space and time, as well as gravity.In general relativity, space-time becomes curved at the presence o f matter, which means that particles moving with not external forces acting upon them can spiral and travel in a curve, which becomes conflicting with Newton’s laws. In classical physics, gravity is described as a force, and as an apple falls from a tree, gravity attracts it to the center of the Earth. This also explains the orbit of planets. However, in general relativity, a massive object, such as the sun, curves space-time and forces planets to revolve around it in the same way a bead would spiral down a funnel.This idea of general relativity and the curvature of space-time led scientists to realize what black holes were and how they can be possible. This also explains the bending of light around objects. Black holes have massive centers and are hugely dense. Each particle that it includes is also living in space-time however, and so the center must continue to move and become more and more dense from the motion of these particles. Black holes are so dense that they bend s pace-time to an enormous degree, so that there is no escapable route from them.General relativity also explains that the universe must be either contracting or expanding. If all the stars in the universe were at rest compared to one another, gravity would begin to pull them together. General relativity would show that the space as a whole would begin to shrink and the distances between the stars would do the same. The universe could also technically be expanding, however it could never be static. In 1929, Hubble discovered that all of the distant galaxies seemed to be moving away from us, which would support the explanation that our galaxy is expanding.The basis of general relativity is the dynamic movement of space and time, and the fact that these are not static measurements that they have always been assumed to be. However, a key issue is that there has been little success in combining quantum mechanics and Einsteinian relativity, other than in quantum electrodynamics. Quantum el ectrodynamics, QED, is a quantum theory that involves the interaction of charged particles and the electromagnetic field. The scientific community hugely agrees upon QED, and it successfully unites quantum mechanics with relativity.QED mathematically explains the relationships between light and matter, as well as charged particles with one another. In the 1920’s, Paul Dirac laid the foundations of QED by discovering the equation for the spin of electrons, incorporating both quantum mechanics and the theory of special relativity. QED was further developed into the state that it is today in the 1940’s by Richard Feynman. QED rests on the assumption that charged particles interact by absorbing and emitting photons, which transmit electromagnetic forces. Photons cannot be seen or detected in anyway because their existence violates the conservation of energy and momentum.QED relies heavily on the Hamiltonian vector field and the use of differential equations and matrices. F eynman created the Feynman diagram used to depict QED, using a wavy line for photons, a straight line for the electron, and a junction of two straight lines and one wavy line to represent the absorption or emission of a photon, show below. QED helps define the probability of finding an electron at a certain position at a certain time, given its whereabouts at other positions and times. Since the possibilities of where and when the electron can emit or absorb a photon are infinite, this makes this a very difficult procedure.Compton scattering is very prevalent to QED due to its involvement in the scattering of electrons. Modern physics is a simple term used to cover a huge array of different discoveries made over the past two hundred years. While the two main facets of modern physics are quantum mechanics and relativity, there are an amazing number of subtopics and experiments that have brought about rapid change, giving the world new technologies and new capabilities. Thanks to scie ntists like Einstein, Hawking, Feynman, and many others, we have found, and will continue to find, amazing discoveries about our universe.Sources Anderson, Lauren. â€Å"Compton Scattering. †Ã‚  University of Washington Astronomy Department. 12 Nov. 2007. Web. 1 May 2012. . Andrei, Eva Y. â€Å"Photoelectric Effect. †Ã‚  Andrei Group. Web. 1 May 2012. . Boyer, Timothy H. â€Å"Thermodynamics of the Harmonic Oscillator: Wien's Displacement Law and the Planck Spectrum. †Ã‚  American Journal of Physics  71. 9 (2003): 866-870. Print. Branson, Jim. Wave Particle Duality- Through Experiments. 9 Apr. 2012. Web. 1 May 2012. .Broholm, Collin. â€Å"Equipartition Theorem. †Ã‚  General Physics for Bio-Science Majors. 1 Dec. 1997. Web. 1 May 2012. . Choquet-Bruhat, Yvonne. General Relativity and The Einstein Equations. Oxford: Oxford University Press, 2009. Print. Einstein, Albert, et al. Relativity: The Special and General Theory. New York: Pi Press, 1920. Print. Einstein, Albert. The Meaning of Relativity. London: Routledge Classics, 1956. Print. Felder, Gary. â€Å"Bumps and Wiggles: An Introduction to General Relativity. † 2005. Web. 1 May 2012. . Feynman, Richard P. â€Å"Space-Time Approach to Quantum Electrodynamics. â€Å"Physical Review  76. 6 (1949): Print. Fitzpatrick, Richard. The Planck Radiation Law. 2 Feb. 2006. Web. 1 May 2012. . Fowler, Michael. Black Body Radiation. 7 Sept. 2008. Web. 1 May 2012. . Jones, Victor R. Heinrich Hertz's Wireless Experiment (1887). 18 May 2004. Web. 1 May 2012. . Page, L.. â€Å"Black Body Radiation. †Ã‚  Princeton University, Physics 311/312.Sept. 1995. Web. 1 May 2012. . Scatterly, John. â€Å"Stefan's Radiation Law. †Ã‚  Nature  157. 3996 (1946): 737. Print. Sevian, Hannah. Electrons, photons, and the photo-electric effect. 11 July 2000. Web. 1 May 2012. . Sherrill, David. The Photoelectric Effect. 15 Aug. 2008. Web. 1 May 2012. . Takeuchi, Tatsu. Special Relativity. 2005. Web. 1 May 2012. . Wudka, Jose. Galilean Relativity. 24 Sept. 1998. Web. 1 May 2012. .

Tuesday, July 30, 2019

She Touched the Little Box in Her Pocket and Smiled

She touched the little box in her pocket and smiled†¦Ã¢â‚¬ ¦ Anne was playing all by her self as usual. Nobody bothered to play with her, for she was poor, so no one knew about her imaginative personality. Anne was used to it. she was roaming around the school alone, when she caught the sight of something shining. She ran to it-it was a little golden box with some carvings on it. She picked it up, trying to imagine what there was inside†¦.. an alien? Maybe some money†¦ or chocolates?Or better still†¦ a tiny alien which would grow and grow and begin to eat people! Anne put the box into her pocket. She decided to keep her little secret to herself; to open the school afterschool. after a boring history lesson, the final bell rang. Anne rushed home and locked herself in her rom. She took out the box. She was afraid to open it ,though. What if it had a bomb in it? She finally summoned all her courage to open it when she was disturbed b a soft knock on her door. It was her mother. Anne please come and lay the table for tea, because I’m tired and my head feels hot, â€Å" she said Anne groaned and thought it would not make a difference if she did not do it. They did not have enough to buy food, anyway, so it was just biscuits and tea. She was impatient to open her box. But she went down and laid the table, and waited for her father, a poor tailor, to come back home. When he came, he sat down immediately, exhausted from walking. He opened his newspaper and began sipping his tea. A jewelry case, belonging to Mr. mason, containing a diamond ring, was lost on her way home. Whoever returns it will get a reward,† he read aloud Anne opened the box that night. The next day, Anne went to school skipping. Her class had to write essays. She chose the topic â€Å"if I were a millionaire† to write on. The other children laughed at it. â€Å"you? A millionaire? † they asked She touched the little box I her pocket and smiled. It was Mr . Mason’s jewelry case with the ring inside

Monday, July 29, 2019

American National Government

This summary is not available. Please click here to view the post.

