Wednesday, July 31, 2019

Argumentative Essay: Women Are Better Politician Than Men

There is a mindset in the current society that men make better politicians than women. In fact, that statement is not true. Women make good politicians too, some are even better than men in many aspects. Women politicians make better politicians because they compromise better, are more trustworthy and cooperative, plus they are more strong-minded as compared to men. One of the best example is Christine Lagarde the first female Minister of Economic Affairs in a G8 economy which is the governments of eight of the world's largest economies(Christine Lagarde, pars. 3).She is also voted as the world's 9th most powerful woman according to Forbes magazine. Women politicians have a more compromising and friendly nature than men. This ultimately becomes a highly useful political tool for political campaign. They tend to face difficult situations with a calm attitude. For example, Ms. Indra Gandhi, the first female prime minister in India chose a peaceful way to rule her country. When her coun try was at war with Pakistan in 1971, she signed the treaty of friendship and cooperation with Pakistan to avoid financial hardship and instability in her country (Palekar, pars.  2-5).Thus, resulting a stable economy in India. She ruled her country effectively by getting moral support from all the ministers and maintaning good relationship with the other countries which helped in the economic growth of India. This would not have happened without her compromising and friendly nature. Aside from that, female politicians also are more cooperative and trustworthy than men. Research shows, women are more skilled at making people work together.This is because women are better at communicating with each other during work, they implement successful strategies thereby achieving higher results. On the other hand, men tend to excel more at bamboozling and cheating. This is proven by the studies of Rolf Kuemmerli and colleagues by repeating a game called Prisoner's Dilemma. This game involve s two people, they need to cooperate with each other to obtain a win-win situation. Studies shows that men do not cooperate as well as women because women have a better ability to interact and comprehend messages that one is trying to deliver (Highfield, pars.  5-11).In addition, women are found to be more trustworthy than men. This statement is proven by Professor Roger Steare using the â€Å"Moral DNA† test by measuring a person's morality and changes in their value system when they enter the workplace. According to results, women have more moral values , proving that they are more trustworthy (Knight, pars. 3-5). Making them better politicians. Besides that, scientists claimed that male politicians are more decisive than female politicians (Men more decisive, pars. 5-9) .However, that doesn't mean that female politicians are not good at making decisions. In fact, female politician are less decisive but more strong-minded than men as they consider their decision thoroughl y before finalizing. Before making a desicion, they examine the consequences towards an individual, society and the country and seek for a win-win solution. They search for long-term solutions by using retention strategies as a way to improve the results. Thus, they have the capacity to be more balanced in decision-making.Not only that, women are more precautious and they tend to make less mistakes in their work. This is because women always think twice and recheck their work before completing the final touches. This indirectly proves that women are better politicians than men. In my opinion, women politicians make better politicians because they compromise better, are more trustworthy and cooperative, plus they are more strong-minded as compared to men. They have more good aspects when compared to men. Thus, women are better politicians than men.

