Monday, September 30, 2019

Adolescent Rites of Passage

Bridging the Gap: Adolescent Rites of Passage General Purpose: To inform. Specific Purpose: At the end of my speech, my audience will understand how cultures use adolescent rites of passage to help people mark the transition from childhood to adulthood. Central Idea: Adolescent rites of passage have marked the passage of children into adulthood around the world, and elements of those rituals are being used in modern American society. INTRODUCTION How did you celebrate your eighteenth birthday? Do you recall your graduation ceremony?If you’re like most Americans, such events marked the moment you became an adult. It may have been the day you walked off a lighted stage, clutching your diploma to your chest. Yet if you were an Arunta from Australia, it might be the moment you rose off of the smoking tree branches you were lying upon and were proclaimed an adult. Regardless of which are the most personally significant, we all have moments in our life that we would consider â€Å" rites of passage†Ã¢â‚¬â€moments that carry us across the threshold between two lives.In societies around the world, collective rites of passage have been seen as ways to initiate young people into adult life. In researching on this topic, I have discovered the important role rites of passage play for youth around the world, and I would like to share this with you this afternoon. Today we will look at the ways in which cultures throughout the world have used rites of passage to mark the transition to adulthood for both boys and girls, and how elements of those rituals are being used today in American society. Transition)To begin, let’s look at some of the different rites of passage from around the world that show traditional coming-of-age ceremonies in other cultures that are the basis for new American rituals. BODY I. Rites of Passage in Cultures: Puberty is often a signal in most cultures that a boy or girl is ready to become an adult.A. The Navajo of the American Sou thwest celebrate this milestone with the vision quest. 1. The ritual begins when a fifteen to sixteen-year- old boy is taken into a sweat lodge, where he will be purified in both body and soul before he begins his quest. . During the period before he leaves he will also be advised by a medicine man regarding his coming quest. 3. Finally, he ventures into the wilderness or desert on his own, fasting until he receives a vision that will determine his new name and the direction of his life. 4. When he receives his vision, the community welcomes him back as a man (Transition)Like their male counterparts in the Navajo, females also have special coming of age rituals. B. The Okrika of Nigeria celebrate coming of age with the Iria ceremony for seventeen-year-old girls. 1.The highlight of this ritual is when the girls enter the â€Å"Fattening Room. † 2. Only leaving to travel to the river, the girls stay in the rooms to gain the weight that the tribe considers attractive. Girls are forced to eat large quantities of food. 3. Female friends and family teach the girls how a woman should act. 4. When a girl leaves the Fattening Room, she is considered a woman. (Transition)These examples of the rites of passage for Navajo males and Okrika females show us how different cultures mark the transition from childhood to adult status in the community.Now let’s look at the increasing popularity of traditional rites of passage in the United States. II. Increase in Rites of Passage in United States: The United States is an ethnic melting pot of cultures and traditions. A. Yet our diversity prevents us from having a single experience, common to all, that celebrates our entrance into the adult community. 1. Some ceremonies are religion specific, such as Jewish Bar and Bat Mitzvahs or Christian baptisms and confirmations. 2. Many children, without religious or ethnic heritage, have no sort of recognition outside of high school graduations—if they choose to graduat e.Yet Cassandra Delaney writes about graduates, â€Å"They often are not equipped with the necessary components of a stable adult personality such as a well-reasoned moral code, a faith or world review which sustains them during crisis, and perhaps most importantly, a positive and cohesive self image. † B. With this problem in mind, many Americans are turning to tribal traditions like the ones described earlier to help their children have a positive rite of passage. 1. The African-American community is turning back to its cultural roots to aid social ills among young males. a.The MAAT Program attempts to instruct at-risk African-American males on social behavior through sessions with older mentors that incorporate African tribal tradition. b. Program sessions begin by prayer and an offering of a drink to the ancestors. c. At the end of the program, writes Aminifu Harvey and Julia Rauch of Health and Social Work magazine, the boys â€Å"mark their passage to manhood by giving themselves another African name, based on their personality, at the final retreat. † d. In this way, African-Americans use the rite of passage concept to develop a positive sense of identity for youth. . Even in Washington State, rites of passage are growing. a. An article in the Spokane Spokesman-Review by Jeanette White tells of Stan Crow, who runs a three-week program called â€Å"The Coming of Age Journey. † b. Here activities include challenging hikes and â€Å"vision quest† style nights alone in the wilderness in an attempt to promote self-reliance. c. Rites of passage like these, says psychologist Michael Gurian in the Spokesman-Review article, promote positive