Political Economy of Race, Class and Gender Research Paper

Political Economy of Race, Class and Gender - Research Paper Example An increase in population still kept African-Americans and the whites in separate neighborhoods. These separate neighborhoods deprived African-Americans of receiving quality education and competing with the whites in the labor market. Segregation also created a feeling of hostility between the two communities who still fail to interact and comprehend the behavior of each other. This research paper will investigate the ways in which segregation among different communities, namely African American and the whites, creates inequality in the labor market. For this reason, this paper will examine three very important elements to understand why the problem of income disparity exists in one of the largest metropolitan cities of the USA. The three important elements identified by research are demographics, education and unemployment. Demographics play a critical role in understanding the labor market of Chicago. Chicago is one of the densely populated cities of the US with  a population of over 2.5 million people out of which about 32% are African Americans while 45% are white (Reich 17). However, Chicago is highly segregated. The major ethnic groups like to live among themselves in what they call their neighborhood. Jobs are highly dependent upon the neighborhood where people live. In order to understand the labor market of Chicago, it is critical to look at some of the details in history. The Second World War gave opportunity for the masses to work in factories as the US prepared for war. The Chicago Defender broke the news to African-Americans living in the South that there were plenty of jobs in the city of Chicago and ensured African-Americans would live a much happier life there (Ellen 261-277). It worked for most private firms, who were looking for cheap labor and also for Africans American, who found it difficult to find jobs at that time. There were nearly 3,000 African Americans

Sunday, July 28, 2019

Ancient Roman Charioteers in the Roman Myths Essay

Ancient Roman Charioteers in the Roman Myths - Essay Example The sources reveal that most Roman charioteers died at a young age, thus implying the danger of such a career. For example, one driver for the Blue faction in around AD 68 died at the age of 25 (ILS 5284). Crescent, the driver for the Blue faction in around Ad 115-124 died at 22 years old (ILS 5285). Moreover, Fuscus, a driver for the Greens, died in around AD 35 at the age of 24 (ILD 5278). In the same way, Marcus Aurelius Polynices died at 29 and his brother Marcus Aurelius Mollicius Tatianus died at 20 (ILS 5286). All of these documented accounts of charioteers were never able to live past the age of 29. In fact, although some of the ancient Roman charioteers may have survived the race past the age of 30, charting as a career still posed as a great danger to many charioteers considering that there was always the possibility that one’s life would end early. The sources imply that the impulse to win and to keep racing was great despite the danger because of the promise of reward and recognition, thus further endangering one’s life in the seemingly endless pursuit of such a career. The promise and temptation of the rewards accorded to the best charioteers must have been a continuous source of inspiration for many young charioteers who sought fame, fortune and recognition. For example, the driver for the Blue faction in around AD 68 received honors 354 times (ILS 5284). Glabrio, in around AD 115-124, received prizes of 1,558,346 sesterces (ILS 5285). In addition, Marcus Aurelius Polynices won the 40,000-sesterces prize 3 times, the 30,000-sesterces prize 26 times, and the pure prize 11 times (ILS 5286). Lacerta of the Reds also made as much money as to finance 100 lawyers to leave his sons (ILS 5287). Publius Aelius Gutta Calpurnianus, also won numerous awards, with the greatest at 50,000 sesterces once, 40,000 sesterces 9 times, an d 30,000 sesterces 17 times (ILS 5288). Such prices have been so great and so there was always the  drive in the charioteers to achieve these rewards. Moreover, erected monuments and speeches to glorify the victors even in their deaths actually served as an inspiration to many charioteers to keep on with their careers.  

Saturday, July 27, 2019

Mainstream American environmental movement Essay

Mainstream American environmental movement - Essay Example Further, immigration policies and occupational experiences have also shaped the environmental encounters of different races. Rather than culminating into the intended functional marriage of conservation and liberalism, limitations of the environmental reform agenda has led marginalized races, people of color as well as working class Whites to develop alternative agendas related to environmental movements (Rosemarie 83). This paper will analyze the role of race in the American environmental movement, and why environmental groups have had difficulties in building racial diversity in the past. It will further suggest why mainstream American environmental movement has been overwhelmingly white in the past and what can be done to change the trend among religious groups. As early as the 19th century, African-American abolitionists were fighting against the use of the poisonous arsenic, alongside slavery, by tobacco plantation owners who were Whites (Bernstein 212). More recent history has shown that some middle class Whites fled urban cities and shifted their focus on wildlife issues, wilderness and outdoor explorations while those who remained developed urban parks as they attempted to progress environmental conditions. At the same time, the urban environmental activists accorded the white working class better safety and worker health as compared to people of color. Instead, the environmental activists drove them off their land into reservations where they were put into slavery and used as laborers earning low wages. This forced them (people of color) to develop environmental discourses and activist agendas that addressed, or sought to address, oppression and racism alongside violation of human rights, denunciation or loss of land ownership, restricted access to resources and safety and health issues (Bernstein 212). To bridge the gap between these historically diverse issues, modern day environmental movement in the United States is characterized by an array of soc ial movements or non-governmental organizations (NGOs) representing international, national and local interests (Rosemarie 69). Founded on different political views, the stake they seek from their influence on the environmental policy also varies widely. To analyze the complexity of the environmental movement, research must view it in terms of the distinct memberships based on their world views. Just like organized religious groups, participation in the environmental movement is based on prescribed sets of beliefs. The beliefs are made up of cultural perspectives that define a community’s practices concerning environmental movements. For instance, one such group, the Center for Health, Environment and Justice is aligned with the concerns of environmental health. Oriented by this perspective, its objective is to safeguard the health of residents of urban areas by getting rid of toxic substances from the environment. On the other hand, another group, the Wilderness Society is c oncerned with the discourse of protection of biodiversity and perpetuation of intact environmental systems. Informed through this perspective, the Wilderness Society emphasizes on the creation and maintenance of wilderness areas in a bid to guarantee an enduring ecological diversity in their areas of interest. Viewed from the angles of these two different communities, it is apparent that they both have

Friday, July 26, 2019

International criminal court Essay Example | Topics and Well Written Essays - 250 words

International criminal court - Essay Example There are several reasons for this inability of national institutions, such as, first, the absence of political will to prosecute their own citizens or high ranking officials. This situation was witnessed in the former Yugoslavia. Second, these national institutions could have been destroyed, as was the situation in Rwanda. In the absence of justice there cannot be peace, without law no justice, and when there is no court to decide what is just and lawful there can be no meaningful law (United Nations, 1999). An international criminal court achieves justice for all, ends impunity, helps in ending conflicts, remedies the defects in ad hoc tribunals, provides an alternative to national criminal justice institutions that are unable or unwilling to act, and to acts as a deterrent for future war criminals. In reality, the ICC has not achieved greater success than the ad hoc tribunals that it supplants. Akin to the tribunals of Rwanda and Yugoslavia, the ICC does not act swiftly. Moreover, it is devoid of a system for enforcing its decisions. This makes it dependent upon governments to arrest and present perpetrators before it. Albeit, the ad hoc tribunals had this defect, they were able to rely on a UN Security Council resolution requiring international cooperation in executing the arrest warrants. In addition, the ICC is devoid of forceful checks on its authority (Schafer & Groves, 2009). Theoretically, the nations that had ratified the Rome Statute were to control the ICC; however, this has not been realized in practice. Schafer, B. D., & Groves, S. (2009, August 18). The U.S. Should Not Join the International Criminal Court. Retrieved May 17, 2015, from The Heritage Foundation:

Thursday, July 25, 2019

Supreme Court Cases in Education Essay Example | Topics and Well Written Essays - 500 words