Tuesday, July 30, 2019

Ooad Lab Manual

Ex. no: 1 STUDY OF UML DIAGRAMS Date: UML DIAGRAMS There are three classifications of UML diagrams: †¢ Behavior diagrams. A type of diagram that depicts behavioral features of a system or business process. This includes activity, state machine, and use case diagrams as well as the four interaction diagrams. †¢ Interaction diagrams. A subset of behavior diagrams which emphasize object interactions. This includes communication, interaction overview, sequence, and timing diagrams. †¢ Structure diagrams. A type of diagram that depicts the elements of a specification that are irrespective of time. This includes class, composite structure, component, deployment, object, and package diagrams. |Diagram |Description |Learning Priority | |Activity Diagram |Depicts high-level business processes, including data flow, or to model the |High | | |logic of complex logic within a system. | |Class Diagram |Shows a collection of static model elements such as classes and types, their |High | | |contents, and their relationships. | | |Communication Diagram |Shows instances of classes, their interrelationships, and the message flow |Low | | |between them. Communication diagrams typically focus on the structural | | | |organization of objects that send and receive messages. Formerly called a | | | |Collaboration Diagram. | | |Component Diagram |Depicts the components that compose and application, system, or enterprise. |Medium | | |The components, their interrelationships, interactions, and their public | | | |interfaces are depicted. | |Composite Structure Diagram |Depicts the internal structure of a classifier(such as a class, component, or|Low | | |use case), including the interaction points of the classifier to other parts | | | |of the system. | | |Deployment Diagram |Shows the execution architecture of systems. This includes nodes, either |Medium | | |hardware or software execution environments, as well as the middleware | | | |connecting them. | | |Interaction Overview Diagram |A variant of an activity diagram which overviews the control flow within a |Low | | |system or business process. Each node/activity within the diagram can | | | |represent another interaction diagram. | |Object Diagram |Depicts objects and their relationships at a point in time, typically a |Low | | |special case of either a class diagram or a communication diagram. | | |Package Diagram |Show how model elements are organized into packages as well as the |Low | | |dependencies between packages. | |Sequence Diagram |Models the sequential logic, in effect the time ordering of messages between |High | | |classifiers. | | |State Machine Diagram |Describes the states an object or interaction may be in, as well as the |Medium | | |transitions between states. Formerly referred to as a state diagram, state | | | |chart diagr am, or a state-transition diagram. | |Timing Diagram |Depicts the change in state or condition of a classifier instance or role |Low | | |over time. Typically used to show the change in state of an object over time | | | |in response to external events. | | |Use Case Diagram |Shows use cases, actors, and their interrelationships. |Medium | USE CASE DIAGRAM: A use case diagram is a type of behavioral diagram defined by the Unified Modeling Language (UML). Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals- represented as use cases- and any dependencies between those use cases. Use case diagram depict: †¢ Use cases. A use case describes a sequence of actions that provide something of measurable value to an actor and is drawn as a horizontal ellipse. †¢ Actors. An actor is a person, organization, or external system that plays a role in one or more interactions with your system. Actors are drawn as stick figures. †¢ Associations. Associations between actors and use cases are indicated in use case diagrams by solid lines. An association exists whenever an actor is involved with an interaction described by a use case. Associations are modeled as lines connecting use cases and actors to one another, with an optional arrowhead on one end of the line. The arrowhead is often used to indicating the direction of the initial invocation of the relationship or to indicate the primary actor within the use case. The arrowheads are typically confused with data flow and as a result I avoid their use. System boundary boxes (optional). You can draw a rectangle around the use cases, called the system boundary box, to indicate the scope of your system. Anything within the box represents functionality that is in scope and anything outside the box is not. System boundary boxes are rarely used, although on occasion I have used them to identify which use cases will be delivered in each major release of a system. †¢ Packages (o ptional). Packages are UML constructs that enable you to organize model elements (such as use cases) into groups. Packages are depicted as file folders and can be used on any of the UML diagrams, including both use case diagrams and class diagrams. I use packages only when my diagrams become unwieldy, which generally implies they cannot be printed on a single page, to organize a large diagram into smaller ones. [pic] RELATIONSHIPS IN USE CASE DIAGRAM: Three relationships among use cases are supported by the UML standard, which describes graphical notation for these relationships. Include In one form of interaction, a given use case may include another. The first use case often depends on the outcome of the included use case. This is useful for extracting truly common behaviors from multiple use cases into a single description. The notation is a dashed arrow from the including to the included use case, with the label â€Å"†. This usage resembles a macro expansion where the included use case behavior is placed inline in the base use case behavior. There are no parameters or return values. Extend In another form of interaction, a given use case, (the extension) may extend another. This relationship indicates that the behavior of the extension use case may be inserted in the extended use case under some conditions. The notation is a dashed arrow from the extension to the extended use case, with the label . This can be useful for dealing with special cases, or in accommodating new requirements during system maintenance and extension. To make the points at which extension may occur explicit extension points may be defined in use cases which are listed in a compartment below the use case name. Generalization In the third form of relationship among use cases, a generalization/ specialization relationship exists. A given use case may be specialized form of an existing use case. The notation is a solid line ending in a hollow triangle drawn from the specialized to the more general use case. This resembles the object-oriented concept of sub-classing, in practice it can be both useful and effective to factor common behaviors, constraints and assumptions to the general use case, describe them once, and deal same as except details in the specialized cases. SEQUENCE DIAGRAM: The well-known Message Sequence Chart technique has been incorporated into the Unified Modeling Language (UML) diagram under the name of Sequence Diagram. A sequence diagram shows, as parallel vertical lines, different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime scenarios in a graphical manner. Sequence diagrams are typically used to model: 1. Usage scenarios. A usage scenario is a description of a potential way your system is used. The logic of a usage scenario may be part of a use case, perhaps an alternate course. It may also be one entire pass through use case, such as the logic described by the basic course of action or a portion of the basic course of action, plus one or more alternate scenarios. The logic of a usage scenario may also be a pass through the logic contained in several use cases. For example, a student enrolls in the university, and then immediately enrolls in three seminars. 2. The logic of methods. Sequence diagrams can be used to explore the logic of a complex operation, function, or procedure. One way to think of sequence diagrams, particularly highly detailed diagrams, is a visual object code. 3. The logic of services. A service is effectively a high-level method, often one that can be invoked by a wide variety of clients. This includes web-services as well as business transactions implemented by a variety of technologies such as CICS/COBOL or CORBA-compliant object request brokers (ORBs). [pic] ACTIVITY DIAGRAM: In the Unified Modeling Language, an activity diagram represents the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control. Describing the basic notations: †¢ Initial node. The filled in circle is the starting point of the diagram. An initial node isn’t required although it does make it significantly easier to read the diagram. †¢ Activity final node. The filled circle with a border is the ending point. An activity diagram can have zero or more activity final nodes. †¢ Activity. The rounded rectangles represent activities that occur. An activity may be physical, such as Inspect Forms, or electronic, such as Display Create Student Screen. †¢ Flow/edge. The arrows on the diagram. Although there is a subtle difference between flows and edges I have never seen a practical purpose for the difference although I have no doubt one exists. I’ll use the term flow. Fork. A black bar with one flow going into it and several leaving it. This denotes the beginning of parallel activity. †¢ Join. A black bar with several flows entering it and one leaving it. All flows going into the join must reach it before processing may continue. This denotes the end of parallel processing. †¢ Condition . Text such as [Incorrect Form] on a flow, defining a guard which must evaluate to true in traverse the node. †¢ Decision. A diamond with one flow entering and several leaving. The flows leaving include conditions although some modelers will not indicate the conditions if it is obvious. Merge. A diamond with several flows entering and one leaving. The implication is that one or more incoming flows much reach this point until processing continues, based on any guards on the outgoing flow. †¢ Partition. Activity Diagram is organized into many partitions, also called swim lanes, indicating who/what is performing the activities (the Applicant, Registrar, or System). †¢ Sub-activity indicator. The rake in the bottom corner of an activity, such as in the Apply to University activity, indicates that the activity is described by a more finely detailed activity diagram. †¢ Flow final. The circle with the X through it. This indicates that the process stops at this point. [pic] CLASS DIAGRAM: In the Unified Modeling Language (UML), a class diagram is a type of static structure diagram that describes the structure of a system by showing the system’s classes, their attributes, and the relationships between the classes. Relationships A relationship is general term covering the specific types of logical connections found on class and object diagrams. UML shows the following relationships: †¢ Instance-Level Relationships o Link A Link is the basic relationship among objects. It is represented as a line connecting two or more object boxes. It can be shown on an object diagram or class diagram. A link is an instance or an association. o Association An Association represents a family of links. Binary associations (with two ends) are normally represented as a line, with each end connected to a class box. Higher order associations can be drawn with more than two ends. In such cases, the ends are connected to a central diamond. An association can be named, and the ends of an association can be adorned with role names, ownership indicators, multiplicity, visibility, and other properties. There are five different types of association. Bi-directional and uni-directional associations are the most common ones. For instance, a flight class is associated with a plane class bi-directionally. Associations can only be shown on class diagrams. o Aggregation Class diagram showing Aggregation between two classes Aggregation is a variant of the â€Å"has a† or association relationship; composition is more specific than aggregation. As a type of association, an aggregation can be named and have the same adornments that an association can. However, an aggregation may not involve more than two classes. Aggregation can occur when a class is a collection or container of other classes, but where the contained classes do not have a strong life cycle dependency on the container—essentially, if the container is destroyed, its contents are not. In UML, it is graphically represented as a clear diamond shape on the containing class end of the tree of lines that connect contained class(es) to the containing class. o Composition Composition is a stronger variant of the â€Å"has a† or association relationship; composition is more specific than aggregation. Composition has a strong life cycle dependency between instances of the container class and instances of the contained class(es): If the container is destroyed, every instance that it contains is destroyed as well. The UML graphical representation of a composition relationship is a filled diamond shape on the containing class end of the tree of lines that connect contained class(es) to the containing class. o Differences between Composition and Aggregation The whole of a composition must have a multiplicity of 0.. 