Thursday, October 31, 2019

THE GLOBAL ECONOMY Assignment Example | Topics and Well Written Essays - 2250 words

THE GLOBAL ECONOMY - Assignment Example PEC and shale oil producers, end of Quantitative Easing (QE) in the US economy which led to the rise in the dollar value and subsequent fall in the oil prices. Oil prices fall when the world produces more oil than it is able to consume in which case there is a production surplus. Vice versa, a production deficit comes about when the demand for oil is greater than the amount of oil that is being manufactured. However, oil prices have plummeted to half of what they used to be since June. Crude oil has now dipped below $50 a barrel for the first time since May 2009 and US crude has also fallen below $50 a barrel† (2015). In the last decade, oil prices were high because of the rising demand for oil in most of the world but this growing demand could not be met and supply remained low due to conflicts in the oil producing Middle Eastern region, for example Iraq. By 2014, oil production increased exponentially and due to surplus oil being produced, the price of oil fell dramatically. This was caused by a significant increase in US oil production. Because of soaring oil prices, multiple American and Canadian companies started drilling for â€Å"new, hard-to-extract crude in North Dakotas shale formations and Albertas oil sands† and advanced methods like fracking and horizontal drilling began to be used (Plumer, 2015. The introduction of American shale oil in the market has added â€Å"4 million new barrels of crude oil per day† (Plumer, 2015) to the oil market while the global production is â€Å"75 million barrels per day† (Plumer, 2015). Iraq emerged as one of the major contributors to the recent boom in oil production. After the US led invasion of Iraq, oil production was disrupted due to constant war, turmoil and sanctions. However, since 2008 due to efforts being made to bring about stability and curb violence, we have seen a boom in Iraqi oil production. â€Å"Over the next five to seven years, Iraq could be supplying nearly half of the incremental growth in world oil

Tuesday, October 29, 2019

Non Assignment Example | Topics and Well Written Essays - 250 words

Non - Assignment Example When a situation is fed into the flow chart, a clearer view of the type of decision in hand should emerge. In theory it will enlighten a manager to the potential risks and benefits of involving others in that decision. In practice, however, there are some potential problems with the model as it is intended to be used. First of all there is an issue about the amount and quality of information that is fed into the decision making process. Poor information at any point in the model will weaken its reliability. Furthermore, Chemers makes the very valid point that â€Å"the Vroom-Yetton-Jago model and other prescriptive models†¦ assume that leaders can easily change their behaviors in accord with situational demands.† (Chemers: 1997, p. 52) Managers often act instinctively, however, based on their experience in a decision-making role and their own personal style. This inherent tendency, along with pressures of time mean that the application of the Vroom-Yetton-Jago is theoreti cally useful, especially for inexperienced managers, but in practice not likely to be fully implemented, especially by more experienced managers. Reference. Chemers, Martin M. An Integrative Theory of Leadership. Mahwah, NJ: Lawrence Erlbaum Associates, 1997, pp. 47-57.