Supreme Court Cases in Education - Essay Example Linda Carol Brown was an eight year old girl who was denied the privilege of attending the Sumner Elementary School, because she was black. Linda Brown had to walk six blocks, over a switch track, just to catch a bus, although the Sumner Elementary School was a mere seven blocks away. Her father, Reverend Oliver Brown, was a well respected Christian minister. He peacefully approached the principal of the all-white school and calmly asked if his daughter could attend. Linda Brown and her father were immediately denied the right to attend the school. At this point, Reverend Brown sought the assistance of the National Association for the Advancement of Colored People (NAACP) (Dudley, 2004). The NAACP was an organization that was born in 1909. Its goal was to grant all minorities the rights of equal voting, schooling, and housing. It pounced on the opportunity to have a legal battle with the white dominated public schools of America. For years, the NAACP had attempted to stop this sinister way of life through court cases. Until Brown v. Board, the many attempts had proved unsuccessful. The head of the NAACP, Thurgood Marshall, figured that with Linda Carol Brown, they had the greatest possible chance of winning the court case and upsetting the former case, Plessy v. Ferguson. On February 28, 1951, Linda Brown, her father and the NAACP filed their lawsuit against the Board of Education of Topeka, Kansas (Barlow, 2004). A grand jury decided to hear their case but their plea for the overturning of Plessy .v. Ferguson was quickly dismissed. Since the case was being held in Kansas, a southern state, the jury was mostly composed of white male, landowners who still believed that African Americans were inferior humans. This was the reason that the court decided to reject the proposed idea of integrated school districts. Because of appeals, the case kept advancing from court to court,

Wednesday, July 24, 2019

Factchecking Essay Example | Topics and Well Written Essays - 250 words

Factchecking - Essay Example He said he would but that law does not exist and that he had been clear that he supports exceptions for abortion in cases of rape, abortion and to save the life of the mother. Romney also employed deception in his attack with Obama with his ad that Obama will raise taxes by $4,000 on American middle class. This was an outright fabrication because Obama is not planning to raise taxes on the middle class to service the debt. The articles in Factcheck.org and politiFact.org also reveal how politicians use false information to make accusations. We can use as an example the most common issue of sequestration which is the spending cuts to arrest the deficit. Republics blamed Obama in FastCheck.org in the article The Obamaquester that it will specifically target certain sectors in society. When it was verified in with PoliticalFact.org, this accusation was in fact false because the sequester does not make distinction quoting Obama saying as it â€Å"won’t consider whether we’re cutting some bloated program that has outlived its usefulness, or a vital service that Americans depend on every single day. It doesn’t make those

Paper about MSC Essay Example | Topics and Well Written Essays - 2500 words

Paper about MSC - Essay Example This paper will attempt to describe marine science and the recent challenge or challenges the field of study is facing. Marine science is also known as oceanography or oceanology. As the term connotes, it deals with the study of the ocean and involves a variety of topics across several disciplines that can influence processes in the ocean world. There are four branches of the disciplines; namely, biological, chemical, geological, and physical. The first has to do with the interaction of marine organisms with their environment under the seas. Chemical oceanography is the study of the chemical properties of the sea. Knowing this is important because the seas and things in it help in sustaining life on earth. The chemical make-up of anything from the ocean that man comes into contact with will help society understand, for example, its effect on man. Geological oceanography, meanwhile, is that branch which concerns itself with the ocean floor as well as the tectonic plates of the earth. Lastly, physical oceanography studies the physical characteristics of the seas like waves, temperature, currents, tides , etc. Studying the ocean and all that is in it is not a new discipline. As mentioned in the introduction, humans were already exposed to the seas and oceans in prehistoric times although the observations were mostly for purposes of map making and fishing. Proponents include Juan Ponce de Leon and Benjamin Franklin who were responsible for identifying and naming, respectively, the Gulf Stream. Written accounts of their sea travels serve as information from explorers like James Cook, Louis Antoine de Bougainville, James Rennell, Sir James Clark Ross, Charles Darwin, Robert FitzRoy and Matthew Fontaine Maury and have helped in enriching the knowledge base about the ocean and marine life. The contributions of these explorers have enabled oceanographers after them to prepare properly for

Tuesday, July 23, 2019

Computer Ethics Case Study Example | Topics and Well Written Essays - 500 words

Computer Ethics - Case Study Example On the other hand, if a computer professional or a group of professionals ask for ransom in exchange of not holding a computer as a hostage, they are indulging in criminal behavior. Ransom in previous years used to be gained by kidnapping an individual and this activity was recognized as a criminal conduct. Similarly, holding a computer hostage and acquiring ransom is even recognized as criminal behavior. One way through which computer users can protect their computers from being attacked by ransomware is by protecting their computers with security software. This security software has the ability to detect and stop malicious attacks launched on a particular computer. The user needs to ensure that the security software is kept up-to-date. It is essential for the security software to remain up-to-date because new forms and software of ransomware are being launched every day and in order to tackle updated viruses, a computer needs updated security software. Another way of preventing becoming a hostage to ransomware is having a backup of the information and data that is stored on a particular computer (Deccan Herald, 2012). In cases a computer becomes a hostage, the most probable threat that a user faces is the loss of important data. If this data is stored in a backup storage device such as a USB or an external hard drive, the user will not have to give in to the demand of ransom. Government can use both deterrent as well as preventive modes of legislation to counter the issue of ransomware. The government should pass a legislation requiring all organizations and computer users to protect their computers with security systems and having backup of the data. The government can levy hefty fines for not complying with legislation. This will encourage computer users as well as organizations to protect their system in order to avoid hefty sanctions. Government can deter computer hackers who use

Monday, July 22, 2019

Viva Translations Essay Example for Free

Viva Translations Essay For example, Translators without Borders is listed as Ð ° partner, together with Viva Translations in Lisbon and Eulogia (currently Ð ° dead link), on the Eurotexte site. Similarly, the Translators without Borders site features Ð ° link to Eurotexte on the main page and, after outlining the groups services to several humanitarian organizations, informs us that many Eurotexte translators and staff volunteer their time for these important translation jobs so that translations can be provided free to humanitarian NGOs. The narrative of Translators without Borders is also structurally incoherent in another respect, as Ð ° consequence of its dependence on and overlap with the Eurotexte narrative. Translators without Borders, listed under the rubric â€Å"Success Stories† on the Eurotexte site, espouse humanitarian and political ideals that are arguably at odds with Eurotexte practices. Lori Thicke, managing director of Eurotexte and founder of Translators Without Borders, addresses these ideals in an undated speech to the Italian Federation of Translation Companies, which she begins with Ð ° powerful reminder of the atrocities committed in Chechnya, Palestine, and Kosovo. Ð  man in Chechnya says, Ð  ground-to-ground missile killed my two sons in the market in Grozny. They werent fighters-they were just there to buy some jeans. The Palestinian girl who at first is too afraid to talk to the visitors, whispers, І dont think were going to come out of this alive. on Ð ° forced March to the border Ð ° mother in Kosovo cries as the soldier takes aim, Not him, hes not even 15! Thicke goes on to ask, If theres no money for translations, who will tell their stories? This is Ð ° valid question and an admirable call for intervention. Yet at the same time the Eurotexte site proudly lists among its top clients numerous companies that are directly or indirectly implicated in the very atrocities that communities like Translators without Borders are meant to be bringing to our attention. These include General Electric, the subject of an intense boycott campaign by various peace groups between 1986 and 1993 because of its involvement in the production and sale of nuclear weapons. As Ð ° major U. S. defense contractor, it is now back on the boycott lists of several anti-war groups. Similar criticisms could be leveled at other clients that Eurotexte proudly lists on its site, including Loreal, as well as its subsidiary Lancome. Apart from its dismal record on animal testing, Loreal established Israel as its commercial center in the Middle East in 1995 and in 1998 received Israels Jubilee Award, for organizations who have done most to strengthen the Israeli economy. Loreal is on the boycott lists of various solidarity groups set up precisely to respond to the kind of fear and oppression opposed by the humanitarian organizations that are served by Translators without Borders. At best, then, Eurotexte/ Translators Without Borders may be accused of taking only Ð ° superficial interest in the plight of the groups it presumes to defend and of failing to look into the wider context of the tragedies it purports to oppose. At worst Eurotexte knowingly and cynically exploits both oppressor and oppressed to further its own commercial success. In Fishers framework, fidelity ultimately ranks higher than coherence. Structural incoherence of the type outlined above in the narrative of Translators Without Borders can in principle be explained and even justified from the perspective of narrative fidelity. Narrative fidelity, as І explained earlier, allows us to test Ð ° story in relation to its reasons as well as the values it promotes In terms of reasons, one could argue that Eurotexte has not misrepresented its links with Translators without Borders and has not sought to mislead by omitting facts about how the two organizations relate to each other. Eurotexte can only gain by its links with Translators without Borders; thus, the reasons for its particular narrative being what it is is logical and justified. For Eurotexte, doing good comes at Ð ° price; the ability to use Translators Without Borders as Ð ° selling point at the same time as keeping its own operation focused on making money ensures that translators without borders can continue to enjoy Ð ° stable platform at the same time that Eurotexte can continue its associations with clients like General Electric and Loreal. In her speech cited above, Thicke explicitly maintains this duality, stating, I’m sure І dont have to convince you of the importance of humanitarian work. If you didnt believe in it, you wouldnt be here today. But were in business. We all need to make money. Good works are often Ð ° luxury we cant afford. or can us? The great news І have for you today is that good works not only help the world: they can also be good for business. Much as І believe in good works, I’m Ð ° businesswoman, through and through Apart from indirectly securing Ð ° financial basis for its activities by promoting its sponsor as Ð ° responsible agency, however, it is not obvious how the aims of Translators Without Borders are served by being commoditized to enhance the image of Eurotexte. It is this element of the commoditization of the humanitarian work of the group that undermines the narrative of Translators without Borders, particularly in light of Fishers fidelity principles. Here, we ask what kind of worldview is promoted by the narrative under examination and what cultural values it directly or indirectly gives credence to.