self-image because they force children to develop skills to meet challenges, to reflect on goals, and to learn leadership. . In Washington and the entire United States, rites of passage are becoming more popular as a way to fulfill the spiritual and moral needs of youth while identifying them to a community. CONCLUSION In conclusion, adolescent rites of passage mark the transition to adulthood. In the United States, questions have been raised as to whether rites of passage like those used by Africans, Native Americans, or others might be useful in helping with social problems. Some programs have attempted to experiment with the positive potential impact of rites of passage in modern American society.Though coming-of-age ceremonies do not automatically make us adults, they are the milestones of a maturing process we are all on. Think again about what you consider to be your â€Å"rite of passage. † Did the license, the diploma, or the keys to your dorm or apartment make you an adult? Perhaps some are yet mired in that no-man’s land called adolescence. Yet it one day might be different. Your child might one day swelter in a Western-style sweat lodge or eat in the Fattening Room; your child might depart on a vision quest.Regardless of the method, bridging the gap b etween childhood and adulthood is , and will always be , one of the most universal and important milestones of human life. BIBLIOGRAPHY â€Å"Coming of Age as an Australian Aruntas. † Michigan Jewish Online Education. 1999. Jewish Federation of Metropolitan Detroit. 9 October 2000 . â€Å"Coming of Age in the Navajo Nation. † Michigan Jewish Online Education. 1999. Jewish Federation of Metropolitan Detroit. 9 October 2000 . Delaney, Cassandra Halleh. â€Å"Rites of Passage in Adolescence. † Adolescence 30 (Winter 1995): 891. Elan, Jessica. A Cross-Cultural Comparison of Puberty Rites and Ceremonies for Females. † The Oxford Review. 5 May 1998. Oxford College of Emory University. 8 Oct. 2000 . Harvey, Aminifu R. and Julia B. Rauch. â€Å"A comprehensive Afrocentric rites of passage program for black male adolescents. † Health and Social Work 22. 1 (Feb. 1997): 30-37. White, Jeanette. â€Å"Too few of today’s children experience traditional ri tes of passage, experts say. † Spokesman-Review 4 July 2000: A1. ———————– Emphasize Pause Put on First Visual Pause Use Visual #2– Pause Gesture 1,2,3†¦ Gesture 1,2,3†¦ Slower

Sunday, September 29, 2019

Ooad Lab Manual

Ex. no: 1 STUDY OF UML DIAGRAMS Date: UML DIAGRAMS There are three classifications of UML diagrams: †¢ Behavior diagrams. A type of diagram that depicts behavioral features of a system or business process. This includes activity, state machine, and use case diagrams as well as the four interaction diagrams. †¢ Interaction diagrams. A subset of behavior diagrams which emphasize object interactions. This includes communication, interaction overview, sequence, and timing diagrams. †¢ Structure diagrams. A type of diagram that depicts the elements of a specification that are irrespective of time. This includes class, composite structure, component, deployment, object, and package diagrams. |Diagram |Description |Learning Priority | |Activity Diagram |Depicts high-level business processes, including data flow, or to model the |High | | |logic of complex logic within a system. | |Class Diagram |Shows a collection of static model elements such as classes and types, their |High | | |contents, and their relationships. | | |Communication Diagram |Shows instances of classes, their interrelationships, and the message flow |Low | | |between them. Communication diagrams typically focus on the structural | | | |organization of objects that send and receive messages. Formerly called a | | | |Collaboration Diagram. | | |Component Diagram |Depicts the components that compose and application, system, or enterprise. |Medium | | |The components, their interrelationships, interactions, and their public | | | |interfaces are depicted. | |Composite Structure Diagram |Depicts the internal structure of a classifier(such as a class, component, or|Low | | |use case), including the interaction points of the classifier to other parts | | | |of the system. | | |Deployment Diagram |Shows the execution architecture of systems. This includes nodes, either |Medium | | |hardware or software execution environments, as well as the middleware | | | |connecting them. | | |Interaction Overview Diagram |A variant of an activity diagram which overviews the control flow within a |Low | | |system or business process. Each node/activity within the diagram can | | | |represent another interaction diagram. | |Object Diagram |Depicts objects and their relationships at a point in time, typically a |Low | | |special case of either a class diagram or a communication diagram. | | |Package Diagram |Show how model elements are organized into packages as well as the |Low | | |dependencies between packages. | |Sequence Diagram |Models the sequential logic, in effect the time ordering of messages between |High | | |classifiers. | | |State Machine Diagram |Describes the states an object or interaction may be in, as well as the |Medium | | |transitions between states. Formerly referred to as a state diagram, state | | | |chart diagr am, or a state-transition diagram. | |Timing Diagram |Depicts the change in state or condition of a classifier instance or role |Low | | |over time. Typically used to show the change in state of an object over time | | | |in response to external events. | | |Use Case Diagram |Shows use cases, actors, and their interrelationships. |Medium | USE CASE DIAGRAM: A use case diagram is a