Sunday, October 27, 2019

Packet Classification: Problem and Resolution

Packet Classification: Problem and Resolution INTRODUCTION This chapter covers the introduction to packet classification. Problems for packet classification, objectives to overcome the problem involved in packet classification, motivation to do the project on packet classification and also the organization of the project. The development of the internet grows for every year, because of the easy access of the internet. The gain of the internet can be obtained through the smartphones, netbooks, notebooks. For processing the packets, network processor is used, and it will carry out the tasks as to convert the packets into fragments, reassembling these fragments, forwarding, encryption and packet classification. Due to increased line rates, pressure is increased on line rates and it in turn pressure on network processor. The pressure can be relieved in two ways: By inserting more processing cores and it increases power consumption. Increasing the clock speed, but it creates difficulty due to the physical limitation in the silicon. So that it can be relieved in two different ways: Insert the clock gating, which reduces the power consumption. Insert the buffer, to form the pipelining and it also increases the speed. 1.1  PROBLEM DEFINITION Network processors are getting more strain, due to more use of internet and the strain needs to be reduce. To give the security for the network packets. To minimize the power required for packet classification. To achieve high speed and also high throughput for packet classification. 1.2  OBJECTIVES Understood the concept of hypercut algorithm for packet classification and also analyzed the flow chart for packet classification. Understood the verilog code and Xilinx tool. Wrote the verilog code for hypercut algorithm. The simulation results for hypercut algorithm is verified in Xilinx tool. Clock gating circuit is inserted in the architecture of the classifier, it reduces the power consumption. Pipelining concept is used in proposed architecture of the classifier and the simulation results are verified in Xilinx. 1.3  MOTIVATION The network traffic is doubling for each six to nine months. Also traditional algorithms are not supporting the increasing network traffic on core and edge devices. Large number of rulesets: Due to increased access of the network, the more services need to be implement in network device, so that more number of rules are needed. It creates the difficulty for classifying the packets. Flexibility: Traditional algorithms are particularly designed for IPV4, so that novel solutions are required to manage both IPV4 and IPV6 addresses. Scalability: As the network services are increasing, there is requirement to add or delete the rules. So that, good scalability is required for packet classification. 1.4  Organization of the thesis The thesis contains 6 chapters Chapter 1, it will covers the introduction of packet classification, problems involved in packet classification, objective to the packet classification and motivation for choosing the packet classification. Chapter 2, it will covers the basics of existing packet classification and also the basics of proposed packet classification. Chapter 3, it will covers the method used to do the packet classification, proposed architecture and also it tells how proposed architecture is better compared to previous algorithms. Chapter 4, it discusses the simulation the simulation results obtained for existing and proposed architecture of the classifier. Chapter 5, it covers the conclusion and future scope of the project. Chapter 6, It lists the reference papers used for literature review of the packet classification. Chapter 2 BASICS It covers the basics of packet classification. It also explains the structure of packet header, brief introduction to internet, the mode of information transmission through the internet, OSI layers, the type of matching, software and hardware implementation of packet classification , Clock gating and pipelining are also discussed. It also covers the review of different packet classification algorithms, by reading this the user can select the algorithm, which is best suit for his application. The internet is a global system. It is consists of inter connected computer networks, which uses the protocols(TCP/IP), to match several billion devices all over the world. It is also termed as networks of network. Access of internet is a process of connecting mobile devices, computers and computer terminals to the internet. Internet access will enables the users to access the internet services such as email and world wide web. Using various technologies, internet service providers will access the internet. A packet is a formatted unit of data, which is carried by the packet switched network. By formatting of the data, the bandwidth of communication medium can be increased. The structure of the packet contains the two varieties of data Control information User data 2.1  Control information This will provide the information, on where to send the data. Example, It provides the source and destination IP addresses, sequencing information and error codes. Fig 2.1 shows the structure of the packet Fig 2.1 structure of the packet 2.2  Payload The maximum size of the packet is 64 K bytes. The payload of the packet is variable. Example IPV4 typically adds the 20 bytes of payload to every packet. The packet is passed through the network using three devices such as hub, switch and router. 2.3  The modes of information transmission through the internet 2.3.1  Hub Hub is a central device, for which all other devices are connected. It is called the star system. It is very simple, when any device sends the data, it will send the data to all other devices and all other devices needs to decide whether the data is belonging to them, if it is not belonging to them, they will ignore it. It will present in physical layer. Fig 2.3.1 shows the structure of the hub. . Fig 2.3.1 shows the structure of the hub 2.3.2  Switch The switch is smarter compared to hub. First it creates the table, which records the IP/MAC addresses of the devices(PC’s) connected together. At the start, when any device sends the data, that time switch will not be knowing the destination IP addresses. So it will forwards the packets to all other devices, which are connected to it and it also records the IP address of the device. Next when packet belonging to those destination IP addresses comes, it will directly forward the packets to destination devices It is present in data link layer of OSI layer. Fig 2.3.2 shows the structure of the switch. 2.3.3  Router It is the smartest device compared to hub and switch. The router will record the address of all the devices which are connected to it. The router will read the information present in packet header and it will decide , where the packet needs to be sent and how to process the packet. It provides the security. While in hub, switch the destination IP address is known, hacker may hack the destination device, it will consider both destination and source IP address of the devices and it will decide whether the source device is hacker or not. If it is hacker, it will deny the packet. Fig 2.3.3 shows the structure of router. Fig 2.3.3 shows the structure of router. 2.4 OSI LAYERS It consist of seven layer Application layer Presentation layer Session layer Transport layer Network layer Data link layer Physical layer The Fig 2.4 for OSI model is shown below as Fig 2.4 OSI layers Application layer: This layer will provide the interface to application programmes. Presentation layer: In this layer , it converts the data from system specific format to the format which is suitable for application. It also provides encryption and compression. Session layer: Which facilitates the starting, managing and ending of connection between the two nodes. Ex: For a video session, it will synchronize the related stream of data such as audio and video. Transport layer: It will break the data into segments It will decide about how much information can be sent to email server and how much information can be received back. The responsibility of transport layer are: Reliability Flow control Fragmentation Network layer: Here the segments are broken into packets by adding the source and destination IP address to them. Next the packets are sent to data link layer. Here router is working in this layer. Data link layer: In this layer, the packets are broken into the frames, which are created for the specific network. The frames are assigned the address of two nodes, the data is moving in between. Physical layer: The frames given by the data link layer are converted into bits in physical medium. UDP: User datagram protocol It is light weight and connectionless. Advantages: The packet size is small. UDP header- 8 bytes TCP header- 20 bytes There is no requirement to create and maintain the connection. It has more control over the data Disadvantages: It does not provide error recovery. It does not compensate for lost data packets. Packets can arrive at out of order, so that data loses meaning. There is no control of congestion. Transmission control Protocol: It is reliable and connection based. Advantages: It delivers the acknowledgements. It provides retransmission. It provides in order delivery. It will delays the transmission when the network is busy. It provides error recovery. Disadvantages: It has bigger header. It doesn’t always get sent out quickly. It is the side effect of congestion. It has bigger overhead. UDP is message oriented It sends the data in distinct chunks. Ex: Email. For multimedia applications, UDP is used, because of these reasons as: It has less overhead. Data loss can be masked. UDP is used in small transmission. It is also used in bandwidth intensive applications, that tolerate packet loss. TCP is stream oriented It can be used in continuous flow of data. Ex: Phone conversation. For text communication, TCP is better. Ex: File transfers, Remote access. TCP is used when delivery acknowledgement are needed. In physical layer, information is transmitted in bit stream using hub. In data