Sunday, July 21, 2019

A Diagram For Railway Management Systems

A Diagram For Railway Management Systems Summary: I have prepared use case diagram for the given scenario. Along with the use case diagram, I have prepared specification for individual use cases. Besides, I have prepared an activity diagram. (a) Class Diagram -Staff ID Staff +Create new staff -Staff Name +Delete existing staff +Update staff Clerical Assistant -Clerical Assistant ID -Clerical Assistant Name Clerical Assistant Contacts -Join Date + Print address label +Record customer details +Print ticket and sale ticket Station Master -Station Master ID -Station Master Name -Station Master Contacts -Join Date + Provide hand to hand ticket +Record ticket type details Rail way manager -Manager ID -Manager Name -Manager Contacts -Join Date + Record time details +Record engine details Ticket Booking -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Customers -Customer ID -Customer Name -Customers contacts + Give Tickets + Give requirements + Get booking Booking via mail -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Booking over telephone -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Booking In person -Customer ID -Booking date -Booking rate + Create Booking + Delete Booking Figure 2.1: Class Diagram (b) Attributes and methods: Class Name: Staff. Attributes: Staff ID Staff Name Method: Create new staff() Delete Existing Staff() Update existing Staff() Class Name: Railway manager Attribute: Manager ID Manager Name Manager Contacts Join date Operations: Record time details() Record engine details() Class name: Station Master Attribute: Station master ID Station master Name Station master contacts. Join date Operations: Provide hand to hand tickets() Record ticket type details() Class name: Clerical Assistant Attribute: Clerical Assistant ID Clerical Assistant Name Clerical Assistant contacts. Join date Operations: Print address labels() Record customer details() Print and sales ticket () Class name: Customer Attribute: Customer ID Customer Name Customer contacts. Operations: Give tickets() Give requirements() Get booking() Class name: Ticket Booking Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking in person Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking over telephone Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Class name: Booking via mail. Attribute: Customer ID Booking date Booking rate Operations: Create Booking () Delete Booking() Summary: I have prepared a class diagram and described the attributes and methods for each of the classes. Task 3 Introduction: In this task, I have to prepare three different diagrams based on analyzing the system. These three diagrams will be behavioral models using object oriented method. Sequence diagram: A sequence diagram is a model showing sequences of events and interactions that happen within several layers and persons within the system. In need of behavioral modeling, sequence diagram helps to understand relevant behavior of the potential system. Following diagram shows the sequential diagram for the suggested system. Sequence Diagram Customers Staffs Ticket Booking Request for ticket booking Check Booking Info Check customer info Request customer details Give customer detail Choose ticket Confirm ticket booking Figure 3.1: Sequence diagram State Machine: State machine is close to activity diagram. Whereas in activity diagram, interactions are displayed, here the state of the different layers of the system is displayed. Following diagrams demonstrates state machine diagrams for ticket processing and providing it to customers hand to hand, to address or via mail. Requesting ticket booking Checking ticket availability Ticket not available Cancel Provide ticket information Make choice of ticket Ticket not chosen Confirm ticket booking Cancel Print ticket Provide ticket to customer Figure 3.2: State Machine Diagram Communication Diagrams: 2. Select customers () 2.1. Show customers () 3. Select Ticket Availability () 3.1. Show ticket availability () 4. Choose ticket () 4.1. Show ticket () 1. Start UI {} : Ticket booking : Ticket booking 3.2 Get ticket information ()Staff 4.2 confirm ticket booking 2.2 Get customers details () : Ticket booking : Customers Figure 3.3: Communication Diagram Summary: I have prepared three different diagrams representing behavioral modeling of the proposed system. Task 4 Introduction: In this task, I have to demonstrate the data protection laws available in the locality. Besides, I have to describe how they can be implemented. This discussion has to be practical enough in contrast with the real scenario. Some words on data protection laws: Data protection laws deal with the intellectual property of any organization. In a general sense, this talks about how the intellectual property should be protected and what will be happened if the data is damaged. And if it is deliberate, then what procedure will be used to prevent any further approach. Data protection laws in a sense is a vital approach that establishes promise to protect any companys intellectual property. (a) Our countries scenario with data protection laws: Unfortunately, in our country there are no governmental data protection laws available. Since protecting intellectual property is the major thing for any organization, organizations use their own protocol for protecting data. Big IT dependent companies across the country have their individual data protection laws. Following sections cover data protection management available in our country- Accessibility Restriction: Accessibility within a particular system area is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior knowledge on any advance part of a system can cause damage to it even though unintentionally. Within the area of confidential data sources, not everyone should be allowed to access. User Authentication: After ensuring minimal user restriction, establishing user authentication allows the system to be protected from unauthorized activity. A system is bound within limit; users are bound with limits of usage or activities, which lead into the necessity of user authentication. Distribution of level: This is another major approach by which it is ensured that there are multiple levels of the system within which multiple levels of users are allowed to do activity. System Security: System must be protected both physically and logically. Tickets room must be preserved from free access. Data stored should be encrypted. Disk partitions usage should be restricted to bare minimal. (b) Implementation of protection laws against the railways system: The computer system being developed can be secured by implementing one of the above-mentioned ways. Following points cover some of the ways that would be sufficient for the railway: The most usable way is user authentication method. To access the system, user has to enter the username and password. The password should match length and complexity requirements. This authentication procedure can protect the system from any unauthorized access of the system. Different level of authentication can be implied. While somebody is trying to breach the system, he may find one of the passwords, but not likely will get all to breach all the data. Level of accessibility is another approach highly effective for the new system. Administrator will have the full access when other will have limited access within their usage limitation. (c) Ensuring data protection in the current system: Testing: Testing all the security procedure potentially available and planned for the current system. Validation: Validation procedures would be set for the system. When users will try to enter the system with passwords and usernames, system will check for validity and permission limitation. Encryption: System will have the capability to encrypt potential sensitive data. This will protect data from being unveiled to a wrong hand. Summary: I have gathered information on security and protection laws and application of the laws with the current system. Possible details of methods that can be implemented for the current system are also given. Task 5 Introduction: In this task, I have to demonstrate the systems capability of preparing tickets. Along with preparing tickets, I also have to describe that how the system will be able to prepare tickets that cannot be copied easily and will be easy to print with cost effective printing medium. Besides, I also need to describe the hardware related with printing by researching available options. New system will mainly deal with the tickets. Preparing tickets is one of the major jobs with protection features from being copied. Following section demonstrates some methods by which tickets cant be copied- Copy prevention methods: In each ticket, ticket creator will give a 12 digit number as a barcode. Each time tickets barcode will be checked by checker software or barcode scanner. Ticket must not be printed on any typical paper. Each ticket will be printed on specialized printing paper that is not likely to be copied or available. Each ticket will carry individual customers identification along with the seat number. Every detail must be unique within all the tickets. Practically watermarks are given with conventional software. So, specialized watermark should be printed on the ticket. Specialized hologram is another way to protect ticket from being copied. Allowing customers to select multiple tickets of different types: There are several procedures here to allow customers to make choice from different types of ticket. In person: When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically look through available tickets and make choice that suits them the most. Via telephone: When a client will get connected through a telephone, then clerical assistant will provide with enough information. When customers will ask clerical assistant for ticket booking, assistant will provide available options after knowing the destination of the customers. Via email: When customers will request for a ticket via email, clerical assistant will record the email. Then he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed. Printing hardware and media details: For printing the tickets, several system components will be necessary. Printers, printing servers, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets. Details of suggested conventional product for printing Device Vendor Price ($) Computer HP 500 Ticket Printer HP 150 Computer maintenance 250 Application software Atlas developer ltd. 250 Power Supply 200 Printing Server 1000 Figure 5.1: Hardware details Brief details of some components: Application Software: Application software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass market software, its better to have one specifically made for specific purpose. This will also be a better option for security issue Ticket printers: Rather than installing general purpose printers, ticket printers are suggested to be used. Ticket printers are specially made for printing tickets. Following image shows a typical ticket printer- Figure 5.2: Ticket Printer Printing Server: Printing server is a typical server installed for printing purposes. This server is established by computers. Summary: I have demonstrated several issues on printing and printing media for ticket serving purposes. I have also discussed about the hardware that could be set to establish system for printing those tickets. Task 6 Introduction: In this task, I have to prepare several normalized table with relevant information within different levels. After completing normalization tables, I have to prepare data dictionary entries for all items included in the database design. Task 6 (a) Ticket booking normalization: Normalization refers to dividing a database into several tables to determine their relationship among each other. Data Aggregation: Serial No. Booking Type Customer ID Customer Name Customer Address Date Staff Type Staff ID Staff Name Seat No. Total. 2. Choosing key: Serial No. 3. Converting to 1NF (Removing repeating data): Serial No (PK) Booking name Booking type Customer Id Customer name Customer address Date Staff type Staff Id Staff name 4. Converting to 2NF (Removing Partial Key Dependency): Serial No (PK) Booking name Booking type Customer Id Customer name Customer address Date Staff type Staff Id Staff name 5. Converting to 3NF (Removing non-key dependency): Ticket Booking Serial No (PK) Booking name Booking type Customers: Customer Id Customer name Customer address Date Staff Staff type Staff Id Staff name Task 6 (b) Data Dictionary for Customer: Data dictionary Railway System: S5D Type: structure Name: customer Alias : Client Definition: Customer= customer Id+ customer name+ Customer contacts+ Occurrence: Picture: Author: Rajan Khan Date 10.2.2011 Figure: Data dictionary for customers. 