1 or 1, indicating that a part must be for only one whole. The whole of an aggregation may have any multiplicity. When attempting to represent real-world whole-part relationships, e. g. , an engine is part of a car, the composition relationship is most appropriate. However, when representing a software or database relationship, e. g. , car model engine ENG01 is part of a car model CM01, an aggregation relationship is best, as the engine, ENG01 may be also part of a different car model, CM02. This is often called a â€Å"catalog† relationship. †¢ Class Level Relationships o Generalization Class diagram showing generalization between one super class and two subclasses The generalization relationship indicates that one of the two related classes (the subtype) is considered to be a specialized form of the other (the supertype) and supertype is considered as GENERALIZATION of subtype. In practice, this means that any instance of the subtype is also an instance of the supertype. The relationship is most easily understood by the phrase ‘A is a B’. The UML graphical representation of a Generalization is a hollow triangle shape on the supertype end of the line (or tree of lines) that connects it to one or more subtypes. The generalized relationship is also known as the inheritance or â€Å"is aâ€Å" relationship. The supertype in the generalization relationship is also known as the â€Å"parent†, super class, base class, or base type. The subtype in the generalization relationship is also known as the â€Å"child’, subclass, derived class, derived type, inheriting class, or inheriting type. †¢ Generalization-Specialization relationship A is a type of B E. g. †an oak is a type of tree†, â€Å"a sedan is a type of vehicle† o Realization In UML modeling, a realization relationship is relationship between model elements, in which one model element (the client) realizes the behavior that the other model element (the supplier) specifies. A realization is displayed in the diagram editor as a dashed line with an unfilled arrowhead towards the supplier. †¢ General Relationship o Dependency(UML) A dependency exists between two defined elements if a change to the definition of one would result in a change to the other. This is indicated by a dashed pointing from the dependent to the independent element. Several named varieties exist. A dependency can be between instances, class, or both. †¢ Multiplicity The association relationship indicates that (at least) one of the two related classes makes reference to the other. In contrast with the generalization relationship, this is most easily understood through the phrase ‘A has a B’{a mother cat has kittens, kittens have a mother cat}. The UML representation of an association is a line with an optional arrowhead indicating the role of the object(s) in the relationship, and an optional notation at each end indicating the multiplicity of instances of that entity ( the number of objects that participate in the association). Common multiplicities are: Indicator Meaning 0.. No instances, or one instance(optional, may) 1 Exactly one instance 0.. * or * Zero or more instances 1.. * One or more instances(at least one) n Exactly n instances(n>1) 0.. n Zero or n instances(n>1) 1.. n One or n instances(n>1) [pic] COMPONENT DIAGRAM: In the Unified Modeling Language, a component diagram depicts how a software system is split up into physical components and shows the dependencies among these components. Physical components could be, for example, files, header, link libraries, modules, executables, or packages. Component diagrams can be used to model and document any system’s architecture. Component diagrams are particularly useful with larger teams. Your initial architectural modeling efforts during cycle 0 should focus on identifying the initial architectural landscape for your system. UML component diagrams are great for doing this as they enable you to model the high-level software components, and more importantly the interfaces to those components. Once the interfaces are defined, and agreed to by your team, it makes it much easier to organize the development effort between sub teams. You will discover the need to evolve the interfaces to reflect new requirements or changes to your design as your project progresses, changes that need to be negotiated between the sub teams and then implemented appropriately. [pic] INTRODUCTION TO RATIONAL ROSE Rational rose Rational Rose is an object-oriented Unified Modeling Language(UML) software design tool intended for visual modeling and component construction of enterprise-level software applications. In much the same way a theatrical director blocks out a play, a software designer uses Rational rose to visually create(model) the framework for an application by blocking out classes with actors(stick figures), use case elements(ovals), objects(rectangles) and messages/relationships(arrows) in a sequence diagram using drag-and-drop symbols. Rational Rose documents the diagram as it is being constructed and then generates code in the designer’s choice of C++, Visual Basic, Java, Oracle8,CORBA or Data Definition Language. Two popular features of Rational Rose are its ability to provide iterative development and round-trip engineering. Rational Rose allows designers to take advantage of iterative development(sometimes called evolutionary development) because the new application can be created in stages with the output of one iteration becoming the input to the next. (This is in contrast to waterfall development where the whole project is completed from start to finish before a user gets to try it out. ) Then, as the developer begins to understand how the components interact and makes modifications in the design, Rational Rose can perform what is called â€Å"round-trip engineering† by going back and updating the rest of the model to ensure the code remains consistent. Rational rose is extensible, with downloadable add-ins and third-party applications. It supports COM/DCOM(ActiveX), JavaBeans, and Corba component standards. Views in UML/Rational Rose There are four views for a model created in Rational Rose, each representing the system from a different point of view. The Use Case View The use case view contains the diagrams used in analysis(use case, sequence, and collaboration), and all the elements that compromise these diagrams(e. g. , actors). More recent versions of Rational Rose also allow for additional documentation in the form of word-processed documents and/or URLs to Web-based materials. The purpose of the use case view is to envisage what the system must do, without dealing with the specifics of how it will be implemented. Logical View The logical view contains the diagrams used in object design(class diagrams and state transition diagrams). It offers a detailed view of how the system envisaged in the use case view will be implemented. The basic element in this view is the class, which includes an outline of its attributes and operations. This directly corresponds to a class created in your chosen implementation language. From the logical view, skeletal code can be generated for implementation into a computer language. More recent versions of Rational Rose not only can generate skeletal code for Visual C++, Visual Java, or Visual BASIC, but also reverse engineer programs created in these languages into Rational Rose models. This allows existing components to be included in documented models, if there is access to the source code. In addition, changes that need to be made during implementation can be reflected in the documentation of the design model. Component View The component view is a step up from the logical view and contains diagrams used in system design(component diagrams). This includes information about the code libraries, executable programs, runtime libraries, and other software components that comprise the completed systems. Components can be pre-existing; for example, a Windows program in Visual C++ will utilize Microsoft Foundation Class to provide the framework for the Windows interface. Components that do not exist and need to be created by the developers will have to be designed in the logical view. Deployment View The deployment view illustrates how the completed system will be physically deployed. This view is necessary for complex applications in which a system will have different components located on different machines. For example, interface components may be located on a user machine while other components may be located on a network server. INTRODUCTION TO VISUAL BASIC Visual Basic (VB) is an event driven programming language and associated development environment from Microsoft for its COM programming model. Visual Basic was derived from BASIC and enables the rapid application development(RAD) of graphical user interface(GUI) applications, access to databases using DAO, RDO, or ADO, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. LANGUAGE BASICS: Visual Basic was designed to be easy to learn and use. The language not only allows programmers to create simple GUI applications, but can also develop fairly complex applications as well. Programming in VB is a combination of visually arranging components or controls on a form, specifying attributes and actions of those components, and writing additional lines of code for more functionality. Since default attributes and actions are defined for the components, a simple program can be created without the programmer having to write many lines of code. Performance problems were experienced by earlier versions, but with faster computers and native code compilation this has become less of an issue. Forms are created using drag and drop techniques. A tool is used to place controls (e. g. , text boxes, buttons, etc. ) on the form (window). Controls have attributes and event handlers associated with them. Default values are provided when the control is created, but may be changed by the programmer. Many attribute values can be modified during run time based on user actions or changes in the environment, providing a dynamic application. For example, code can be inserted into the form resize event handler to reposition a control so that it remains centered on the form, expands to fill up the form, etc. By inserting code into the event handler for a keypress in a text box, the program can automatically translate the case of the text being entered, or even prevent certain characters from being inserted. Unlike many other programming languages, Visual Basic is generally not case sensitive, although it will transform keywords into a standard case configuration and force the case of variable names to conform to the case of the entry within the symbol table entry. String comparisons are case sensitive by the default, but can be made case insensitive if so desired. The Visual Basic compiler is shared with other Visual Studio languages(C, C++), but restrictions in the IDE do not allow the creation of some targets (Windows model DLL’s) and threading models. Result: Thus the UML diagrams and introduction to Visual Basic was studied. PASSPORT AUTOMATION SYSTEM Ex. No: 2. a Date: Aim: To Study the software requirements specification for passport automation system. Problem Statement Passport Automation System is used in the effective dispatch of passport to all of the applicants. This system adopts a comprehensive approach to minimize the manual work and schedule resources, time in a cogent manner. The core of the system is to get the online registration form (with details such as name, address etc. ,)   filled by the applicant whose testament is verified for its genuineness by the Passport Automation System with respect to the already existing information in the database. This forms the first and foremost step in the processing of passport application. After the first round of verification done by the system, the information is in turn forwarded to the regional administrator's (Ministry of External Affairs) office. The application is then processed manually based on the report given by the system, and any forfeiting identified can make the applicant liable to penalty as per the law. The system also provides the applicant the list of available dates for appointment to ‘document verification' in the administrator's office, from which they can select one. The system forwards the necessary details to the police for its separate verification whose report is then presented to the administrator. The administrator will be provided with an option to display the current status of application to the applicant, which they can view in their online interface. After all the necessary criteria has been met, the original information is added to the database and the passport is sent to the applicant. Software Requirements Specification 1. 0 Introduction Passport Automation System is an interface between the Applicant and the Authority responsible for the Issue of Passport. It aims at improving the efficiency in the Issue of Passport and reduce the complexities involved in it to the maximum possible extent. 1. 1 Purpose If the entire process of ‘Issue of Passport' is done in a manual manner then it would take several months for the passport to reach the applicant. Considering the fact that the number of applicants for passport is increasing every year, an Automated System becomes essential to meet the demand. So this system uses several programming and database techniques to elucidate the work involved in this process. As this is a matter of National Security, the system has been carefully verified and validated in order to satisfy it. 1. 2 Scope †¢ The System provides an online interface to the user where they can fill in their personal details and submit the necessary documents (may be by scanning). The authority concerned with the issue of passport can use this system to reduce his workload and process the application in a speedy manner. †¢ Provide a communication platform between the applicant and the administrator. †¢ Transfer of data between the Passport Issuing Authority and the Local Police for verification of applicant's information. †¢ Users/Applicants will come to know their status of application and the date in which they must subject themselves for manual document verification. 1. Definitions, Acronyms and the Abbreviations  Ã‚  Ã‚     Ã‚  Ã‚   †¢ Administrator – Refers to the super user who is the Central Authority who has been vested with the privilege to manage the entire system. It can be any higher official in the Regional Passport Office of Ministry of External Affairs. †¢ Applicant – One who wishes to obtain the Passport. †¢ PAS – Refers to this Passport Automation System. †¢ HTML – Markup Language used for creating web pages. †¢ J2EE – Java 2 Enterprise Edition is a programming platform and it is the partof the java platform for developing and running distributed java applications. HTTP – Hyper Text Transfer Protocol. †¢ TCP/IP – Transmission Control Protocol/Internet Protocol is the communication protocol used to connect hosts on the Internet. 