link layer information is transmitted in frames using switches. In network layer information is transmitted in packets using router. A router is a device that forwards the packet. A router is connected between two networks namely LAN’s or WAN’s. network processors are specialized CPU, which is optimized to support the implementation of network protocols at maximum speed. The function of network processor is to carry out the tasks such as packet separation, reassembly, encryption and classification. Packet classification is the process of categorizing the packets into flows in internet router. Packet will be classified in network layer. Packet has five fields as shown in fig Source IP address: It indicates the IP address of the sender . Destination IP address: It indicates the IP address of the destination. Source port: It indicates the port number of sender. Destination port: It indicates the port number of destination. Protocol: Which specifies the type of transport packet being carried. The incoming packet to router will matches the specific rule if the distinct field in the packet will match corresponding field in the rule. There are three matches Exact match: The values present in rule field header are same as the values present in packet header. Prefix match: The values of rule field header are prefix for header fields of the packet. Range match: The packet header field values must be lie in the range which is specified by the rule. 2.5  The types of packet classification algorithms Packet classification algorithm can be implemented in two major types Software based Hardware based 2.5.1  Software Implementation This can be used with general purpose processor and network processor. The software based algorithm can be divided into two types as Field dependent Algorithm Field independent Algorithm Field Independent Algorithm: For each field in the rule, these algorithms will build the index table separately. Ex: RFC Field dependent Algorithm: In these algorithm, the fields of the rule will be matched in dependent manner and there is no need to group the result in final stage. The memory requirement for these algorithms is less than field independent algorithms. Ex: Hypercut, Hicut 2.5.2  Hardware based implementation This is used with ASIC or with FPGA. This implementation is used with internet routers for the high speed that supports to handle the packet. The reasons to use software implementation Programmability: ASIC architectures has small Programming capacity, Because ASICs have special design. Special chips: To accelerate the packet processing speed, special chips called TCAMS are used. The proposed algorithm uses clock gating circuit to reduce power consumption and pipelining to increase the speed. 2.6  Clock gating Clock gating is a technique, which is used in synchronous circuits to minimize the power consumption. This technique is used to prune the clock, it disables the port of the circuitary, so that flip flops present in the circuitry will not switch the states. When switching is absent, the dynamic power consumption is reduced, but the leakage currents are present. Clock gating works by taking the enable signal of the circuitry, so that flip flops or devices present in latches will not switch the states, so that switching power reduces. So it is necessary to have enable conditions in order to get benefit from clock gating. The clock gating saves the power. Clock gating can be added in two ways: By writing the RTL code, the synthesis tool automatically translates the RTL code into clock gating logic. In order to gate the clock of specific modules or registers manually clock gating circuit can be inserted by instantiating library the specific ICG cells. Using automated the clock gating tools, clock gating is inserted in semi automatic fashion. These tools will insert ICG cells to RTL code or directly add the enable conditions to RTL code. 2.7  Pipelining It is group of data processing elements, which are connected in series, so that output of one element is the input to next element. We build a pipeline by dividing the complex operation into simple operation. Here instead of taking bulk thing and executing it, the bulk thing is break up into smaller pieces and process it one after another. For example Consider a calculation c= log(|a+b|), which consist of three operations, which are shown in fig 2.7. Fig 2.7 Pipelining example Add a and b to get a+b, it takes 40ns. Take the magnitude, we get as |a+b|, it takes 35 ns. Take the log we get as log(|a+b|), it takes 60ns. Consider a situation when we need to carry out for 100 such pairs. Without pipelining , it would take a total of 100*135= 13500ns. By realization, it is found that it is whole sequential process. Let the values evaluated to be a1 to a100 and we need to add values to be b1 to b100. In first evaluation, ( a1+b1)is calculated, In next evaluation, |a1+b1|,(a2+b2) is calculated, in third evaluation log|a1+b1|,|a2+b2|, ( a3+b3) is evaluated. After the first output data that is log|(a1+b1)|, the subsequent outputs are log|(a2+b2)|, log|(a3+ b3)| will now start arriving at a gap of 60ns . All the 100 inputs can be applied in 199*60=5940ns and the total time taken to evaluate 100 data will be 5940+180= 6120ns. This time is half compared without pipelining. This process of evaluation is called pipelinlng. 2.8 Literature review Algorithms are classified in 4 classes: Basic structures Geometry based Heuristics Hardware based 2.8.1  Basic structures a. Linear search: This algorithm[1], is very simple. It contains all the rules. Here each packet is matched opposite to all the rules until the corresponding fields of the packet should match to the rule. Although, it is simple, it is not widely used. Because, it takes the large time for matching with the rule. Consider N is the number of rules, â€Å"the worst case space and time complexity is O(N),where O is the order and N is the number of rules. Fig below shows the linear structure. Fig 2.8.1.a Linear search algorithm b. Hierarchial trie: It is an extension part of the binary trie. By using the individual bits of the search key, the branches of the trie can be traversed. In the d dimensional hierarchial trie[2], first bulid the one dimensional hierarchial trie which is called F1 trie. Foe each prefix P in the F1 trie, there is a recursively (d-1) dimensional hierarchial tries are present(Tp). For example, if the data structure is 2 dimensional the only one F1 trie is present. Hierarchial tries are also termed as multilevel tries or backtracking tries or tries of trie. Womens Roles in Anime: The Reflection of Japanese Society Womens Roles in Anime: The Reflection of Japanese Society What do the portrayals of women in Japanese animation reveal about the role of women in Japanese society today? The role of women in Japanese culture is an important topic amongst when discussing contemporary Japan. While it is important to consider traditional methods of analysis that come from statistics and surveys, you also need to look at how popular culture defines the modern Japanese woman. Japanese animation can provide a tool to analysis of the role of women in Japanese society. Through looking at women and they are portrayed in Japanese animation over the decade, we can begin to see the role of women in contemporary Japanese society. The purpose of this discussion is to determine a connection between Japanese animation (a form of popular culture) and the role of women (whether this role is shifting or remaining conservative) in contemporary Japanese society. In order to understand the link between Japanese animation and society, it is important to consider the meaning of these terms and how they relate to each other. Martinez defines popular culture as the culture of the masses; which does apply to the Japanese culture. Nevertheless, other opinions raise the point to how popular culture is a problematic term when translating it into the Japanese context. According to Hidetoshi Kato, a Japanese scholar, the term popular culture as taishu bunka; translates into mass culture. However, Martinezs definition is a middle of the road definition for the terms offered by Kato. In addition, Martinez defines the anthropology of popular culture as the study of the interaction between the apparently separate realms of the material and the symbolic. Other anthropologist such as Roger Buckley agrees with Martinez, stating that popular culture should tell us something about contemporary Japanese behavior. The images presented by Japanese animation including its related cousin, manga, or Japanese comics have helped shape the identity of modern Japanese women. Japanese animation, or anime, is useful when studying the role of women in society. Popular culture serves to reflect and instigate change in Japanese society, by observing the changes and themes in anime, these trends are identifiable. Popular culture also helps one to understand the dynamics of Japanese society and culture. While the behaviors identified are not Japanese, such as conformity, loyalty and deference8, there are certain subtle undertones that make themes and characters that make them Japanese. Lastly, Japanese animation industry caters for both sexes across a wide age group. This is important, because unlike the animation industry in the United States whereupon childrens programming is largely aimed at young boys. Japanese animation makes it possible to gain an insight into the role of women in society because both sexes views are represented. This provides a foundation for observing how the role of women in Japanese society can be studied through examining their role in Japanese animation. Japanese animation is interesting to study when observing the roles of gender because of the way it written for diverse tastes and it differs from Western animation. Anime has often been described as edgy, provocative, and documentary-like; these industry buzzwords describe anime as a different expression of animation, when it is not. In reality, the Japanese have embraced animation as an expression that goes beyond the standard set by Disney. Anime includes animation catered for all age groups. Anime content