type of behavioral diagram defined by the Unified Modeling Language (UML). Its purpose is to present a graphical overview of the functionality provided by a system in terms of actors, their goals- represented as use cases- and any dependencies between those use cases. Use case diagram depict: †¢ Use cases. A use case describes a sequence of actions that provide something of measurable value to an actor and is drawn as a horizontal ellipse. †¢ Actors. An actor is a person, organization, or external system that plays a role in one or more interactions with your system. Actors are drawn as stick figures. †¢ Associations. Associations between actors and use cases are indicated in use case diagrams by solid lines. An association exists whenever an actor is involved with an interaction described by a use case. Associations are modeled as lines connecting use cases and actors to one another, with an optional arrowhead on one end of the line. The arrowhead is often used to indicating the direction of the initial invocation of the relationship or to indicate the primary actor within the use case. The arrowheads are typically confused with data flow and as a result I avoid their use. System boundary boxes (optional). You can draw a rectangle around the use cases, called the system boundary box, to indicate the scope of your system. Anything within the box represents functionality that is in scope and anything outside the box is not. System boundary boxes are rarely used, although on occasion I have used them to identify which use cases will be delivered in each major release of a system. †¢ Packages (o ptional). Packages are UML constructs that enable you to organize model elements (such as use cases) into groups. Packages are depicted as file folders and can be used on any of the UML diagrams, including both use case diagrams and class diagrams. I use packages only when my diagrams become unwieldy, which generally implies they cannot be printed on a single page, to organize a large diagram into smaller ones. [pic] RELATIONSHIPS IN USE CASE DIAGRAM: Three relationships among use cases are supported by the UML standard, which describes graphical notation for these relationships. Include In one form of interaction, a given use case may include another. The first use case often depends on the outcome of the included use case. This is useful for extracting truly common behaviors from multiple use cases into a single description. The notation is a dashed arrow from the including to the included use case, with the label â€Å"†. This usage resembles a macro expansion where the included use case behavior is placed inline in the base use case behavior. There are no parameters or return values. Extend In another form of interaction, a given use case, (the extension) may extend another. This relationship indicates that the behavior of the extension use case may be inserted in the extended use case under some conditions. The notation is a dashed arrow from the extension to the extended use case, with the label . This can be useful for dealing with special cases, or in accommodating new requirements during system maintenance and extension. To make the points at which extension may occur explicit extension points may be defined in use cases which are listed in a compartment below the use case name. Generalization In the third form of relationship among use cases, a generalization/ specialization relationship exists. A given use case may be specialized form of an existing use case. The notation is a solid line ending in a hollow triangle drawn from the specialized to the more general use case. This resembles the object-oriented concept of sub-classing, in practice it can be both useful and effective to factor common behaviors, constraints and assumptions to the general use case, describe them once, and deal same as except details in the specialized cases. SEQUENCE DIAGRAM: The well-known Message Sequence Chart technique has been incorporated into the Unified Modeling Language (UML) diagram under the name of Sequence Diagram. A sequence diagram shows, as parallel vertical lines, different processes or objects that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the order in which they occur. This allows the specification of simple runtime scenarios in a graphical manner. Sequence diagrams are typically used to model: 1. Usage scenarios. A usage scenario is a description of a potential way your system is used. The logic of a usage scenario may be part of a use case, perhaps an alternate course. It may also be one entire pass through use case, such as the logic described by the basic course of action or a portion of the basic course of action, plus one or more alternate scenarios. The logic of a usage scenario may also be a pass through the logic contained in several use cases. For example, a student enrolls in the university, and then immediately enrolls in three seminars. 