1. 4 References IEEE Software Requirement Specification format. 1. 5 Technologies to be used †¢ HTML†¢ JSP†¢ Javascript †¢ Java†¢ XML†¢ AJAX 1. 6 Tools to be Used †¢ Eclipse IDE ( Integrated Development Enivronment) †¢ Rational Rose tool ( for developing UML Patterns) 1. 7 Overview SRS includes two sections overall description and specific requirements – Overall description will describe major role of the system components and inter-connections. Specific requirements will describe roles & functions of the actors. 2. 0 Overall Description 2. 1 Product Perspective The PAS acts as an interface between the ‘applicant' and the ‘administrator'. This system tries to make the interface as simple as possible and at the same time not risking the security of data stored in. This minimizes the time duration in which the user receives the passport. 2. 2 Software Interface †¢ Front End Client – The applicant and Administrator online interface is built using JSP and HTML. The Administrators's local interface is built using Java. †¢ Web Server – Glassfish application server(Oracle Corporation). Back End – Oracle database. 2. 3 Hardware Interface The server is directly connected to the client systems. The client systems have access to the database in the server. 2. 4 System Functions †¢ Secure Registration of information by the Applicants. †¢ Schedule the applicants an appointment for manu al verification of original documents. †¢ Panel for Passport Application Status Display by the Administrator. †¢ SMS and Mail updates to the applicants by the administrator. †¢ Administrator can generate reports from the information and is the only authorized personnel to add the eligible application information to the database. . 5 User Characteristics †¢ Applicant – They are the people who desires to obtain the passport and submit the information to the database. †¢ Administrator – He has the certain privileges to add the passport status and to approve the issue of passport. He may contain a group of persons under him to verify   Ã‚  Ã‚     Ã‚  Ã‚     Ã‚  Ã‚   the documents and give suggestion whether or not to approve the dispatch of passport. †¢ Police – He is the person who upon receiving intimation from the PAS, perform a personal verification of the applicant and see if he has any criminal case against him before or at present. He has been vetoed with the power to decline an application by suggesting it to the Administrator if he finds any discrepancy with the applicant. He communicates via this PAS. 2. 6   Constraints †¢ The applicants require a computer to submit their information. †¢ Although the security is given high importance, there is always a chance of intrusion in the web world which requires constant monitoring. †¢ The user has to be careful while submitting the information. Much care is required. 2. 7 Use Case Model Description The usecase model is a representation of the interaction between the users and the system. It captures the goals of the users and the responsibility of the system to the users. It is a special flow of events through the system. Grouping of usecases can manages the complexities and reduce the number of usecases in the package. The usecase model describes the uses of the system and show the courses of events that can be performed. A usecase is an interaction between user and system; it captures the goals of the user and the responsibility of the system to its users. It defines what happens in the system when the usecase is performed. 2. 8   Assumptions and Dependencies The Applicants and Administrator must have basic knowledge of computers and English Language. †¢ The applicants may be required to scan the documents and send. Result: Thus the software requirements specification for passport automation system was studied. Gantt Chart for Passport Automation System Ex No : 2. b Date: Aim: To develop a risk management and project plan for passport automation system using Gantt Chart. Introduction: A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt charts illustrate the start and finish dates of the terminal elements and summary elements of a project. Terminal elements and summary elements comprise the work breakdown structure of the project. Some Gantt charts also show the dependency (i. e. , precedence network) relationships between activities. Gantt charts can be used to show current schedule status using percent-complete shadings and a vertical â€Å"TODAY† line as shown here. [pic] Passport Automation System For the project, the activities considered are: 1. Requirement Analysis 2. Literature Survey and Specification 3. Preliminary Design 4. Detailed Design 5. Testing 6. Operation and Maintenance [pic] Result: Thus the risk management and project plan for passport automation system was designed using Gantt Chart. EX. NO:2 c DATE: PASSPORT AUTOMATION SYSTEM AIM: To analyze and design a system for Passport Automation using Rational Rose tool. 1. PROBLEM STATEMENT To create a software system for the applicant(s), applying for the passport by verifying the information provided by them. 2. OVERALL DESCRIPTION The modules are for 1. Applicant Applicant has to provide the information like Name, Gender, Age, Qualification, Parents’ Name, Communication address, Phone no, etc. Also, they need to provide the DD details. . Passport Issuing Authority This system will verify the details provided by the applicant. And check whether the applicant is provided with passport or not. The details of the applicant are stored in the Database. 3. Database This will store the details of the applicant for future reference. 2. 1 SOFTWARE REQURIEMENTS 1. Rational Rose 2. 2 HARDWARE REQURIMENTS 1. 128MB RAM 2. Pentium III Processor 3. DESIGN 1. USE CASE DIAGRAM [pic] 3. 2 CLASS DIAGRAM [pic] 3. 2 SEQUENCE DIAGRAM [pic] 3. 3 COLLABORATION DIAGRAM [pic] 3. 4 COMPONENET DIAGRAM [pic] JAVA CODING: Database. java ublic class database { private int applicantDetails; public database() { } public void storeTheDetails() { } public void issueDetailsToAuthortiy() { } } Applicant. java public class APPLICANT { private int firstName; private int surname; private int Sex; private int DOB; private int placeOfBirth; private int district; private int qualification; private int height; private int weight; private int presnetAddress; private int permanentAddress; private int fathersName; private int mothersName; private int emailId; private int phoneNumber; private int DDNO; private int DDDATE; ublic passportIssueAuthority thePassportIssueAuthority; } public APPLICANT() { } PassportIssueAuthority. java public class passportIssueAuthority { private int authorityName; private int authorityId; private int work Place; public APPLICANT theAPPLICANT; public database theDatabase; public passportIssueAuthority() {} public void issuePassport() { } public void verify() { } public void cancellation() { } } RESULT: Thus the UML diagrams for Passport Automation System was analyzed and designed using Rational Rose. EXNO:3 DATE:BOOK BANK 1. OBJECTIVE: a. To implement book bank system online. . To provide the students with the information on books and scheduled times of book rental available. c. To ensure validity and security in the online book bank management system. 2. SCOPE OF THE PROJECT: The book bank system project is a software tool created to help and access the students gather required information about the various books in the institution the project is web based interactive application. Focus is laid solely on the book display,schedule,categories,syllabus and payment as per required. 3. PROJECT DESCRIPTION: USER PERSONAL AND CHARACTERISTICS: The target client for our software are students who lively are interested in rental of books be it either from engineering or medical genre in the institution. They can log into our website and browse the courses which they have aspiration to study. The student must register themselves online,which is free. The booking or reservation of the books is online,the detailed description about their book package and necessary terms and condition norms would be emailed to the students registered email address which he/she may provide during the time of registration. PRODUCT PERSPECTIVE: This product requires a web browser which is capable of playing flash media. †¢ This program will not be dependent on any other software and is not a component of another program. †¢ This program does not require any new hardware. 4. REQUIREMENTS: (a). FUNCTIONAL REQUIREMENTS: A functional requirement defines a function of a software system on its component. A function is described as a set of inout ,the behaviour and output. i. A main menu including a brief help section. ii. Login iii. Viewing book details. iv. Displaying details. v. Maintain and update book details. vi. Logout. . REQUIREMENTS: The system should have the requirements of the project. The developer should prepare the requirements of the project. The should prepare the requirements which are need for the software. 2. ANALYSIS: Analyze the requirements whether it provides proper operations/output and performs the task. 3. DESIGN: Project manager should design the layout of the project before going to implement time allocation,cost allocation and staff allocation wil coming under design process. 4. IMPLEMENTATION: After encomposing all the diagrams,we have to generate code for each and every diagrams i. from usecase to deployment. 5. TESTING: Afteer implementing the diagram with domain language,we have to test the particular projects. 6. MAINTAINENCE: The system should be easily updated. The system should utilize t he interchangeable plugins software developed should maintain the cost and time schedule of the project. (b). NON- FUNCTIONAL REQUIREMENTS: Nonfunctional requirements define the needs in terms if performance, logical database requirements, design constraints, standard compliance, reliability, availability, security, maintainability and portability. i. PERFORMANCE REQUIREMENTS: Performance requirements define acceptable response times for system functionality. †¢ The total time for user interface screens will take no longer than two seconds. †¢ The login information shall be verified within the seconds. †¢ Queries shall results within five seconds. ii. DESIGN CONSTRAINTS: The software shall be a standard system running in a windows environment. The system shall be developed using rational enterprise suite and oracle 10i database. iii. RELIABILITY: Specify the factors required to establish the required reliability of the software system at time of delivery. iv. AVAILABILITY: The system should have an availability of 99. 99%. v. PORTABILITY: †¢ The system should be extremely via the usb drive. †¢ The system shall be easy to migrate or backed up via another use drive. vi. MAINTAINABILITY: †¢ The system shall utilize interchangeable plugins. †¢ The system shall be easily updateable for fixes and patches. (c). HARDWERE REQUIREMENTS: |1. |Processor |- |Intel Pentium IV-2. 0 GHZ. | |2. |Hardware |- |40 GB. | |3. |RAM |- |512mb | |4. |DVD RAM |- |1 nos. | | | | |(d). SOFTWARE REQUIREMENTS: | | | |1. |OS |- |Windows XP/vista. | |2. |Front end Tool |- |Rational Rose Enterprise suite. | |3. |Back end Tool |- |MSAccess | | | | | |5. MODULE DISCRIPTION: | | | In this project we have defined different modules to enable the Book Bank system in successful manner. i. REGISTER: The register module contains the application form or registration form which contains following details. †¢ Name, Address, Contact number, E-mail id, Password etc. ii. LOGIN: The Login module contains the form which contain membership name and member password. It includes Username and Password. iii. SEARCH BOOK: The search book module contain list of books, from this list we search for the book which we need. This also contains another field called as categories where can select the category of the book. iv. DISPLAY DETAILS: Display the details about the students particulars, the payments, the books, rental and schedule times for books etc. v. MAINTAIN BOOK DETAILS: The administrator maintains the details of books. vi. LOGOUT: To sign off from the webpage or your account log off. 6. DOMAIN MODEL: A domain model is a visual representation of conceptual classes or real situations object in a domain. In object oriented analysis, the domain model is the most important. †¢ It illustrates the concept in the domain. †¢ It act as a source of inspiration for designing some software objects. 7. PARTIAL LAYERED ARCHITECTURE: Sequence diagram is an interaction overview diagram. It provides a big picture overview of how a set of interaction are related in terms of logic and process flow. This P artial layer architecture shows the interface of the sequence diagram, here the administrator shows the interface by displaying actor symbol. 8. LOGICAL ARCHITECTURE: The Logical architecture is large scale organization of software class into packages, sub system layer, It is called logical architecture because there is no direction about how these elements are display on different operating system. 9. RISK ACTIVITY: †¢ Personal short falls. †¢ Unrealistic schedules and budgets. †¢ Developing the wrong functions and programs. †¢ Developing the wrong user interface. †¢ Continuing stream of requirements changes. †¢ Short falls in externally furnished component. †¢ Real time performance short falls. †¢ Straining computer science capabilities. RISK ASSESSMENT: Figure out what the risks are and what to focus on. †¢ Making a list of all of the potential dangers that will affect the project. †¢ Assessing the probability of occurrence and potential ross of each item listed. RISK CONTROL: †¢ Monitoring the effectiveness of the strategies and the changing levels of risk throughout the project. †¢ T echniques and strategies to migrate the highest ordered risks. 10. GANTT CHART: It describes the time schedule for the planning to complete the corresponding and after completion of core product, what the time is taken for the project action of core product. 