ranges from superb works to trashy soap operas or pornography; however, they play an important role in Japans popular culture by providing a legacy of past ideals. Respected writer Frederik Schodt has split the anime available into two distinct halves as defined by the gender, Boys comic [shonen] anime carefully balance suspense with humor, dramatic stories of sports, adventure, ghosts, science fiction, and school life. Girls comic anime [shojo] also strive for balance but are distinguished by their tales of idealized love. Given the range to choose from, it is important to analyze a number of sources to see how anime reflects the position of women in Japanese society, but to examine them with an open mind. Reaction to anime has been filled with distaste. Film critics have both embraced and criticized Japanese animation. Mamorum Oshiis theatrical adaption of Shirow Masamunes Ghost in the Shell, regarded as a movie that questions what it is that makes us human by many, has been lauded as a spectacular-looking Japanese animated film, but like so many of its kind, involves a confusing narrative and peculiar metaphysics that reduce interest16. To avoid generalizations it is important to look at works from a several genres to how anime portrays Japanese women in society. To observe the role of women as portrayed in anime with a female-specific target audience, Komodo no Omocha (1996) will be used to analyzed. To see how women are being represented in anime that is targeted at a male demographic, Dragon Ball Z (199?) will form the basis of analysis. Finally, a recent work from Japans most respected and successful animation studio today, Studio Ghibli, will be analyzed Mononoke Hime (1997). The importance of studying Studio Ghiblis work is to see how women are portrayed by an animation studio whose works reach a very wide audience, that typically cross the gender and age boundaries. While this analysis will not prove to be the final answer, it will prove an interesting investigation when considering what images of femininity have been projected onto Japanese society over the past decade. Kodomo no Omocha was a popular series that aired on Japanese television in the mid 1990 is, compared to many shojo anime, Kodomo no Omocha is radical, though it is by far not the only one. The story is a comedy fused with typical shojo elements love interests, and pretty artwork. The female lead is a young girl named Sana, who lives with her eccentric, but loving, mother and Rei, her personal manager. Unlike other female characters that will be analyzed, Sana is loud, outspoken and is not intimidated by anyone. She is works hard to do her best at her job (she is a famous star of a childrens TV program), friends and family. While she exhibits traditionally female qualities, she is not the stereotypical wholly subservient female character. Even though she is only a child, she stresses the importance of her job. Her mother is another strong female role within the anime. She is intelligent, in control and the men are more likely to be subservient to her than anything else is. Other fema les in the show lean towards conservative Japan, such as when Sanas female teacher cries and runs to another male teacher for assistance whenever the class acts up. The male characters are traditionally empowered, though like many a shojo anime, have soft sides to their personalities. The depiction of the two main female characters, Sana and her mother, offer an insight into the modern Japanese woman as having the capacity to be strong, yet gentle and compassionate. Dragon Ball Z offers an interesting insight into the portrayal of women in anime aimed at a male demographic. The reason this is an interesting series to look at is its popularity and the way it portrays gender roles. Women are portrayed in few roles in this anime. The female roles are dismally backwards. Dragon Ball Z has portrayed the role of women as subservient/secondary at their core. It has pointed out that fundamental beliefs about gender roles are difficult to change in any society, including Japans, The show is very male-centric, emphasizing strength, discipline and hard work as the key to being successful in the world. On the other hand, this is a martial arts anime, so this should not be a surprising aspect. One of the women who appear regularly is the protagonists female friend Bulma, an intelligent scientist. Bulma is a gifted inventor and often creates something that will aid her group of friends in whatever plight they are in. Bulma is portrayed as a confident, intelli gent woman who, while not of equal status, remains an important part of the team. However, when she is put in a position of danger, she falls into the damsel in distress stereotype all too common in male-orientated anime. She is rescued one way or another, but is often the least of the groups priorities she is often rescued as an after-thought, as opposed to being a genuine critical concern. This is a good example of what Eri Izawa determines as the Unequal Relationship genre, where women are second to men in a world dominated by patriarchy. Hayao Miyazaki and Isao Takahata founded studio Ghibli in 1985. The importance with studying work by Studio Ghibli is because their productions (which are theatrical) have such widespread appeal in Japanese society. A large number of Japans populace sees the stories that are created here. The films cross the divides of age and gender. The movie that is I am looking at is Mononoke Hime. It grossed approximately US$150 million at the box office, beaten only by Titanic. In Mononoke Hime, the story centers on three principle characters San, the Wolf Princess, Lady Eboshi and prince Ashitaka, the pillar between which these two women are placed. One of interesting strengths of this film is the way in which the opposing characters, San and Lady Eboshi, are portrayed. Both are strong, powerful women, sure of themselves and their world. Lady Eboshi is a superlative example of the new woman of Japan. She is in charge of a profitable ironworks that employs people regarded as beneath society (prostitutes and lepers), leading by compassion, returning dignity and purpose to their lives. San is the other extreme; she lives in the forest of the Deer God, raised by the great wolf gods who dwell there. San is a strong female character who follows a more natural way of life; as opposed to the entrepreneurial mindset of Lady Eboshi, San is dedicated to preserving the forest and the creatures that dwell within. Miyazaki is portraying the capacity of women to be strong, competent and successful. San represents the capacity of women to be strong in the dwelling of the traditional while Lady Eboshi is an example of how women can be successful and entrepreneurial in the face of modernization. From three examples, it is easy to see these reflections on the role of women are present in contemporary Japanese society. Martinez admits that it is difficult to discover what the true role of Japanese women in Japanese society are in a perceived country where men are still dominant [and] Japanese women are held to be gentle, submissive and beautiful. Historically, Japanese womens suffrage was achieved in 1945 and it is noted that while Japanese women may be able to find jobs, it is far more difficult to find careers, even today. However, public opinion is changing. There is clear that the role of women in Japan is no longer the traditional housewife/mother. Surveys by the Prime Ministers Office in 1987 and 1995 show a shift in public opinion of women, while in 1987 over 50% of the men surveyed agreed with the traditional role of women in Japan, by 1995 the percentage had dropped to 33%. The state of Japanese animation over the past decade reveals a relative parallel between the co ntent of Japanese animation and these results. The role of women in anime such as Kodomo no Omocha gives girls a role model unlike the traditionally submissive, quiet woman in the face of Sanas eccentric, enthusiastic nature that is rewarded by success. Studio Ghiblis films have portrayed women as equal, confident and able to take charge in their lives. Anime aimed at boys retain the portrayal of women as bystanders, whether it be the token damsel in distress or cheerleader. However, that is changing; Japanese animation aimed at the boys has begun to portray women beyond this traditional stereotype. Several productions such as Ranma 1/2 and Love Hina offered a cast of characters that serve to put women on equal ground as men in some cases, though there is still the re-enforcement of traditional gender roles. Japanese animation is an established form of pop culture. It is consumed by both sexes and across all age groups, and offers a series of representations of women. While it has become apparent through observing trends in Japanese animation and contemporary Japanese society is an apparent shift, however, it is important to identify that the traditional role of women will probably always manifest itself in pop culture. This is because the traditional role of women is an option, just as choosing a career or being entrepreneurial are choices. What is encouraging to see is that those choices are being represented, either directly or indirectly, in anime. It speaks well for the future of Japanese society as alternative roles of women are being portrayed for both sexes in the culture of the masses. Reference: Martinez, D.P. (1998). The Worlds of Japanese popular culture: gender, shifting boundaries [UK, Cambridge UP, p. 3]. Hidetoshi, K. (1989). Some Thoughts on Japanese popular culture. Richard Gid Powers Hidetoshi, K. (1989). Handbook of Japanese popular culture. Greenwood Press. Buckley, R. (1990). Japan today. Cambridge: UP. Schodt, F.L. (1983). Manga! manga! the world of japanese comics. USA: Kodansha. Izawa, E. (2001). Japanese manga and animation: gender relations in manga and anime. Retrieved from http://www.uncc.edu/~medmoto/3209/anime/gender.html (abridged) Robertson, J. (1998). Takarazuka: sexual politics and popular culture in modern japan. University of California. Dimensions of Japanese society: gender, margins and mainstream. Great Britain: Macmillan Press Ltd.