2. Data dictionary for staff Data dictionary Railway System: S5C Type: structure Name: Staff Alias : employee Definition: Staff: Staff Id+ Staff name+ Staff Contacts Occurrence: Picture: Author: Rajan Khan Date 10.2.2011 Figure: Data Dictionary for Staff 3. Data dictionary for ticket booking. Data dictionary Academic theater System: S8c Type: structure Name: Ticket Booking Alias Ticket Booking Definition: Ticket booking : Ticket serial No+ Ticket Booking date+ Ticket Booking rate+ Occurrence: Picture: Author Rajan Khan Date 10.2.2011 Figure: Data Dictionary for ticket booking Summary: I have completed normalized data tables and dictionary entries for all the items that will be included in the database. Task 7 Introduction: In this task, I have to remark the objected oriented methodology for designing system or developing system. Besides, I have to relate my remarks with the system design that I have done for the previous tasks. Then, along with describing object oriented methods, I also have to remark structured methods. Differentiation between both methods: For Task 1: Object Oriented: For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. Structured: As per the requirements stated in structured diagram, DFD (Data Flow Diagram) could solve the problems of task 1. For task 2: Object Oriented: Since object oriented methods are practically dependent on object-class architecture, here class diagram is used. Structured: In structured methodology, ERD (Entity Relationship Diagram) is used. For task 3: Object Oriented: Here the sequence and communication diagram are used. Structured: Here the ELH (Entity Life History) would be used. Object Oriented Methods: Advantage: System can be very large. In object oriented method, modularization divides whole system into several manageable smaller parts or objects. In that way, when parts are developed, they can be synchronized to make the whole system working. Object oriented applications are more scalable than the structured tools. With looking at the modules of the system, it is possible to make an overview on how the system is going to be. Disadvantage: Legacy Systems are built in structured programming languages. So when it is necessary to convert those systems, it becomes a tough job. Object Oriented Database Management Systems are not available. Since there are many choices with object oriented methodology, sometimes unexpected confusion can rise. Structured Methods: Advantage: In structured programming, system requirements are defined much before programming starts. With proceed of development, amount of necessary changes starts to decrease. Disadvantages: Every detail should be planned and structured. Without any direct link, its impossible to go in a random manner, unlike the object oriented. Overview of a system before it is developed is not likely to be available. Summary: I have remarked advantages and disadvantages of both the structured and object oriented methodology. Besides, I have remarked the application of both the methodology with task 1 to task 3. Task 8 Introduction: In this task, I have to produce a comprehensive report with detailing all the tasks that I have completed. Then I will have to make an appendix reviewing my works. Executive Summary Preparing functional modeling: This includes two diagram and one specification details for one of the diagrams. Use case diagram (With Specification) Activity Diagram. Structural Modeling: Class Diagrams. Detailed attribute and operations. Behavioral Modeling: Sequence diagram State machines Communication Diagrams. Data Protection issues: Available data protection laws. Implementation of the issues with the system. Safe ticket management: How to create safe tickets. How the customers will be able to select multiple choices. What hardware will be used to print the tickets? Relational database designing: Creating normalized tables. Creating data dictionary. Evaluating object oriented method: Advantage and disadvantages of object oriented methods. Contrasting with structured method. Report Within all the phases of the tasks, several designing and evaluating have been done. In this report, all of them will be included for a better demonstration. Following section covers comprehensive details of task 1-7 respectively. Task 1: Functional Modeling Use case diagram for railway management system: Use case diagrams are useful to understand the system from the viewpoint of user. In this part there are three objects. There are customers, clerical assistant and ticket booking. Customers request for the ticket booking then clerical assistant check ticket information and clerical assistant get booking information. Clerical assistant request to customer their information then customer give details information and customer choose ticket set. At a last customer confirm ticket booking to clerical assistants. Several use case diagrams could be set into the scenario. But one compact use case diagram is used to cover potential features of the system rather than creating multiple diagrams. This has saved a lot of time. Activity Diagram for Railway Management System: Railway managements potential activities are shown in this diagram. Railway manager will record the time information and hauling engine information, station master will sale ticket hand to hand and clerical assistant will serve through mail or telephone- everything is covered in this activity diagram. Task 2: Structural Modeling Class Diagrams: Several classes can be found from the proposed system. Class diagrams are drawn based upon those classes found from the railway management systems scenario. These classes include attribute and operations details within each of the class. Task 3: Behavioral Model Sequence Diagram: This diagram outlines the sequential presentation of occurrence within the system. By the help of this diagram, expected behavior of the system can be understood. Comprehensive presentation of all the persons interacting with the system in a flow based order; this really helps to understand the system State machine diagram: This diagram demonstrates the states of the processes. From recording time details to processing ticket booking, every state is defined in this diagram. This clearly shows the end of activity. Communication Diagram: In this top order diagram, only the main operation and interacting persons are displayed in a comprehensive and technical way. Task 4: Data Protection Issues Our countries scenario: Big IT dependent companies across the country have their individual data protection laws. Accessibility Restriction: Accessibility within a particular system area is determined by administrators, which prevent wrong persons to be in a wrong place. Any person with no prior knowledge on any advance part of a system can cause damage to it even though unintentionally. Within the area of confidential data sources, not everyone should be allowed to access. User Authentication: After ensuring minimal user restriction, establishing user authentication allows the system to be protected from unauthorized activity. A system is bound within limit; users are bound with limits of usage or activities, which lead into the necessity of user authentication. Distribution of level: This is another major approach by which it is ensured that there are multiple levels of the system within which multiple levels of users are allowed to do activity. System Security: System must be protected both physically and logically. Tickets room must be preserved from free access. Data stored should be encrypted. Disk partitions usage should be restricted to bare minimal. (b) Implementation of protection laws against the railways system: The computer system being developed can be secured by implementing one of the above-mentioned ways. Following points cover some of the ways that would be sufficient for the railway: The most usable way is user authentication method. To access the system, user has to enter the username and password. The password should match length and complexity requirements. This authentication procedure can protect the system from any unauthorized access of the system. Different level of authentication can be implied. While somebody is trying to breach the system, he may find one of the passwords, but not likely will get all to breach all the data. (c) Ensuring data protection in the current system: Testing: Testing all the security procedure potentially available and planned for the current system. Validation: Validation procedures would be set for the system. When users will try to enter the system with passwords and usernames, system will check for validity and permission limitation. Encryption: System will have the capability to encrypt potential sensitive data. This will protect data from being unveiled to a wrong hand. Task 5: Evaluating ticket processing procedure Copy prevention methods: In each ticket, ticket creator will give a 12 digit number as a barcode. Each time tickets barcode will be checked by checker software or barcode scanner. Ticket must not be printed on any typical paper. Each ticket will be printed on specialized printing paper that is not likely to be copied or available. Each ticket will carry individual customers identification along with the seat number. Every detail must be unique within all the tickets. Practically watermarks are given with conventional software. So, specialized watermark should be printed on the ticket. Specialized hologram is another way to protect ticket from being copied. Allowing customers to select multiple tickets of different types: There are several procedures here to allow customers to make choice from different types of ticket. When station master will deal with the booking of a ticket, he will deal with a person face to face. Customer can practically look through available tickets and make choice that suits them the most. When a client will get connected through a telephone, then clerical assistant will provide with enough information. When customers will ask clerical assistant for ticket booking, assistant will provide available options after knowing the destination of the customers. When customers will request for a ticket via email, clerical assistant will record the email. Then he will send a feed back by giving all detailed options that are available. Then after processing all data, selected ticket will be confirmed. Printing hardware and media details: For printing the tickets, several system components will be necessary. Printers, printing servers, computers will be necessary. Among the conventional products for these purposes, there are so many which can be used here to establish the printing service for the labels and tickets. Device Vendor Price ($) Computer HP 500 Ticket Printer HP 150 Computer maintenance 250 Application software Atlas developer ltd. 250 Power Supply 200 Printing Server 1000 Brief details of some components: Application software for preparing tickets and printing them on a media is customized software developed by a conventional developer. Rather than buying mass market software, its better to have one specifically made for specific purpose. This will also be a better option for security issue Rather than installing general purpose printers, ticket printers are suggested to be used. Ticket printers are specially made for printing tickets. Task 6: Normalization and data dictionary Normalization: Here database is scattered into several tables to determine relationships within each of them. Data Dictionary: Data dictionary is build with entries from all the items that will be included in the database. Task 7: Evaluating Object Oriented Methodology Differentiation between both methods: For Task 1: For designing diagrams in task 1, use case diagram and activity diagram are used. For analyzing every detail use case diagram include detailed specification. As per the requirements stated in structured diagram, DFD (Data Flow Diagram) could solve the problems of task 1. For task 2: Since object oriented methods are practically dependent on object-class architecture, here class diagram is used. Structured: In structured methodology, ERD (Entity Relationship Diagram) is used. For task 3: Here the sequence and communication diagram are used. Here the ELH (Entity Life History) would be used. Object Oriented Methods: Advantage: System can be very large. In object oriented method, modularization divides whole