11. POST- FUNCTION AND PRE-FUNCTION: MODULE: Registering PRE-FUNCTION: †¢ Login to the website. †¢ Collection the required documents to be submitted for registration. POST-FUNCTION: †¢ Verification of documents submitted. †¢ Conformation email sent accessing that authentication can be prevailed for the individual. MODULE: Display book details PRE-FUNCTION: Analyze the course of semester of logger. POST-FUNCTION: Display the required book details. 12. UML PACKAGE DIAGRAM: A package diagram provides a way to group element. Here we have grouped the 6 main elements of software project grouped the in order register, login, search book. It goes to update and sales record. A package name may be based on tab if the package shows the member of main package. 13. TECHNICAL SERVICES LAYER: Technical service layer describes the relationship between different actors, components of the software process for any admin seek the registration for new visitor. So that the new visitor can login the website and search for book and if need can buy it. 14. DOMAIN SERVICES LAYER: After technical services layer from partial layered architecture, we are going to generate the coding in java or VB the project domain is now finalized in JAVA/VB. 15. USER INTERFACE LAYER: . ADMIN: The administrator is used to register a new visitor for the website. Admin can keep those records update. Admin keep sales record i. e. , now much book is downloaded and how much book is buyed newly with copy write etc. ii. REGISTERED USER: Registered user can search the book whatever needs and can read the book in online. If user is satisfied with this book, can d ownload the book but after payment. iii. VISITOR: The visitor can register the application form and become a member of the website. The visitor can search books and read the boook but he must register to buy or download the book. UML USECASE DIAGRAM: Uml provides use case diagram notation to iilustrate the names of use case and author relationship between them. Use case diagram and case relationship are secondary in use case work use case text document. UML CLASS DIAGRAM: The Uml class diagram is to illustrate class interfaces as their actions. They are used for static object modeling, we have already introduced and used their uml diagram while domain modeling. UML SEQUENCE DIAGRAM: A sequence diagram illustrate a kind of format in which each object interact via message. It is generalize between two or more specialized diagram. PARTIAL LAYER ARCHITECTURE DIAGRAM: Sequence diagram is an interaction overview diagram. It provides a big picture overview of how a set of interaction are related in terms of logic and process flow. This Partial layer architecture shows the interface of the sequence diagram, here the administrator shows the interface by displaying actor symbol UML COLLABRATION DIAGRAM: COLLABRATION diagram illustrate that object interact on a graph or network format in which object can be placed where the diagram. In collaboration diagram the object can be placed in anywhere on the diagram. The collaboration comes from sequence diagram. UML STATE CHART DIAGRAM: A Uml state machine represents the interaction events and states of an object and behavior of an object in reaction to an event.. Transaction shown as allows labeled with their event. It is included with initial pseudo state and fins end state UML ACTIVITY DIAGRAM: A Uml activity diagram shows sequential and parallel activates in a process, work flows, data flows and compiler algorithm. UML COMPONENT DIAGRAM: Components are slightly fuzzy concept in this Uml, because both class and components can be used to model the something. UML DEPLOYEMENT DIAGRAM: Deployment diagram shows the assignment of concrete software artifact to computational nodes. It shows the deployment of software elements to the physical elements. Deployment diagram are useful to communicate or deployment architecture. IMPLEMENTATION: After the completion of UML diagrams for BOOK BANK SYSTEM we should generate the code. Select the tools option from main menu then select the sub option program module in which we are going to generate the code in JAVA/VB/J2EE. Then go ahead and select the generate code option as a result of code generation. TESTING: To perform the testing for the generated code again select the tools option from menu bar and choose quality architecture option a sub window gets opened. We are going to perform Unit Test and Scenario testing for our project. So, select these testing option one by one and testing activity is carried out for all the coding and testing is carried out. CONCLUSION: Thus the project for BOOK BANK SYSTEM has been successfully executed and codes are generated. STOCK MAINTENANCE SYSTEM Ex. No: 4 Date: AIM: To analyze and design a system for Stock Maintenance System using Rational Rose tool. Problem Statement: INVENTORY SYSTEM is a real time application used in the merchant’s day to day system. This is a database to store the transaction that takes places between the Manufacturer, Dealer and the Shop Keeper that includes stock inward and stock outward with reference to the dealer. Here we assume our self as the Dealer and proceed with the transaction as follows: The Manufacturer is the producer of the items and it contains the necessary information of the item such as price per item, Date of manufacture, best before use, Number of Item available and their Company Address. The Dealer is the secondary source of an Item and he purchases Item from the manufacturer by requesting the required Item with its corresponding Company Name and the Number of Items required. The Dealer is only responsible for distribution of the Item to the Retailers in the Town or City. The Shop Keeper or Retailer is the one who is prime source for selling items in the market. The customers get Item from the Shop Keeper and not directly from the Manufacturer or the Dealer. The Stock is the database used in our System which records all transactions that takes place between the Manufacturer and the Dealer and the Dealer and the Retailer. USE CASE DIAGRAM : [pic] ACTIVITY DIAGRAM : [pic] SEQUENCE DIAGRAM : [pic] COLLABORATION DIAGRAM : [pic] COMPONENT DIAGRAM : [pic] CLASS DIAGRAM : [pic] DEPLOYMENT DIAGRAM : [pic] Javacoding: Manufacturer. java public class manufacturer { private int manufacturername; private int companyname; private int dateofmanufactured; private int addres; private int contactno; private int name; public dealer theDealer; public manufacturer() { } public void purchase() { } public void sales() { } } Dealer. java public class dealer { private int dealername; private int dateofitemsreceived; private int address; private int contactnumber; rivate int price; private int noofitemsordered; private int noofitemssold; public manufacturer theManufacturer; public shopkeeper theShopkeeper; public dealer() { } public void purchase() { } public void sales() { } public void showstockdetails() { } } Shopkeeper. java public class shopkeeper { private int shopkeepername; private int address; private int contactnum ber; private int price; private int numberofitemsordered; public dealer theDealer; public shopkeeper() { } public void purchase() { } public void sales() { } } RESULT: Thus the UML diagrams for Stock Maintenance was analyzed and designed using Rational Rose. Ex No: 5 Date: ONLINE COURSE REGISTRATION SYSTEM AIM: To create a system through which students can register to the courses desired by them, using Rational Rose tool. Problem statement ? The system is built to be used by students and managed by an administrator. ? The student and employee have to login to the system before any processing can be done. ? The student can see the courses available to him and register to the course he wants. ? The administrator can maintain the course details and view all the students who have registered to any course. System requirements Rational Rose Software Use-case diagram The course registration system has the following use-cases Login View course details Registration Display details Maintain course details Logout The actors involved in the system are 1. Student 2. Administrator Use-case name: Login The user enters the username and password and chooses if the user is student or administrator. If entered details are valid, the user’s account becomes available. If it is invalid, an appropriate message is displayed to the user. Use-case name: View course details In this use case, a student can search all the courses available to him and choose the best course he wants. The student can view the course duration, faculty and department of the courses he may choose. Use-case name: Registration When a student has successfully chosen a course, he can register to that course. Upon registration, the student’s details are stored in the database. Use-case name: Display details After registration to any course, the student may see the details of his current course. He may wish to know details about fees and other information. The administrator also has the privilege to display details of the the students and the corresponding course for which they have registered. Use-case name: Maintain course details The administrator has to perform the duties of maintaining the course details. Any change to the course structure is maintained by the administrator. Use-case name: Logout After all the desired transactions are made, the user may choose to logout from the system to save all he changes they have made. Use-case diagram for course registration system [pic] Class diagram The class diagram is a graphical representation of all the classes used in the system and their operations, attributes and relationships. The course registration system makes use of the following classes: . Stud(student details) 2. Administrator 1) Stud It consists of the details of all the students present in the database. The attributes present in this class are student id, password, name, age, sex, course and attendance. The object of this class is created as soon as the student registers to a course. The operations available to this class are login (), logout (), confirmation () , register (), and view course details (). 2) Administrator It consists of details of all the courses available to the student. The attributes present in this class are username, password, course fees, fees due, marks, and attendance. The operations available to this class are login (), logout (), ma course details (), display course (), and confirmation (). Class diagram for course registration system [pic] Sequence diagram Sequence and collaboration diagram for login to the system [pic] [pic] Sequence and collabaration diagram for logout [pic] [pic] Sequence and collabaration diagram for registration to a course [pic] [pic] ACTIVITY DIAGRAM : [pic] JAVA CODE: Public class stud { Private int sid; Private string passwd; Private int age; Private int sex; Public admin; Public stud() { } Public void logout() { } Public void confirm() { } RESULT: Thus the Online course registration system was designed and analyzed using Rational Rose. Ex No: 6 Date: ONLINE TICKET RESERVATION SYSTEM (E – Ticket) AIM: To analyze and design a system for Online Ticket Reservation System (E – Ticket) using Rational Rose tool. 1. PROBLEM STATEMENT To book a ticket for a user online ticket reservation system software and to confirm the ticket booking, making the payment, printing the tickets has to designed using Rational Rose tool. . OVERALL DESCRIPTION 1. LOGIN †¢ Before entering the system, users have to login †¢ Get the username and password from existing users. †¢ Give new users the option to sign up. 2. AVAILABILITY †¢ Get the source and destination. †¢ Provide a dropdown box for the date. †¢ Check availability of tickets. 3. RESCHEDULE †¢ If tickets are available, get the number of passengers. †¢ Get the name and age of all passengers. †¢ If tickets are not available, reschedule. 4. PAYMENT DETAILS †¢ Print the cost of the tickets. †¢ Get the payment details from the user. †¢ Confirm the details and the ticket. Display confirmed ticket to the user. USECASE DIAGRAM [pic] ACTIVITY DIAGRAM [pic] CLASS DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] STATE CHART DIAGRAM [pic] COMPONENT DIAGRAM [pic] DEPLOYMENT DIAGRAM [pic] Javacoding: Customerdetails. java public class customerdetails { private int name; private int address; private int email; private int age; public booking theBooking; public customerdetails() { } public void book() { } } Booking. java public class booking { private int booking_no; private int date; private int total; private int status; private int name; public payment thePayment; ublic booking() { } public void pay() { } } Payment. java public class payment { private in t date; private int amount; public payment() { } } RESULT: Thus the Online Ticket Reservation System have been designed and verified using Rational Rose Tool. Ex No:7 Date: SOFTWARE PERSONNEL MANAGEMENT SYSTEM AIM: To analyze and design a system for Software Personnel Management System using Rational Rose tool. 2. PROBLEM STATEMENT To compute the gross pay of a person using the software personnel management system software and to add new details to the existing database and update it, using Rational Rose tool. . OVERALL DESCRIPTION The three modules are 1. Login The employee details has to be entered and if needed the details can be edited. 2. Pay slip It contains details such as employee id, employee name, department, experience, and basic pay. 3. View Updated database would be present. The details of the employee can be used for further reference. 2. 1 SOFTWARE REQURIEMENTS: 1. Rational Rose 2. 2 HARDWARE REQURIMENTS: 4. 128MB RAM 5. Pentium III Processor 3. DESIGN USECASE DIAGRAM [pic] CLASS DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] ACTIVITY DIAGRAM [pic] JAVA CODING: PAYROLLLOGIN. JAVA public class payrolllogin { private int enterdetails; private int editdetails; public payslip thePayslip; public viewdetails theViewdetails; public payrolllogin() { } public void exit() { } } VIEWDETAILS. JAVA public class viewdetails { private int eid; private int ename; private int dept; private int exp; private int basicpay; private int hra; private int da; private int bpf; private int gpay; public viewdetails() { }