Friday, October 25, 2019

Western Pennsylvanian Election 1937 and the New Deal :: essays research papers

In an era where men worked hard for what they had but had little to show for it. When large corporate owners were refusing to allow workers into unions came about the New Deal. This proposal would not just change the lives of the workers during this time, it would change the lives of Americans for years to come.   Ã‚  Ã‚  Ã‚  Ã‚  In the Steel Valley of Western Pennsylvania, 1937, the elections of government officials had changed from years past. There was realignment of the political parties and the political parties switched positions for years to come. With the help of the Little New Deal in Western Pennsylvania, the amount of labor and satisfaction increased.   Ã‚  Ã‚  Ã‚  Ã‚  With the election of Franklin D. Roosevelt to president of the United States due to the Depression of the thirties, there was bound to be change. There was a great interest in the ideas of FDR’s New Deal. The interest and approval came for the blue-collar workers and lower-income households. The upper class approval on the other hand was on it way down, because all in all the New Deal would be essentially taking away from the upper class citizens, business owners, and giving middle lower class more.   Ã‚  Ã‚  Ã‚  Ã‚  Now that these new ideas were being utilized the workers wanted a new form of local government. If they would leave local government the way it was they would always be pushed around. So, middle class Americans would run for local government. The town would be more likely to elect someone who has been in their position before and want to help them out when they would strike rather then bring the police in and break it up. They would need someone with power on their side and that’s what they did.   Ã‚  Ã‚  Ã‚  Ã‚  In the year 1936 about fifty percent of the people in Pittsburgh, Pa voted Democratic with about nine percent Republican and three percent for someone else. Thirty seven percent of people didn’t vote. This was a great increase in voters from 1932 when only forty-two percent of the people voted. This showed that as more people voted the republicans still were receiving more votes but the Democrats were running away with the amount of people voting. Because of President Roosevelt’s plan to increase the number of jobs and his willingness to get involved with the large companies, people wanted to see this go through. People wanted to have this security that they were not receiving from the Republican government.