Saturday, July 20, 2019

The Existing System For Payslip Generation

The Existing System For Payslip Generation The purpose of the proposed project is to automate the Payslip generation process which replaces the traditional system of Payslip generation that used to print the employee salary details onto a paper. This project includes a single user who is authorized to initiate the application. The privileges are given only to the individual in a department who is responsible for generating the PaySlips for the employees. The application takes in the Excel Spreadsheet as input and generates an encrypted PDF PaySlip for each employee. This PDF PaySlip is mailed to the respective employee by using their mail-id which is provided in the Excel sheet. This application generates PaySlips of each employee every month. The PaySlip spreadsheet is uploaded to the system. The application uses an excel parser to read this spreadsheet. The excel parser parses the excel sheet in a row-wise fashion and generates an xml string for each row. This xml string contains the salary data of each employee. The salary data is converted into a password-protected PDF document as per a pre-defined template. These salary statements (in PDF) are emailed to respective users. The email process is logged. 1.2 Existing System: The existing System for PaySlip generation includes manual entry of the pay details of all the employees in an excel sheet and converting them to word document. Each row from the excel sheet is taken and then converted into the word document. This word document contains the Pay details of the employee. This document is printed on to a paper and then distributed to all the employees. The Existing System requires manual effort in converting the excel sheet data into the word document. The word document which contains the salary details should be generated for all the employees which in turn delays the whole process of distributing the payslips. As the paper is used in distributing the payslips this even includes the wastage of paper. This is till the part of generation of pyslips itself. When talking about distribution each and every paslip has to be signed by the authority, stamped and then folded which is placed in the envelope.this has to be distributed to all the employees near the desk has to take an acknowledgement that the employee has received by signing on paper. If the employee is not at the desk or out of station then distribution has to be postponed for that employee till he is available. That is he cant check it immediately after its been issued. Making it remotely accessible is also another aspect of it. 1.3 Proposed System: The proposed System for generating the PaySlips is a Web based Automated System for generation and distribution of PaySlips. Proposed System is efficient enough as it includes Less Manual effort. Manual effort is needed in only logging into the application and uploading the appropriate excel sheet into the application. Just a click on the upload button is sufficient, then the application itself will generate the payslips and distribute them to the respective employees mailid. Optimal performance of the application is achieved as delay is reduced in generation of Payslips with the existing system. Paper conservation is achieved, as the PaySlips are sent to the employees through mails, This makes the payslip remotely accessible 2.1 Functional Requirements Modules: Authentication/Authorization Upload File Excel Parser PDF Generation Email Module Description: Authentication/Authorization Module: This application is used to generate payslips of the employees for every month. Payslips, that depict all the salary details, is very confidential and hence this work should be carried out by an authorized person. For this purpose the user is presented with a login and is granted access to the application only after supplying a valid username and password. This needs database connectivity that stores all the details of the users who can use the application with their password. This module is implemented using Struts. As this partitions the presentation and implementation the login UI is built using Java server pages. When the user submits the user name and password the servlet gets invoked handling the process that connects to the database, verifies and accordingly an action is taken that forwards to another UI. Upload File: This module uploads the Excel spread sheet into the application in which details of all the employees are present with the present months salary details. The details of the employee includes the name, empid, designation etc .The Excel spread sheet that is needed to be uploaded should be in a specified format i.e., all the details should be in the same chronological order according to the specifications. The uploaded spread sheet will not be saved any where as the data in the Excel sheet is very confidential. This module is implemented using Struts. The File Upload UI is built using Java server pages. When the user uploads an Excel file a servlet gets invoked handling the process that directs an action. Excel Parser: This module takes the uploaded excel sheet as input and parses it in a row wise fashion, organizes the data in xml format For this a special software tool is used In this module we also retrieve the employee-id, mail-id and month for which the payslip is generated. The software tool used for parsing the Excel document is POI. This needs a POI.jar added in the library where some predefined methods are defined. The POI consists of APIs for manipulating various file formats based upon Microsofts OLE 2 Compound Document format, and Office OpenXML format, using pure Java. In short, you can read and write MS Excel files using Java. In addition, you can read and write MS Word and MS PowerPoint files using Java. POI is your Java Excel solution (for Excel 97-2007). However, we have a complete API for porting other OLE 2 Compound Document formats and welcome others to participate. OLE 2 Compound Document Format based files include most Microsoft Office files such as XLS and DOC as well as MFC serialization API based file formats. Office OpenXML Format based files include the new (2007+) xml based file formats, including Microsoft office files such as XLSX, DOCX and PPTX. PDF Generation: This module creates a PDF file per employee based on pre-defined template and a randomly generated Password is used to encrypt the PDF file. This password is used by the employees to retrieve the PaySlips. The template is designed using XSL independently and values are taken from the Excel and filled into PDF using java. The PDF is encrypted using a random generated password and the password is attached to the mail. The encrypted PDF document is mailed to the employee. The software tool used for generating a PDF document is XSL-FO. XSL-FO is a language for formatting XML data . XSL-FO stands for Extensible Stylesheet Language Formatting Objects . XSL-FO is a W3C Recommendation . XSL-FO is now formally named XSL . XSL-FO is an XML-based markup language describing the formatting of XML data for output to screen, paper or other media. Styling is both about transforming and formatting information. When the World Wide Web Consortium (W3C) made their first XSL Working Draft, it contained the language syntax for both transforming and formatting XML documents. Later, the XSL Working Group at W3C split the original draft into separate Recommendations. XSLT, a language for transforming XML documents . XSL or XSL-FO, a language for formatting XML documents. XPath, a language for navigating through elements and attributes in XML documents. This is more advantageous because this seperates the presentation or template of the PDF and the implementation how the data is filled in. Email Module: This Module emails the Payslips (Password protected PDF files) to the respective employee by using their mail id. The mailing details are saved in a batch log with the time and date at which the mail is sent to the employee for verification. This module sets the mail attributes like the subject, from_address, to_address and message body. Also a partial random generated password is sent in the mails which need to be personalized by the employee. This module also inserts values into the email log with the details of mailing. The Protocol used for mailing the PDF document to a particular employee is SMTP. The JavaMail API provides a platform-independent and protocol-independent framework to build mail and messaging applications.This is binded with Simple Mail Transfer Protocol for mailing. 2.2 Non-Functional Requirements Accessibility This application is easily accessible by the user who is authorized to use the system for generating PaySlips every month. Performance This system can generate PaySlips for any number of employees considering the same speed. Reliability This system is consistent and performs required functions under stated conditions. Security Unauthorized access to the system and its data is not allowed. The person who wants to access the system is authenticated against a username and password. The PaySlip mailed to the employee is also password protected. This ensures unauthorized access of the PaySlip. Usability This system enhances usability by incorporating well structured user interfaces, end-user interactions, informative error messages etc. 2.3 System Requirement Specification: Software Requirements: Language: Java/J2EE Operating system: Win 2000/XP or higher Web Server: Apache Tomcat Server Excel Parsers: POI(Poor Obfuscation Implementation) PDF Generator Tools: XSL-FO(Extensible Style sheet Language-Formatting Object) Back End: MySQL Database Hardware Requirements: Processor: P4 or higher RAM: 1 GB or higher Hard disk: 10 GB 3.1 Technical Architecture A Technical Architecture breaks down operational (business) processes into functional components and capabilities. It describes the structure and behaviour of the technology infrastructure of an enterprise, solution or system. The following diagram depicts functional components of the application. Browser Web Container (Tomcat) MySQL PaySlip Generation System The web container in detail handles the following operations as depicted in the following diagram As the web container receives the request from the browser it invokes the parser functionality and does the excel parsing row-wise and generates an xml String. The string data is used in generating the PDF. These PDFs which are generated are mailed to the respective employees by the mailer component. The entire email process is logged in a file. Once the application is deployed in the server we can access it locally or from remote using public IP or giving some domain name to the application. 