Monday, July 29, 2019

Shanghai Architecture Term Paper Example | Topics and Well Written Essays - 2500 words

Shanghai Architecture - Term Paper Example The economic history of the city signifies that Shanghai is an economic hub that is capable of transforming China into a developed state. Historical context Humans started settling in Shanghai 6000BC when they were attracted by the waters surrounding the city. The population formed a village that specialized in fishing. The Tang Dynasty developed the village into a town in 751 AD, when the empire marked its tenth year of ruling in China. The empire created a district that was known as the Song Jiang. This attracted higher settlement and fishing, and the village developed into a town. The town developed further under the leadership of the Northern Song Dynasty in 951AD (Warr, 2007). The Southern Song Empire later created Shanghai town as an official city because of the expansion of the population and fishing. This empire opened the port of Shanghai that would be used by ships that transported cargo to various regions. Ships transporting goods to and from Korea and within China used th e port to load and offload cargo. The transformation of the city into a port attracted business persons who settled near the harbor. The investors settled in the town to carry out their businesses with ease. The population that settled in Shanghai formulated new economic activities such as the production of cotton and textiles. Business persons made textiles using the cotton that was grown in the town. The production of textiles and farming of cotton led to the formation of a national cotton textile center. The Ming Dynasty created the center to facilitate the international trade of the goods. The center attracted the formation of administrative units that maintained peace in the region (Thubron, 2007). The cotton and textile business grew nationally and internationally. The goods were sold to international markets such as the European Union and America. The export of textiles led to further development and settlement in the town. In 1911 when the Qing Dynasty was in its last year o f ruling, Shanghai had developed into a powerful economic haven. The population of the city had grown to two hundred thousand, and the town had become a central harbor for ships transporting goods internationally (Mann, 2012). The population of the town had reached three and a half million by 1934. The population consisted of nationalities from other countries such as Britain, France, Japan, Italy, and Russia among others. Shanghai was named the fifth largest financial hub after London, Berlin, New York, and Tokyo (Warr, 2007). The growth of Shanghai continues to grow up to today when the city produces fifty five billion dollars worth of Gross Domestic Product in China. Narration of the Colonial Empire The beginning of the nineteenth century attracted mass immigration in Shanghai because of its economic past. British, Europeans, and Americans settled in the city, and each of these groups had various intentions of settling in the town. The British were the first to settle in Shanghai after defeating China in the opium war. The war arose because the Qing emperor of China opposed the importation of opium in the county (Warr, 2007). The British won in the war, and the importation of the drug from India continued; the export of silk and porcelain in Britain also continued. The trade of the goods, however, continued after the signing of the Nanking treaty. British missionaries settled along the Yangtze River after the signing of the treaty, and they formed colonies in the Shanghai. The

Sunday, July 28, 2019

Business continuity, backup and disaster recovery plan Research Paper

Business continuity, backup and disaster recovery plan - Research Paper Example The purpose of this research paper is to define what this plan is, analyze its components and effectively see its overall success and limitations. Business Continuity is a planning process that provides a framework to ensure survival of a business at any presenting risk. It insures the future of the business with respect to key customers, business reputation and suppliers. (Bell. J., June 2000). The components of the business continuity life cycle include; Analysis, Solution design, Implementation, Testing & acceptance and Maintenance. Business continuity plans need to be clear and concise. They should clarify all the protocol and procedures to be followed in the event of a disaster. It should be part and parcel of any business. (Harney, J., 2004). We will consider the above five steps in coming up with an effective business continuity plan. Analysis Here, we formulate a list of potential vulnerabilities within the business. That is, whether risk pose within the resource department, or systems, processes, or suppliers. Therefore, it implies a consideration of each department separately. We analyze the overall performance of each department with regards to its input in the business. ... Business-driven risks include application outages, or surplus from marketing demand-generation campaigns. They may cause business-wide ramifications that result in breaches in compliance, governance, availability, security and performance. (IBM Global, June 2011). If left unattended, they may cause concern to the top management and stakeholders. Data-driven risks focus on a wide range of factors such as disk failure, corruption, viruses or exponential data growth. This impacts negatively on the business. Event-driven risks disrupt the company’s personnel, processes, applications and infrastructure. They present as power outages, natural disasters, pandemics, fires, and thefts. (IBM Global, June 2011) Solution design Once we have identified potential risks after a rigorous analytical method. Then we strategize on the solution design process. (Dimattia, S., November 15, 2000). We customize the solution to the risks. A robust resilience solution for business-driven risks goes bey ond simply restoring the business IT infrastructure, to keeping the business continuously operating and easing management of compliance with industry regulations. It calls for the provision of virtually anytime, anywhere accessibility to approved users. To protect against data-driven risks, the business solution will focus on a delivery of an efficient backup and quick retrieval of critical data and information. It requires an indexing method with efficient search capabilities. The data also needs to be managed continuously and kept safe from viruses, thefts and other forms of loss. To mitigate the Event-driven risks, the business must be able to distribute operations beyond the area of immediate impact. (IBM Global, June 2011). This implies business

Saturday, July 27, 2019

Expeditionary Fighting Vehicle Research Paper Example | Topics and Well Written Essays - 1500 words

Expeditionary Fighting Vehicle - Research Paper Example This essay discusses the Expeditionary Fighting Vehicle, that is aimed for two main functions. First, transport a Marine Corps Rifle Squad from the sea to the shore and second - to provide armor operational capabilities on land. The assault vehicles are transported in ships and can be launched beyond the visual horizon. The visual horizon is the visible limit to detect presence of ships at sea from the shore line. This distance is translated as 25 kilometers as per the planning and development of the program. The supporters of this program argue and justify the flexibility that the assault vehicles provide to the Marines. The over the horizon launch capability provides protection to the amphibious ships till 25 kilometers from the shore. Furthermore, once deployed the vehicles have enough speed to make enemy tracking and defensive measures in the sea difficult. The time to reach the shore has also been shortened. The researcher then concluds that Expeditionary Fighting Vehicle was an ambitious program that provided lethal capabilities and its design matured over years. The program, however, could not prove its reliability and did not come up to the desired standards of the Marine Corps. The in service Amphibious Assault Vehicle has gone through various life extension programs and upgraded over time to meet operational requirement. The termination of the program was a serious setback to the Marine Corps and its replacement must provide with upgraded hardware to cope with the evolving Marine Corps strategy and doctrines.

Friday, July 26, 2019

Organizational profile Essay Example | Topics and Well Written Essays - 500 words

Organizational profile - Essay Example The Congress’ purpose behind the organization of FEMA is to work systematically by providing needed help to state and local governments in fulfilling their responsibilities toward the communities in distress. FEMA helps in making comprehensive disaster management plans. Different government agencies vide Executive Order 12127 were merged by the then President, Jimmy Carter in 1979 to perform different disaster management functions. The agencies absorbed in FEMA included the Federal Insurance Administration, the National Fire Prevention and Control Administration, the National Weather Service Community Preparedness Program, the Federal Preparedness Agency of the General Services Administration, the Federal Disaster Assistance Administration activities from HUD, and Civil defence responsibilities were also shifted to the new agency from the Defence Departments Defence Civil Preparedness Agency (FEMA, 2013). FEMA Corps, yet another partnership between FEMA and the Corporation for National and Community Service (CNCS) was formed on March 13, 2012 by the White House with FEMA dedicated staff strength of 1,600 corps members within AmeriCorps National Civilian Community Corps (NCCC), singularly for disaster readiness, action, and loss recovery (FEMA, 2013). The social initiative of this partnership is to boost the government’s disaster management calibre, heighten the dependability and variance of the disaster workforce, encourage the morality of service, widen education and economic uplifting of the adult population, and attain major cost-efficiencies for the American tax-payer. This program at its total functionality in an average disaster year provides a tax-saving of nearly $60 million a year (FEMA, 2013). When it comes to moral or ethical effects of FEMA’s social initiatives, the workforce focuses more on vulnerable communities – the poor and the marginalized who are at a greater risk

Project Management Essay Example | Topics and Well Written Essays - 2500 words - 13

Project Management - Essay Example Despite a few known cases of successful project development and implementation, it is widely accepted in the industry that a number of unacceptable projects fail, especially in the IT/IS sector. According to Lyytinen and Hirschheim (1987), the estimated number of project failures is half of all the systems implemented. Galloway and Whyte (1989) concurred with the survey of project failures. Whyte and Bytheway (1996) further argued that more projects fail than succeed. Bozman (1994) claims that project failures are common in every parts of the world – it is an international phenomenon. Industries view project failures as either a pathological state to be avoided or a logical problem of goal definition (Lindahl & Rehn, 2007).This paper will focus on the different key factors that influence the failure of projects especially on the field of information technology (IT). It will discuss the different stages in the project lifecycle and the possible areas of failures in each stage. Furthermore, the paper will tackle the concept of risk management and its benefits in a successful project development as well as in preventing failures. A successful risk management system incorporated in a project will create a programme for handling probable causes of project failures.IT projects fail when it does not meet one or more of its criteria for success. The criteria for successful IT projects are delivery on time, completion on or under budget, and satisfaction of user requirements.