Thursday, October 24, 2019

Alumni Portal

ABSTRACT This project entails developing a web based application for Dau Alumni Portal for two of the faculties that is Faculty of Information Technology and the Careers Department which both are facing a problem on how to keep in touch with their graduate student. As for solving this problem, portal for alumni need to build as the objective is to create a system of a â€Å"middle person† entity, allowing alumni members and non-members to communicate in virtually.This portal is Internet web-based systems that consist of interactive web page which is accessible exchanging information between user anywhere around the globe and web set without any time constraint. In addition, management is getting updated alumni record and resources by administrators could also be done via internet. This portal integrates several software packages and programming languages suitable for the development process. It is hope this portal would greatly benefit to all people who involve with it. Table of Contents 1.Chapter I†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 1. 0 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 1. 1 Background Information ¬Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦4 1. 2 Problem Statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 1. 3 Rationale (Justification)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 1. 4 Proposed system†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦5 1. 5 System Objectives†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 1. 6 Scope of the System†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 1. 7 Limitations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 1. 8 Beneficiaries†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 1. Theoretical Framework†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 2. Chapter 2 Literature Review†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 2. 1 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 2. 2 Global Literature Review†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 2. 3 Regional Literature Review†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 2. 4 Local Literature Review†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦8 2. 5 Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 3. Chapter 3 Research Methods†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 2 Locality of the Project†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 . 3 Population†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 4 Research Techniques†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 4. 1 Sampling Method†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 4. 2 Interviews†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 3. 4. 3 Literature Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 11 3. 4. 4 Observation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 3. 5 The Platform†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 3. 5. 1 MySQL†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 3. 5. 2 PHP†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 11 3. 5. 3 HTML†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 3. 5. CASE Tools†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦12 4. Chapter 4 System Analysis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4. 1 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4. 1. 1 Technical Feasibility†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4. 1. 2 Economic Feasibility†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4. 1. 3 Operational Feasibility†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 4. 1. 4 Schedule Feasibility†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 4. 2 Implementation Plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 5. Chapter 5 System Design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 5. 1 Use Case Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦15 . 2 Flow Chart†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦19 5. 3 Data Flow Diagrams†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 6. Chapter 6 Coding and Testing†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 23 i) Homepage†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦23 ii) Registering of Alumni†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 25 iii) Login†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦29 iv) Forum Page†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦30 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦31 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦32 ? CHAPTER 1 1. 0 INTRODUCTIONToday, computers have increasingly become part of our lives at work, at home, and even when travelling. The growth of Internet has brought about revolution to human daily lives. Internet is not only a big part in research and educatio n these days, but also plays an important role in the communication technology. With the Internet, purpose is to provide easier communication and transfer of information among people around the world. Nowadays, government, private, university, and institution mostly have a web page as a primary source of information for people of all ages to access on it. . 1 BACK GROUND INFORMATION Dau University (ANU) is a member of the worldwide family of Nazarene institutions affiliated with the Church of the Nazarene founded on the same principles – the development of students in a strong spiritual environment. ANU offers a well-rounded, holistic education to help members establish themselves in three important areas as its motto: Character – Explore your faith for living. Competence – Achieve your goals for your career. Community – Find your place in the world. It is the first Nazarene University established outside of the United States.It has been an affiliate of t he Council for Christian Colleges & Universities since February 2002. It was established in the year 1994l located on the Maasai plains across Nairobi National Park, from the city of Nairobi. 1. 2 PROBLEM STATEMENT Each year, hundreds of students graduate from this university. The common problem faced by faculty is how to keep in touch with their graduate students because there is no system that has been develop to act as a â€Å"middle person† for communication among the faculty and the alumni member.Thus, developing an alumni portal for this faculty will solve the problem. The reason is that a web portal is a central point which anyone can view information and services towards the community. Virtual communities allow people with common interest to meet, communicate and share ideas and information through an online network such as the World Wide Web. Through these activities, participants develop bonds with the members of the community. The main idea of this project is to pr ovide a visual communication platform among the alumni and non-alumni (ANU community). 1. 3RATIONALE (JUSTIFICATION) The current situation faced in careers office in tracking ANU alumni show that the work flow is not under taken efficiently, there is too much time and resources wastage, for example most of the time, head of careers department has to physically go out and try to find ANU alumni out there in order to contact them of which it’s a waste of time considering having an alumni portal where the alumni themselves signup to the portal providing their contacts and work position wherever they are regardless of the distance or their geographical location.In terms of, wastage of resources, current system is losing a lot both financially and opportunity wise, since some of well placed alumni cannot be tracked or contacted to help in donation or support in improvement of infrastructure within the university or in any other difficult situation that the university might be faci ng and need external support. 1. 4 PROPOSED SYSTEM This project was focusing on web-based application, which as a new forms of interactive media between the ANU alumni members and non-alumni members (ANU community).It comprises a collection of information pages, containing both textual and graphic elements and connected with hyperlinks. By develop interactive sites which contain web pages that allow in exchanging information between the Web site and user. Additionally, storing updated record of alumni member also been provided. The scope of user involve for this project is the alumni and non-alumni that consist between the ANU administration and student of ANU itself In addition, this portal also open to general public who interested to browse around on certain information provided.It is more of a social networking website but one that concentrates or includes only the ANU alumni and ANU community. The system admin will be able to start a forum topic of which the registered members will be able to post their comments in the forum. Also the admin will be able to delete unwanted profiles and any kid of unwanted posted material by the members. Admin is also in control of creating student and lectures profile. The system also has the capability of members sending personal messages to one another e. g. alumni to alumni, alumni to admin, students to alumni and vice versa.The alumni are needed to sign up or register by inputting: Username, Password, Name, Graduation year, Program undertaken, Admission No, Phone No, Email address, Address, Current work and current Job status. Through this, they are able to interact with their former classmates and keep in touch after graduating from the prestigious university. This system will also motivate current students to perform exceptionally so as to be included in the bracket of successful alumni. The careers office and administration will then have easy access to Alumni contacts and their whereabouts. . 5 SYSTEM OBJECTIVES Th e main objective of developing this project is to create a system of a â€Å"middle person† entity, allowing alumni members and non-members to communicate virtually. Developing the portal gives a lot of benefits to alumni members, official faculty, students, lecturers and also general public. The benefit to: i. Alumni member Facilitate communication between alumni member and non-member. A communication platform for alumni could support both the information flow among faculty and alumni and among non-alumni.Existing platforms for supporting alumni interaction mainly provide address lists and news for alumni. ii. Administration Faculty Provide an easy way for tracking the alumni. Therefore, the faculty can get feedback from their graduate students. Furthermore, it improves contact with the alumni so that having maintained database of alumni record. iii. Students Enable alumni share positive career and life experiences with other student. Besides that, the alumni can mentor and advise the students. For example, alumni in certain career field can offer guidance to students who are pursuing the same field of work. v. Lecturers The lecturer is able to exchange information with the alumni member. Therefore, the lecturer may know whether they need to exchange, modify or maintain the contents of the courses. So that they can always deliver the right information for their student to fulfil the environment need from time to time. V. General Publics Allow in browsing around to get information or to find old or new friends among the alumni member where the purpose of it is to allow them to get the addresses of the alumni members. 1. 6 SCOPE OF THE SYSTEM.The proposed system will help automate the university operations of getting in touch with the alumni and alumni getting in touch with fellow alumni. The system then: i) Provide professional networking through the interaction of all faculty graduates. ii) Facilitate sharing of information with the alumni. iii) Able t o inform faculty happenings and events by inviting alumni to remain active in the Alumni Association and involve in faculty activities. iv) Provide updated records of addresses, employment, and other personal information about alumni. ) Provide stable communication between alumni and non-alumni (ANU community). vi) Help in the building of the Dau fraternity in the expansion of this community. vii) Set alumni as examples/role model/mentors to ongoing students. 1. 7 LIMITATIONS. The proposed system requires increased knowledge in IT such as network management, database management, html, user support and security, it also require more experiences in this kind of system development. Requires finances for research e. g. internet connection fee etc. 1. 8 BENEFICIARIES Those to benefit most from the new system include: ) The careers office; the department will be able to get into contact with the alumni since most of their contacts will be in their profile in alumni portal. b) The universi ty administration as a whole, administration will get to know how its own products are doing/performing in the outside world. c) Alumni themselves will benefit by keeping their bond strong and their friendship won’t be lost and also maintain close relationship with the university. d) Current students will be able to identify role models from the alumni portal and work to their goals and objectives in life. 1. 9 THEORETICAL FRAME WORKThe following theories would help deal/come up with the ANU Alumni Portal i. e. considering the evolution of the World Wide Web from Web 1. 0 to Web 2. 0 is creating subtle but profound changes in the ways people locate and access information, communicate with, and learn from each other. The changes in technologies are driving changes in human behaviour, interactions, and knowledge acquisition. The paradigms for learning have already evolved beyond traditional classroom models to synchronous and asynchronous, interactive, and collaborative learnin g, which is further extended by Web 2. tools and social networking approaches. However, recent developments in Web 2. 0 technologies are far outpacing the development of theoretical frameworks for their utilization in education and training. According to Kamel Boulos and Wheeler (2007), â€Å"the second incarnation of the Web (Web 2. 0) has been called the ‘Social Web’ because, in contrast to Web 1. 0, its content can be more easily generated and published by users, and the collective intelligence of users encourages more democratic use† (p. 2).This Alumni Portal takes a form of social networking of which it’s the practice of expanding knowledge by making connections with individuals of similar interests. In Web 2. 