3.2 Software Architecture Software architecture alludes to the overall structure of the software and the ways in which the structure provides conceptual integrity for a system. In the simplest form software architecture is the hierarchical structure of program components (modules), the manner in which these components interact and structure of data that are used by these components. The software architecture of a program or computing system is the structure or structures of the system, which comprise software components, the externally visible properties of those components, and the relationships between them. 4.1 Design Objectives: Design is the first step in the development phase of a process or system in sufficient details to permit its physical realization. Without design specifications, the design will be unguided. It is difficult to know when the process is complete and to measure the progress. Design is used to plan what information needs to be displayed and entered and how it relates to other information. Design is the only way to translate the requirements into a finished system. A well designed program will be easier to implement, distribute and maintain. 4.2 UML Diagrams 4.2.1 Usecase Diagram: 4.2.2 Class Diagram: 4.2.3 Sequence Diagram: 4.2.4 Collaboration Diagram: 4.2.5 Activity Diagram: 4.3 Data Flow Diagrams: Level 1 4.4 Database Design: 4.4.1 E-R Diagrams 4.4.2 Database Tables: Database Tables: 5.1 Pseudo Code Login Module Login form: public class LoginForm extends ActionForm { /**Declare two string variables that holds the username and password values entered in the form Define getter and setter methods **/ } Login Action: public class LoginAction extends Action { Public ActionForward execute(ActionMapping mapping, ActionForm actionForm, HttpServletRequest request, HttpServletResponse response) throws Exception { /**Create an object to the login form Retrieve the username and password entered in the form and save in some variables Create an object for the implementation and call the function validate() with the retrieved username and password as arguments Savetoken() Depending on its return value forward the action to success page or failure page**/ } Login Interface: public interface LoginDAO { /**Declare th method validate(string , string)**/ } Interface Implementation: public class LoginDAOimpl extends BaseDAO implements LoginDAO { Constructor() { } Validate () { /**Declare two string variables that holds the values of the username and password from he database Get the connection to the database using the predefined method in java Retrieve the username and password from the database using a SQL query(select) Compare both username, password from form and database Return a Boolean value according to the comparision**/ } } Login.jsp: CTE Pay Slip Generation System Employee Login function validateLogin(){ if(document.loginForm.username.value!=""&& document.loginForm.password.value!="") { return true; } else { alert("Please Enter UserName and Password."); return false;} } Login UserName : Password : Copyright  © 2009 Cambridge Technology Enterprises. All rights reserved. Upload File Module: Upload form: public class UploadForm extends ActionForm { /**Define a variable file of type file Also define the getter and setter methods **/ } Upload Action: public class StrutsUploadAction extends Action { public ActionForward execute ( ActionMapping mapping, ActionForm form, HttpServletRequest request, HttpServletResponse response) throws Exception { /** If the token is valid then Create an object for upload form to retrieve parameters like contentType, fileName, fileSize. Create an object to interface to all the method parseExcel(file) Return success Else Return failure **/ Upload.jsp CTE Pay Slip Generation System Employee Login function isFileName() { var fileName = document.forms[0].theFile.value; // uploadform is the form name if (fileName =="") { alert("Please select a file"); return false; } Else { if(fileName.substr((fileName.length)-3,fileName.length) == "xls") { document.forms[0].action = "FileUpload.do"; document.forms[0].method = "post"; document.forms[0].submit(); return true;} Else { alert("Please Upload an Excel file"); return false; }}} File Upload value= > Select File Copyright  © 2009 Cambridge Technology Enterprises. All rights reserved. window.NREUM||(NREUM={});NREUM.info={"beacon":"bam.nr-data.net","licenseKey":"de6e6cfad9","applicationID":"221047987","transactionName":"bl0HMhMFDEYCWhJeWlcXMBQISwdGEFgfRBpYShEPAggHGxNRFg==","queueTime":0,"applicationTime":1,"atts":"QhoERFsfH0g=","errorBeacon":"bam.nr-data.net","agent":""} Upload interface: public interface PaySlipDAO { declare a method parseExcel() } /**Upload interface implementation(Excel Working and PDF Generation Modules **/ ) public class PaySlipDAOImpl extends BaseDAO implements PaySlipDAO { Constructor() { } public String parseExcel(String fileName) throws Exception { Define a String array str[]={sno,month,NoofDays,empid,empname,desg,Basic,HRA,à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦} That defines the sequence in which Excel file should be in. /**Define a string variable that holds the root tag declare an input stream and initialize it to null now define a new input stream and initialize it to file (Excel file) initialize POIFSFileSystem to inputstream define a new HSSFworkbook get the sheet count get the sheet with count zero iterate the rows if the sheet has rows then iterate the cells from that retrieve the 4th,2nd and 21st cell values. 4-mployeeid 2-month 21-Email id For every cell value append the opening tag using the string array**/ /**According to the cell value get the value Like Numeric Formula String After adding the value append the closing tag Like wise iterate till all the cells are completed At the end append the closing root tag With this we are ready with our xml string. Using this xml string as the argument make the call to the generatPDF() Return empids of employees for whom the mail is sent and to whom the mail is not sent with a # appended in between.**/ } PDF Generation Module: public int genPDF( HSSFCell empid, HSSFCell mailid, HSSFCell monthyear, String xmlStr ) /**Set the path of the base directory to the current directory Define a file in which we save the xslt file that is used in designing the payslip Also define a PDF file with parameters like where to save(current directory),with what name(employee-id) and with what extension(.pdf) Create new instances for fop factory and fo user agent Get the random generated password which is of six characters length Now define two random numbers and retrieve th characters at that ndex in the employee id Append these two characters to the random generated password Encrypt the pdf using method PDFEncryptionParams() and set the Boolean parameters like allow print, allowCopyContent, allowEditContent, allowEditAnnotations and also the keys to encrypt configure foUserAgent as desired. Setup output. Construct fop with desired output format Setup XSLT Setup input for XSLT transformation Resulting SAX events (the generated FO) must be piped through to FOP Start XSLT transformation and FOP processing**/ /**Call the sendmail method by creating its object Save the returnvalue in a variable If that is equal to one then save that email id as sentmailid and append all other of this kind in the Excel sheet to this**/ /**If thats is equal to zero save that email id as failedmailid and append all others of this kind in the Excel sheet to this After mail is sent save that in the log using the user defined method insertIntoEmailLog (mailid, monthYear,status)**/ } private void insertIntoEmailLog(HSSFCell mailid, String monthYear, int status) { /**Get the data base connection Insert into table the values of status,month nd the mailed**/ } public static String getPassword(int n) { /**Generate n random characters may it be alphabets(upper and lower),numbers and symbols Return a string of length n characters**/ } MailService Module: public class MailService { MailService (); { } /**Define the host, transport_protocol, authentication needed, debugging needed etc.**/ public int sendMail(String empId,String monthYear,String emailid,byte[] pdfBytes,String randompwd,int randomposition1,int randomposition2) { /**Set the parameters like frommail, tomail, subject, messagetext, content type etc Define a new mail session Declare a new MIMEmessage() for this mail session set the source to PDF bytes send that message as mail to the tomailid**/ } } Failure.jsp CTE Pay Slip Generation System Employee Login response.setHeader(Cache-Control,no-cache); //HTTP 1.1 response.setHeader(Pragma,no-cache); //HTTP 1.0 response.setDateHeader (Expires, 0); //prevents caching at the proxy server response.setHeader(Cache-Control,no-store); //HTTP 1.1 %> Invalid username or password Please Try Again Copyright  © 2009 Cambridge Technology Enterprises. All rights reserved. Uploadsuccess.jsp CTE Pay Slip Generation System Employee Login response.setHeader(Cache-Control,no-cache); //HTTP 1.1 response.setHeader(Pragma,no-cache); //HTTP 1.0 response.setDateHeader (Expires, 0); //prevents caching at the proxy server response.setHeader(Cache-Control,no-store); //HTTP 1.1 %> File Successfully Uploaded EMail sent to: String maildata = (String)request.getAttribute(emailEmpId); int splitCount= maildata.indexOf(#); String sentEmailIds=maildata.substring(0,splitCount); String failedEmailIds=maildata.substring(splitCount+1,maildata.length()); %> EMail failed to:

Physics of Fencing :: sport physics fencing sword fighting

Before I begin my discussion about how physics effects fencing and how fencers use physics for more effective fencing, I will briefly discuss the origins of the sport of fencing. The first two fencing manuals were created and published in 1471and 1474. These emerged from an attempt at developing a system to teach people how to weild a light sword more effectively inbattle and duels in Frankfurt, Germany. Over the years, two distinct styles emerge. They were French and Italian. The french style relied mostly on strategy while Itialian used mostly physical strenght(Roswell). The first foils emerged during the seventeenth century for a more effective way of teaching students the "art" of dueling. In the eighteenth century, the rules were created for fencing as a sport. It is from these rules that today's rules for fencing were created(Roswell) In fencing there are three types of weapons that are taught. They are the epee, foil, and sabre. For the sake of this paper, the weapon being demonstrated is foil and the style is modern Italian. So without further ado.... Let us begin our discussion of physics with basic moves, and then move on to more advanced moves in fencing. Basic Fencing To begin with, we will discuss the effects of gravity on the body in the regular or "on garde" stance., and what forces are used during the "thrust" and the "lunge". On Garde Look at a picture of what a fencer looks like in the "on garde" position. As you can see, the larger arrow shows the pull of gravity. The smaller arrows show where gravity is pulling the limbs. Red being for the legs and yellow for the arms. Lunge Next, we will discuss the lunge. Below you will see two more images. First it is from the thrust position. Then the next image shows the lunge position. The lunge picture shows the forward momentum in the blue arrow. As in the previous pictures, the same colors are used for the same gravity applications, but the major difference is the effects of gravity on the legs. In this position, the effects of gravity are more severe because the legs are again further from the center mass of the body and therefore, more of the force of gravity is "pushing down" on the legs. So that will conclude the discussion of basic stances and physics of them. Next, we will discuss the more advanced moves and how fencers use physics to their advantage with them.