Thursday, July 25, 2019

Freudian Defense Mechanisms Essay Example | Topics and Well Written Essays - 750 words

Freudian Defense Mechanisms - Essay Example She visited about five doctors and after the doctors all gave the same diagnosis she still waited five months before beginning the chemotherapy. This was an obvious case of denial as a disadvantage to the individual. An earlier intervention may have resulted in her experiencing a better life during her cancer situation. Isolation implies using an objective point of view. It refers to the removal of all feelings from a situation that may be unnaturally difficult or a memory that may cause pain. For example, a close friend of mine recently lost her mother. During the funeral she was fine until her old aunt came to remind her about something her mother had previously done. That was the trigger she needed I thought but she released some uninhibited tears for a moment and returned to the ‘masked’ face. I believe that this was acceptable socially because she did unleash the waters in the privacy of her bedroom. So it was advantageous to her to an extent in that she saved face in front of her associates. It was also disadvantageous because that was a perfect opportunity to share some of the burden, the stress and the grief with someone. Repression is an attempt to force unwanted and unpleasant memories from one’s thoughts. However, these memories/feelings have a major influence on one’s future behavior. I generally use this strategy when I am involved in a fight with anyone of my significant others. This helps me to cope with their ‘immediate’ call for affection after a major disagreement. One case in particular occurred when one of my significant others called me ‘ugly’. I actually thought I had forgotten it but now that it has come back to my memory it explains my intense need to remain either plain Jane for certain short period of times and suddenly appear as a movie star to shock everyone out of their wits. This mechanism actually is not an advantage for me because I realize that

Wednesday, July 24, 2019

The interpretation of Islamic texts is entirely independent of Essay

The interpretation of Islamic texts is entirely independent of historical vicissitudes. Discuss - Essay Example Most of the interpretation of the Islamic texts is based on the historical changes and this is modified in order to suit a particular context whether present or past. It is in this perspective that I will be arguing against the perception that the interpretation of the Islamic texts is entirely independent of historical vicissitudes. The paper will be split into various categories in order to look analytically on the aspects that support my argument. The first section will be a history on Islam in the world. Thereafter I will discuss and argue against the aforementioned topic. This will be done in different contexts like looking at the gender in relation of the Islam; this will be looked at in relation of the treatment of women and men through the interpretation of the Islamic texts. Each concept will be looked at analytically with the support of relevant reading material and credited sources. The last section will be the conclusion of the paper and how each of the said point has bee n relevant during the research for this paper. Each argument will be argued first with me giving my own opinion about it then using the citation from relevant materials and concluding with my own opinion of the said topic. Each stage will have the relevant support references. Introduction to Islam The history of Islam has in most cases been associated with the sole existence of Islamic states and empires. Since the beginning Islam was existing; the spread of the religion was on a community—state basis. It was both a faith and a political order. Within years and centuries after the His death, Muhammad’s local Arabian polity did become a very huge empire going as far as North Africa to Southeast Asia. The advancement and development of Islam and institutions are always intertwined. Islam: The History In the 6th Century in the Arabia brought forward the rise of Islam. The Arabia was the source and congregation of many beliefs. Christianity and also the practice of Judaism was in the region although for the better part of the 6th Century C.E (Common Era) they were overwhelmed by the faction of the tribal deities that practices barbaric activities. Muhammad (pbuh), the Prophet of Islam was born in Mecca in 570 Common Era in what is referred to as Saudi Arabia. His family dealt in trade and by the time He was 25 he was employed by an old woman who was a widow with whom He later married. At 40, He began to experience visions and also auditory revelations, throughout His occasional meditation retreat in the caves. According to Islamic Social Services Association, the angel Gabriel revealed himself to Him and gave Him a book in which he was commanded to â€Å"Read†. In the beginning this revelation was being shared with His friends and family and with instances He congregated on a daily basis with the growing number of people and the meaning of Peace was shared. The message that Muhammad (pbuh) had for Peace was met with resistance thus it made Him run away to Medina. The event is called Hijrah (emigration). Eventually He returned to Mecca and died in 632 in Medina and He also did not leave any male heir. According to Endress (1987), The word Islam is an Arabic word meaning peace, greeting, allegiance loyalty and obedience to the Creator. According to Muslims, Allah chose Prophet

Tuesday, July 23, 2019

Qualifying Exam Practice Essay Example | Topics and Well Written Essays - 2500 words

Qualifying Exam Practice - Essay Example Recently, some certain theorists made focus upon the vast stands of the opposing paradigms in the ultimate pursuance of theoretical clarity in this matter of voter legislation. Nonetheless, it now appears as if it is a renewed matter in integrating and infusing social theories towards a more known and balanced paradigm (Bell, 1992). The article of voter legislation woes, does review some of these considerations that should be highlighted by the parliament, and hence encourage further inquiry and progression into the social theory models, especially as they link to the conflict in question, and its resolution application both locally and internationally. Moreover, certain key concepts would be proposed as a continuous step toward attaining this objective in the United States of America. The initial step relates to a theoretical widening of C. Wright’s concept of sociological imagination. The second step is postulated by George Ritzer’s interest in meta-theories and it ex plains the infusion of ideas from his Major levels of social analysis model. The last one concerns the exploration of new dimensions and entails the dynamics of the social cubism model by Sean (Bew, 1990). With the fall of communism and the Cold war geo[[political order, three interlinked tendencies surface namely, the growing disempowerment of ideologies based on modern rationality, the formation of a new transnational order with an integrated financial mechanism, standards and measures of production and consumption, and the relative fall of the centralized nation state, and modern territorial sovereignty. When viewed critically, all these had an effect on the current voter identification legislation issue of the United States of America. The rise of ethno political conflicts can be shaped by both indigenous aspects and global limitations. Levels of communal linkages shape such conflicts. For ethno political conflicts, both the relations and the international system that occur amon g the nations states must be taken into consideration. In the international system, the circulation of capital, ideologies, and the use of certain crucial powers affect the rise of conflict between and within states (Bell, 1992). The importance of micro-national problems state that structures brought ethno political conflict leading to micro and macro tensions and issues of stalemates. The state can be considered to be losing some aspects of its original power of a self-identity by itself, which is a common, and a self-governing legitimacy. Social and class identities, can be replaced in some scenarios with ethnic, religious, and affiliations having territorial origin. Moreover, the new identities try to portray self-determination, appreciate group definitions and norms, and bring about ethno territorial mobilization, ethno political issues, fragmenting of the state, and not forgetting regionalism around the globe. Globalization works to enforce these local certainties and relations hips in response to the economic identity created by the world markets in the transnational order (Bew, 1992). Nowadays, research on ethno territorial politics typically examines politics, and not forgetting economic structures, so as to emphasize the competing interests of groups, or tend to utilize a psychoanalytic method to emphasize the aspect of both cultural and psychological