0 environments social networking is linked to technological services and software that make it possible for people to communicate with others from anywhere, at any time. Social networking refers to sites such as Facebook, MySpace, and Linkedin, where users set up a profile, create formal connections to people they know, communicate, and share preferences and interest.To make an ideal knowledge structure (social structure that can assume responsibility for developing and sharing knowledge) three elements are put together that is Domain, Community and Practice of which this system integrates to construct the Alumni Portal. The purpose of this system is to develop a theoretical framework to understand learning among groups of individuals that utilize social networking applications among the alumni and the university to working towards a common goal i. e. how groups of individuals can occasionally and under particular circumstances cast their thinking into a coherent whole.CHAPTER II LITERATURE REVIEW 2. 1 INTRODUCTION This chapter discusses detailed descriptions of the alumni portal and similar approaches of virtual communication, comprehensive, and critical discussion of each and other material related to the topic. 2. 2 Glo bal literature review The University of Malaysia known as USM has an alumni portal where the URL is http://www. usm. my/alumni/organisasi_main. asp. In developing the portal it uses Active Server Page (ASP) as server side scripting language together with mark-up language which is HTML. Java Script language uses in order display certain images and other things.The way of designing the portal is not so interactive, because it does not provide exchange information service between the web site and the user. The portal is more to static type of web site. Alumni web site for Kolej Agama Sultan Zainal Abidin is known as Laman Web Ex KUSZA (http://www. geocities. com/ex_kuzsa) from the website address, the web has been developing by using templates in Yahoo Geocities services. It offers very limited services and more to static web site. This web site does not have database because it does not involve storing data. 2. 3 Regional literature reviewAfter regional research on alumni portal, I ca me across the University Of Johannesburg Alumni Portal of which the developing of the portal uses Active Sever (ASP) as server side scripting language together with HTML. The portal design in home page consist of mixed use of fonts of which down grade the rating of the portal but for its functioning and its categories content is well fitted but it does not involve storing of data being one of its major lack. 2. 4 Local literature review After local research in several universities, no university within the country has an alumni portal.For example the University of Nairobi contains only description of what its alumni are but no interface or a way of interaction between its alumni and the university or interaction between its fellow alumni. (http://www. uonbi. ac. ke/node/132). It does not include data base what so ever 2. 5 Summary This chapter identified several literature reviews that related to alumni portal. Much of the literatures on portal are reporting descriptive personal exp eriences, not theoretical analyses. With developing portal that act as a one stop destination where all part of users use starting point to other resources on internet or intranet.Typically, this portal will provide many services such as search engine or directory, news, maps, email, forums and private messaging for university and the graduates' students who will use portal to gather together all the information to share with other, furthermore, is keep in touch with each other. ? CHAPTERIII RESEARCH METHODOLOGY 3. 1 INTRODUCTION This chapter is explanation on method and process used for research and system requirements needed for the development of the alumni portal for ANU, all of the information used for collecting research methodology. 3. 2 Locality of the ProjectThe project is being carried out at ANU, in CIS department section of system development desk. The proposed system will be web-based hence located/posted on the internet in ANU website with its. it will the students to understand material given, review sessions, and participate in conversations with lecturers. 3. 3 Population The population being focused on this system includes ANU students, its alumni and the lecturer basically the ANU community of approximately 5,000 people inclusive of all the campuses. Students who can be divided into: day scholars and boarders, lecturers who are divided into: part time and full time lecturers. . 4 Research techniques: 3. 4. 1 Sampling method Sampling is, â€Å"the process of collecting examples of the actual documents† (Systems Analysis and Design, 2010). The sampling method that will be used in this project system is the systematic random sampling of students which will involve selecting every tenth student for review so as to collect feedback concerning the proposed system in order to know what should be included and what should be discarded from the system. Undertaking sampling will also help to improve the effectiveness of information that will be obtained to be more accurate. . 4. 2 Interviews This will involve interviewing ANU community as whole i. e. current students, lecturers, ANU alumni and individuals that have knowledge on alumni, in order to evaluate their needs and preferences so that one can plan the best methods to use in the undertaking of his or her project in order to suit their needs. 3. 4. 3 Literature study This will involve consulting relevant ANU publications such as books, magazines and web pages that contain information of topic of the project inquiry and the relevant solution to the problem that one or that I will want to tackle.This will enable me to make a project that will ensure that all user needs are meet according to their preferences. 3. 4. 4 Observation This is a fact-finding technique that involves systematically selecting of ANU environment, watching and recording behavior and characteristics of objects or phenomena found within ANU community, seeing the system in action will give an addition al perspective and a better understanding on the systems procedure. This will allow the verifying of statements that will be made from interviews and determine whether the systems procedures will really operate as described.Observation will provide the knowledge needed to test or install future changes in the proposed system. 3. 5 The Platform: The System will be developed using a web application and databases. The content in our web application will be connected to a database. So the idea here is getting data into a database so that we can use it in our web application. The focus here will be bridging between the table schemas of a database and running them on web application and vice versa. 3. 5. 1 MySQL This provides a platform to develop the proposed systems database.MySQL is ideal for record storage from different platforms. It also has the capability of handling large system records. 3. 5. 2 PHP According to Mike McGrath (2002), he defines that PHP can be used to create intera ctive dynamic websites and is rapidly gaining in popularity because it is flexible, cross platform technology that provides amazingly powerful features. PHP can be used to dynamically generate the HTML code for a web page. PHP is embedded into the HTML code with the use of special tags, called Deli meters. By using the deli meters, many sections of PHP code are able to add to an HTML document.Embedding PHP code in HTML code makes it possible to enhance existing web pages on a web site. (Paul Whitehead, Joel Desamero, 2000). 3. 5. 3 HTML In computing, Hypertext Markup Language (HTML) is a Markup Language designed for the creation of web pages and other information viewable in a browser. The focus of HTML is on the presentation of information-paragraphs, fonts, italics, tables e. t. c. 3. 5. 4 CASE Tools These are computer aided software engineering tools that enables the developers to represent the system in form of flow charts, graphs and data flow diagrams CHAPTER IV SYSTEM ANALYSI S 4. 1 INTRODUCTION This is a step-by–step process for developing high-quality information systems (Systems Analysis and Design, 2010). In order to carry out system analysis researchers had to perform system analysis which basically is carrying out feasibility studies of the school. These include: 4. 1. 1 Technical Feasibility This includes an investigation of the technical resources of the ANU. The university IT department is not well established and it lacks enough man power and resources to support the system.The department has only nine computers, of which all of them are outdated thus the need to purchase more IT resources that will be able to withstand the proposed system. 4. 1. 2 Economic Feasibility This investigates the projected benefits of the proposed system outweighing the estimated cost usually considering the total cost of ownership. The proposed automated department system process will require some system maintenance cost. Budget ITEMSPRICE System analyst/IT c onsultantsKsh. 20,000 p. m 4 Computers Pentium ivKsh. 120,000 Adobe Flash media streaming server 4. 5Ksh. 30,400 Network interface cardsKsh. 9,000Adobe CS 5packageKsh. 60,000 TotalKsh. 239,400 4. 1. 3 Operational Feasibility This means that the proposed system will be used effectively after it has been developed. With the support of the IT department and the alumni who are key players in the proposed system will be used effectively. With the alumni portal the image of ANU will improve in terms of being a head in technology field and efficiency. 4. 1. 4 Schedule Feasibility This information system project is to be completed in 8weeks time. In this time we will be able to have completed the development of the project and tested it. 4. 2 Implementation PlanThe project is expected to take approximately 12 weeks in total. There are a total of 9 tasks that need to be implemented. The tasks have been grouped under each of the project objectives. This is as shown in the table below: TASKSDU TY System planningThis will involve analyzing, defining and coming up with a time schedule of the project which will be done by the developer. Preliminary InvestigationThis will involve determining if the project’s system proposal is worth pursing into analysis phase AnalysisAt this stage a detailed study of the current system in use will be undertaken that will lead to specifications of the new system.This will be done by a system analyst. DesignDesign will be based on the user requirements and the detailed analysis of the new system tools such as flowcharts, use case diagrams will be used. ImplementationThis is the conversion of theory to practical analysis. During this stage, all the programs of the system will be loaded on to the user’s computer also the testing of the system will be undertaken. this will be done by a technician consultant Testing and InstallationThe system will be tested and errors and bugs will be checked in order to create a perfect system.The c hange of the system will be direct change over-where the current system will be immediately replaced by the new system. PresentationThis is the last stage whereby I will present my project by explaining the processes, development, and approach about my project in detail. CHAPTER V 5. 1 SYSTEM DESIGN 5. 1 Use case diagram According to Shelly Rosenblatt â€Å"a use case diagram visually represents the interaction between users and an information system. The different actors in the proposed system will be the Administrator, Alumni, Students and Lecturer. ? 5. 2 Flow ChartA flow chart will show the flow of the data from the time the Alumni, Student, Lecturer and Administrator will be registering to the system to the time they finalize their process. 5. 3 Flow Diagrams (DFDs) They will be used in the proposed system to show the flow of the data collected from the time a alumni will register into the system and processed. The main entities will be the alumni, the student and the administ rator. There will also be processes and data stores which will process and store data respectively. a) Level 0 Diagram ? a) Level1 diagram CHAPTER VI 6. 1 CODING AND TESTING i) Home page: Welcome to Dau University Alumni PortalWelcome to Dau University Alumni Portal ; :: ANU Alumni Home Register Login User Info Edit Profile Search Alumni Directory Logout Contact Us Forum :: Welcome to Dau University Alumni Portal | Membership to this Portal is only available to ANU alumni. In order to take advantage of all that your community has to offer, you must register to establish a User ID and password. You only need to register for the community once. When you return on future visits, Enter your User ID and password when prompted. :: Features ;Find your Friends and Former School mates on ANU Alumni Portal ;Join the ANU Alumni nbsp;Search the Alumni Directory ;Change your Address ;Check out the latest issues ;Alumni Update ii) Registering of Alumni :: ANU Alumni Sign Up Form Welcome to Dau Un iversity Alumni Portal ; :: ANU alumni Home Register Login User Info Edit Profile Search Alumni Directory Logout Contact Us Forum :: ANU Alumni Sign Up Form ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;(Please Fill Form Correctly)Username: Password: Name: Year: Please Select Year Program: Please Select Program Session: Department: Admission No: Phone no: Current Postion: Job Status: Address: E mail: ; ;;;;; ; iii) Login iv) Forum page ? CONCLUSION The ANU Alumni Portal can provide significant benefits to alumni relationship management programme and play a key role in terms of,. An online community portal, such as GradNet, should be a dynamic, ever-changing information tool that constantly adapts according to its target audience’s information needs.It is therefore pivotal that continuous needs assessments of these alumni system is conducted. The ever-changing ways of how people conduct their lives need to be considered and explored if alumni portal want to come up with innovative ideas a nd programme that will accommodate and capitalize on these trends. If alumni organizations manage to create more value for their customers, the percentage of active participants, as well as the quality of alumni interaction in support of the institution, will improve. ? REFERENCES

Wednesday, October 23, 2019

Maya Angelou-“Still I rise”, Benjamin Zephaniah- “Miss World” and Grace Nichols-“Sugar Cane” Essay

By a close analysis of language, show how the poets convey their cultural heritage and experiences through their poems. This essay will compare the cultural backgrounds and the style of language these three black poets use to describe their experiences. They are: Maya Angelou-â€Å"Still I rise†, Benjamin Zephaniah- â€Å"Miss World† and Grace Nichols-â€Å"Sugar Cane† through their poems. These three poems were written by black poets. They all have a theme of standing up for yourself, fighting for your rights and being strong and overcoming pain and suffering. â€Å"Sugar Cane† is a poem about the life of a sugar cane that is grown and harvested. The poet personifies the sugar cane so the reader can associate more with the sugar cane, and there is a compelling desire for the reader to want to read the poem. â€Å"Miss World† is about a girl who is beautiful inside and does not want to be judged like an object in a show. The poem is written like a rap and so is inviting to younger people. This poem teaches that appearances are not important. â€Å"Still I Rise† is about a woman talking about all the hardships her ancestors had to endure and how she will prevail whatever is thrown at her. This poem is about standing tall and strong and not letting anyone put you down. In â€Å"Sugar Cane†, the poet uses very descriptive language that helps the reader visualise the sugar cane. For example, â€Å"indifferent hard and sheathed in blades†. These blades are the sharp leaves of the sugar cane. This image is of a strong object, capable of defending itself. The blades are a symbol of the black slaves, able to fight back against people, wanting to destroy them. The poet also uses language in a West Indian dialect, â€Å"he isn’t what he seem† and â€Å"he shiver like ague when it rain†. The poet uses personification to help the reader visualise the sugar cane as a thin g that matters, like a person. Later on in the poem, the poet uses, â€Å"he comes to learn the truth about himself, the crimes committed in his name†. This refers to the fact that the slaves were used to farm the sugar cane for â€Å"the white man† and died from over work, exhaustion and starvation. In â€Å"Miss World† the poet also uses words that rhyme if the reader is reading in a West Indian accent, â€Å"best for self-defence† â€Å"cause no grievance†. Ordinarily these would not rhyme, so the reader would know at once by reading this or â€Å"de† (the) or â€Å"day†(they) that this poem is written in a dialect. In â€Å"Still I Rise† the poet always speaks in correct English and shows that she is well educated and is articulate. She uses phrases like â€Å"Leaving behind nights of terror and fear, into a daybreak that’s wondrously clear†. Sugar Cane is grown in many countries where black people live, and so most of them work to harvest t he sugar cane. Sugar Cane grows through life and becomes old, â€Å"His colour is the aura of jaundice when he ripe†. This could mean that the black slaves are unhealthy as a product of mistreatment. After sugar cane is possibly ageing, he then dies when â€Å"the hurricane strike smashing him to pieces† whether it is the hurricane killing him, or the farmers harvesting with machetes, â€Å"either way he can’t survive†. In some countries, sugar cane is the only source of income. The Poet uses the sugar cane as a metaphor for black people trying to be strong and fight back against racism and to show that they are tough on the outside but sweet on the inside like the sugar cane. This is similar to â€Å"Miss World† where the theme of the poem is not to judge people by their looks, † You cannot judge my sister’s heart by looking†¦just by looking†¦just by looking at her breast†. The sister is described as being â€Å"beautiful† because she has a personality and is not superficial like the people who judge others, â€Å"just by looking†. Even though she is beautiful, she would rather fight for her rights then be treated like a slave or an object. In â€Å"Sugar Cane† when black people were slaves, they’re lives were full of suffering and misery; the poet shows this as a metaphor for the sugar cane growing through the earth, â€Å"Slowly painfully sugar cane pushes his knotted joints upwards from the earth slowly painfully he comes to learn the truth about himself, the crimes committed in his name â€Å". Similarly, in â€Å"Miss World† the poet conveys the sister’s hard life by saying that she is beautiful but â€Å"Her legs are firm and sharp best for self-defence†, showing that she has to defend herself. In â€Å"Still I Rise†, the poet describes a painful life, â€Å"out of the huts of history’s shame, I rise, up from a past that’s rooted in pain, I rise† this refers to the extreme pain and suffering this race went through. The poet talks about how she will overcome everything that is thrown at her and she will prevail. â€Å"You may shoot me with your words, you may cut me with your eyes, you may kill me with your hatefulness, but still like air, I’ll rise† The poet mentions power over the sugar cane, suggesting the slavery of the black race, â€Å"it is us who weed him in the earth in the first place† â€Å"we feel the need to strangle the life out of him†. These lines show that the farmers have power over whether sugar cane lives or dies. Similarly, the farmers have power over whether their slaves live or die. In â€Å"Miss World† the poet mentions slavery and that his sister does not want to be viewed like a slave at a slave market and give the judges power over her life, â€Å"day judge your lifetime by a quick interview†. In â€Å"Still I Rise†, the poet suggests that she is powerful, â€Å"welling and swelling I bear in the tide† There are also sexual references such as, in â€Å"Sugar Cane†, â€Å"smoothing stroking caressing al l his length shamelessly†. In â€Å"Miss World†, the poet writes that â€Å"her legs are firm and sharp† â€Å"she won’t walk the platform to upsex people’s lust†. In â€Å"Still I Rise†, the poet adds â€Å"I dance like I’ve got diamonds at the meeting of my thighs†. These sexually descriptive comments imply the stereotype of the black race as being very sexually active. These stereotypes include black men being virile and black people having a natural sense of rhythm. â€Å"Sugar Cane† is written in blank verse but has a very strong rhythm, â€Å"Slowly painfully sugar cane pushes his knotted joints upwards from the earth slowly painfully he comes to learn the truth about himself, the crimes committed in his name â€Å". The stanzas are in columns to look like a field of sugar cane. There is some repetition near the end with â€Å"slowly painfully†. This is probably used to emphasize the suffering of the black people. In â€Å"Miss World† the poem has a regular rhyme scheme. In other places the poem does not rhyme at all so this poem has an inconsistent rhyme scheme. There is an inconsistent stanza length throughout and there is one line that is long and sharp like a knife, which could be two short lines. â€Å"She could be out of sight but she would rather stay and fight†. This is a powerful line that stands out from the rest of the poem. There is some repetition on the last line, â€Å"by looking†¦just by looking†¦just by looking at her breast†. This is here to make the reader remember that it is what is inside that counts overall, not the outside. In â€Å"Still I Rise† each stanza is four lines long with a rhyme scheme where the second and fourth lines rhyme. This is consistent until the last two stanzas, where there is a line then â€Å"I Rise† then another line that rhymes with it, then two lines that rhyme. In the last stanza, it repeats â€Å"I Rise† at the end. This is here so it is a beacon of hope. Conclusion All these poems show the fact that black people suffered at the hands of other human beings and still do, just because the colour of their skin. These poems also show the fact that you do not have to let them take control of you or have power over you. You just have to remember†¦