Monday, July 22, 2019

Peace-Building and Community Development in Uganda Essay Example for Free

Peace-Building and Community Development in Uganda Essay Community development is a multi-faceted activity that has different ends. It also has different requirements depending on the needs of people inside the community. Development can be achieved through sustaining small and medium businesses, ensuring education for all, managing inclusion and diversity, keeping peace and order, and creating comprehensive disaster management. Through these, a community like Uganda can be sustainable. In Uganda, the dehumanizing aspects of slavery in the South and racial discrimination in the North are more than just the beatings, but also the parting of children from their mothers, the denial of education, and the sexual abuses of slave masters (Davis, 2004). The civilization that developed in Uganda reflected the variety and contrasts found on the continent. The peoples of Uganda differ greatly in language, customs, and appearance. The geography of this huge continent also shows sharp contrasts. Along the Nile River, which flows from the tropical forests of Central Uganda through the deserts of the north, several early civilizations developed. One of the most influential regions was Sahara. Sahara’s political, economic, and cultural influence had an effect on the history of other kingdoms. Later, empires based on trade grew up in the region of Sahara (Davis, 2004). Patterns of settlement and trade were influenced by the varied climates and natural sources of the Uganda continent. The hottest and wettest regions of the continent are near the equator, in the basin of the Congo River. Heavy rainfall and warm humid air encourage the growth of lush rain forest. Near the edge of the rainforest is the savanna, an open grassland dotted with shrubs and scattered clumps of trees. The savannas provide land for farming and herding. These grasslands are also home of Uganda great herds of wild animals, gazelles, giraffes, wildebeests, zebras, lions, and elephants (Davis, 2004). Racism in Uganda has been associated with reduced spirits, lower efficiency and a greater probability to experience terrible stress and nonappearance in the major activities in a community. People who go through racism speak of having feeling of timidity or letdown and lowered levels of self-esteem. Minorities who sense that their identity and culture are not cherished may also live through lowered levels of self-confidence and self-respect and think that they have are not welcome in a neighborhood or community. This mindset may bring about a feeling of denunciation of their own values, language, and ultimately their culture, and an ensuing loss of individuality (Hooks, 1994). In Uganda, the ways of thinking of people concerning cultural miscellany of their communes differ extensively. Amongst a number of minorities, there is a devotion to a deepened insight into cultural diversity and multiculturalism. Some â€Å"mainstream† people are anxious about variations and sense antipathy towards people of color. If the person of color is suffering discrimination of any sort, he or she may feel forlorn and miserable. He or she may also attempt to evade incidents where racist activities could happen, and pretend to be unwell or be anxious of deserting their homes (Kressel, 2001). In some nations, significant segments of the population reject coexistence with minorities in equal terms. These minorities have faced discrimination in such areas as housing, education, and employment. Although no scientific proof supports racist claims, racism is widespread and has caused major problems throughout the world. Racism is most often used to justify the creation of political or economic systems that encourage or maintain the domination of one racial group over another. Such beliefs were long used to rationalize the enslavement and persecution of people viewed as inferior (Stoessinger, 2002). Throughout history there have been persecutions and atrocities that can be described as cases of genocide. The Russian pogroms (persecutions of the Jews) during the late 1800s and early 1900s were an example of genocide. During World War II, the Germans practiced genocide. They killed about six million European Jews. Victims of the Holocaust went through dehumanization simply to make the killing of others psychologically easy for the Nazis. Many victims of the Holocaust suffered from various experiments which eventually led to the death. Some of the experiments were things such as: sun lamp, internal irrigation, hot bath, warming by body heat, hypothermia, among others (Clemens and Purcell, 1999). In recent years a debate has raged over the question of whether opportunities for black economic advancement are more affected by race or class position. Sociologist William Wilson believes that racial discrimination has become less important than social class in influencing the life chances of black Americans (Hinkle, 2004). He says that civil rights legislation and affirmative action programs have substantially lifted the cap historically imposed on black social mobility by segregation, resulting in greater educational, income, and occupational differentiation: Blacks with good educational backgrounds and job skills rapidly moved into the American middle class; blacks with limited educations and job skills became the victims of dehumanization and welfare dependency. Now poor urban blacks find themselves relegated to all-black neighborhoods where they are further dehumanized and socially isolated from mainstream American life (Zanden, 1993). According to Maiese (2003), the United Nations defined peace-building as an interplay of â€Å"capacity building, reconciliation, and societal transformation†. For other organizations, the short-term goals are more evident; peace-building revolves around promoting peace in an immediate situation. The United Nations drew up an international convention in 1948 that made genocide a crime. On Dec. 9, 1948, the United Nations passed the Genocide Convention, which was designed to overcome the claims of Nuremberg defendants that they had violated no law. The convention made genocide a crime. The next day, the UN adopted the Universal Declaration of Human Rights. Fifty years later, in 1998, the International Criminal Tribunal for Rwanda became the first international court to pass a guilty verdict for the crime of genocide. The verdict related to crimes committed during the 1994 conflict in Rwanda (Kim, 2004). In 1999, there was already a convention, called the Geneva Spiritual Appeal, which made history in collecting in one venue the Catholics, the Jewish, the Buddhists, the Muslims, the Protestants, and the Orthodox Christians. Then again, there remain Christians, Animists, Muslims in conflict in Nigeria; Christian-Muslim discord still abounds some parts in Asia as Indonesia and the Philippines; Buddhists and the minority population of the Hindus Tamils are at odds in Sri Lanka; and incredibly, Animists and Witches are cursing each other in Uganda (Reich, 1998). Sometimes, it is appropriate to entitle these conflicts nationalist ones, because they impact on the endeavors to build nation-states, in which the majority gets the state. More like the winning territory takes over or designs the administration. Defining such a nation is typically by linguistic or religious yardsticks. Hence, we have the Ugandans in the continent of Africa singled out as the inferiors by tongue and by faith, and Germans differ from the French by their verbal and non-verbal communication (Carter, Gwendolen, and Herz, 1991). Perhaps theres a tendency of people growing to be defensive about their identity if they sense that it is under cordon. There is really not a single ultimate peace resolution plan that can referee the unrest. Attempts had been made like the 1999 Convention but the conflict is not exclusively attributable to spiritual diversity alone. It may be distributed among ethnic feuds, religion-based worldviews, economic modifications, and political coalitions, among several others (Carter, Gwendolen, and Herz, 1991). On having the United Nations’ enforcement of globalized paradigms, they would need to try harder. Peculiarities factor in on the extent of their reception. If the countrys fragile, they are more likely to get involved. If the countrys sturdy, they are more likely to lag behind and perform diplomatically around the edges. The key is not to establish globalized benchmarks but to develop local, internal avowals (Stoessinger, 2002). They said there is only one Bible and a million interpretations. But there is a single quotation in it that speaks of harmony: a house divided against itself cannot stand. Proclaiming a house partitioned to be a condominium cannot be expected to work out when many of the occupiers want instead to demolish the edifice entirely and put up their own, unattached houses. Speaking of houses, local religious sects could construct and ring a Peace Bell at the beginning and end of their spiritual observation. Ugandan victims could ask their municipality to formally declare their observance of the day (Kim, 2004). It would also be certainly wise for any intercontinental organizations to use workforce from countries that went through related experiences, rather then using the abstract approach brought by peacekeeping squads from Western nations to intervene in Uganda. One specific strategy possibly is to have this staff encourage the people inviting other faith traditions to join them in a prayer service for peace in Uganda (Carter, Gwendolen, and Herz, 1991). International treaties should make it easier for local organizations to get concerned in the region of Uganda where genocide is concentrated without misplacing valuable time as they wait for the pronouncement of the United Nations Security Council, the Conference on Security and Cooperation in Europe, or the Organization of African Unity (Reich, 1998). But it should always be made a point that the auxiliary time is spent on deepening interfaith commitments to dialogue and cooperation for promoting peace. In the 1990s, Jewish groups pressured those who had profited from the Holocaust to compensate Holocaust victims or their descendants. Groups that paid reparations included the German government, certain Swiss banks, and some German companies (Clemens and Purcell, 1999). In the country Uganda, Paul Rusesabagina, the hotel manager played the hero in the lives of thousands having different cultural backgrounds. In the middle of European colonization in Rwanda, Paul made an uncompromising initiative to communicate with the most relevant redeemers from the camp of Brussels’ headquarters. This way, he succeeded in playing the peacekeeper among the threatened people he hid in their hotel (Carter, Gwendolen, and Herz, 1991). The United Nations also played an indispensable role in Uganda. Led by Col. Oliver, the organization gets to know what is actually happening but not to make contingent actions and resolutions to put a stop to genocidal cases that mete out Rwanda. He stood the middleman between the U. N. superiors and the people under the wings of Paul Rusesabagina (Carter, Gwendolen, and Herz, 1991). However, it was also evident that the situation could have gone smarter if the likes of Paul Rusesabagina and Col. Oliver were given ample attention or at the very least, not ignored. Apart from the United Nations, a multitude of support and private-owned groups advocate against dehumanization and as such, campaign for a zero-dehumanized world and for a healing process to start with (Stoessinger, 2002). For instance, Interact Worldwide is an advocacy-driven virtual institution with the purpose of building support for and implement programmes, which enable marginalized people to fulfill their rights to sexual and reproductive health. Redefining Progress works with a broad array of partners to shift the economy and public policy towards sustainability; that they can measure the real state of a country’s economy, our environment, and social justice with tools like the genuine progress indicator and the ecological footprint; that they design policies to shift behavior in these three domains towards sustainability; and that they promote and create new frameworks to replace the ones that are taking us away from long-term social, economic, and environmental health. Other popular organizations include The Family Alliance to Stop Abuse and Neglect, National Down Syndrome Congress, Resources for Children of Holocaust Survivors, Amnesty International, Freedom House, Human Rights Watch, Reebok Human Rights, among many others (Carter, Gwendolen, and Herz, 1991). Prejudice provides for the safe release of hostile and aggressive impulses that are culturally tabooed within other social contexts. By channeling hostilities from within family, occupational, and other crucial settings onto permissible targets, the stability of existing social structures may be promoted. This is the well-known scapegoating mechanism, another common method to dehumanize (Zanden, 1993). In Uganda, scapegoating resulted in the inhuman treatment of Ugandan tribes like Tutsi. Bound by his duty-based ethics, Paul Rusesabagina could be pictured having utter, intrinsic moral commitments to some external source to carry out certain actions, notwithstanding his particular situation and personal goals (Carter, Gwendolen, and Herz, 1991). The ways of thinking of people concerning cultural miscellany of their communes differ extensively be it in Rwanda or in some other place in the world. Amongst a number of minorities, there is a devotion to a deepened insight into cultural diversity and multiculturalism. Some â€Å"mainstream† people are anxious about variations and sense antipathy towards people of color. If the person of color is suffering discrimination of any sort, he or she may feel forlorn and miserable. But with Paul Rusesabagina around, the people kept safe in Uganda were saved not only from the harm of genocide but from the deadly bias posed against them by the larger society that is morally wrecked and uncharitable (Carter, Gwendolen, and Herz, 1991). An inherent debate has raged over the question of whether opportunities for black economic advancement are more affected by race or class position. Some believe that racial discrimination has become less important than social class in influencing the life chances of Ugandans. Civil rights legislation and affirmative action programs have substantially lifted the cap historically imposed on black social mobility by segregation, resulting in greater educational, income, and occupational differentiation: Blacks with good educational backgrounds and job skills rapidly moved into the middle class; blacks with limited educations and job skills became the victims of dehumanization and welfare dependency. Now poor urban blacks find themselves relegated to all-black neighborhoods where they are further dehumanized and socially isolated from mainstream Ugandan life (Hooks, 1994). The risk is that when chauvinistic behaviors and attitudes are allowed to go unimpeded in any environment, a climate cultivates which sees these incidents as natural and so permits racism to become deep-rooted. Whereas not many complaints are collected every year, this should not be compared to a low frequency of racist incidence. Inadequate understanding of legislation, fear or apprehension on the part of victimized minorities to disclose racist activities or disinclination by parents to engage in legal amends are factors that may thwart the conveyance of official complaints. As well, formal treatments for grievances of racism are not constantly suitable, with arbitration usually being considered as a preferable substitute (Kim, 2004). Racism has been a steady problem in Uganda all through time. Other forms of racism are, perhaps, less obvious. The hierarchical structure, academic elitism, and the whole way of life of mainstream society are directly opposed to cultural values and world views. How all this conflict is experienced by people of color can only be explained adequately by the citizens of the society themselves; it will be different depending on their past experience and even non-existent for others, but the suppression of the values and way of life of the mainstream society will adversely affect everyone because racism against these people of color eats at the hearts of the dominating as well as the dominated people (Hinkle, 2004). Peace-building can concentrate on resolving current issues between constituents. It involves moderating by authorities or other members of the community to maintain understanding between parties. On the other hand, it is also creating a society where the constituents are educated and transformed so that they do not only know peace but also lives peace. In these terms, education plays an integral role. This creates a community which is not only dependent on intermediaries but with self-regulation of peace as well. In the end, a community filled with peace-loving citizens is a community where peace has been built (Stoessinger, 2002). Personally, if I were a member of a certain low-income urban neighborhood similar in nature in Uganda, I would offer my full knowledge of the end and the means to achieve it. As part of the will for a â€Å"sense of community,† I will take the initiative to conform to shared leadership or become servant leaders. After all, a leader providing positive reinforcement is a leader creating a positive climate and peace-loving attitude all over a community. So long as there will be provision of opportunities that allow me to exercise responsibility and creativity in our common endeavor, my active participation would include extensive information dissemination, be it online or via available physical infrastructures, and active civic participation.