2. The logic of methods. Sequence diagrams can be used to explore the logic of a complex operation, function, or procedure. One way to think of sequence diagrams, particularly highly detailed diagrams, is a visual object code. 3. The logic of services. A service is effectively a high-level method, often one that can be invoked by a wide variety of clients. This includes web-services as well as business transactions implemented by a variety of technologies such as CICS/COBOL or CORBA-compliant object request brokers (ORBs). [pic] ACTIVITY DIAGRAM: In the Unified Modeling Language, an activity diagram represents the business and operational step-by-step workflows of components in a system. An activity diagram shows the overall flow of control. Describing the basic notations: †¢ Initial node. The filled in circle is the starting point of the diagram. An initial node isn’t required although it does make it significantly easier to read the diagram. †¢ Activity final node. The filled circle with a border is the ending point. An activity diagram can have zero or more activity final nodes. †¢ Activity. The rounded rectangles represent activities that occur. An activity may be physical, such as Inspect Forms, or electronic, such as Display Create Student Screen. †¢ Flow/edge. The arrows on the diagram. Although there is a subtle difference between flows and edges I have never seen a practical purpose for the difference although I have no doubt one exists. I’ll use the term flow. Fork. A black bar with one flow going into it and several leaving it. This denotes the beginning of parallel activity. †¢ Join. A black bar with several flows entering it and one leaving it. All flows going into the join must reach it before processing may continue. This denotes the end of parallel processing. †¢ Condition . Text such as [Incorrect Form] on a flow, defining a guard which must evaluate to true in traverse the node. †¢ Decision. A diamond with one flow entering and several leaving. The flows leaving include conditions although some modelers will not indicate the conditions if it is obvious. Merge. A diamond with several flows entering and one leaving. The implication is that one or more incoming flows much reach this point until processing continues, based on any guards on the outgoing flow. †¢ Partition. Activity Diagram is organized into many partitions, also called swim lanes, indicating who/what is performing the activities (the Applicant, Registrar, or System). †¢ Sub-activity indicator. The rake in the bottom corner of an activity, such as in the Apply to University activity, indicates that the activity is described by a more finely detailed activity diagram. †¢ Flow final. The circle with the X through it. This indicates that the process stops at this point. [pic] CLASS DIAGRAM: In the Unified Modeling Language (UML), a class diagram is a type of static structure diagram that describes the structure of a system by showing the system’s classes, their attributes, and the relationships between the classes. Relationships A relationship is general term covering the specific types of logical connections found on class and object diagrams. UML shows the following relationships: †¢ Instance-Level Relationships o Link A Link is the basic relationship among objects. It is represented as a line connecting two or more object boxes. It can be shown on an object diagram or class diagram. A link is an instance or an association. o Association An Association represents a family of links. Binary associations (with two ends) are normally represented as a line, with each end connected to a class box. Higher order associations can be drawn with more than two ends. In such cases, the ends are connected to a central diamond. An association can be named, and the ends of an association can be adorned with role names, ownership indicators, multiplicity, visibility, and other properties. There are five different types of association. Bi-directional and uni-directional associations are the most common ones. For instance, a flight class is associated with a plane class bi-directionally. Associations can only be shown on class diagrams. o Aggregation Class diagram showing Aggregation between two classes Aggregation is a variant of the â€Å"has a† or association relationship; composition is more specific than aggregation. As a type of association, an aggregation can be named and have the same adornments that an association can. However, an aggregation may not involve more than two classes. Aggregation can occur when a class is a collection or container of other classes, but where the contained classes do not have a strong life cycle dependency on the container—essentially, if the container is destroyed, its contents are not. In UML, it is graphically represented as a clear diamond shape on the containing class end of the tree of lines that connect contained class(es) to the containing class. o Composition Composition is a stronger variant of the â€Å"has a† or association relationship; composition is more specific than aggregation. Composition has a strong life cycle dependency between instances of the container class and instances of the contained class(es): If the container is destroyed, every instance that it contains is destroyed as well. The UML graphical representation of a composition relationship is a filled diamond shape on the containing class end of the tree of lines that connect contained class(es) to the containing class. o Differences between Composition and Aggregation The whole of a composition must have a multiplicity of 0.. 1 or 1, indicating that a part must be for only one whole. The whole of an aggregation may have any multiplicity. When attempting to represent real-world whole-part relationships, e. g. , an engine is part of a car, the composition relationship is most appropriate. However, when representing a software or database relationship, e. g. , car model engine ENG01 is part of a car model CM01, an aggregation relationship is best, as the engine, ENG01 may be also part of a different car model, CM02. This is often called a â€Å"catalog† relationship. †¢ Class Level Relationships o Generalization Class diagram showing generalization between one super class and two subclasses The generalization relationship indicates that one of the two related classes (the subtype) is considered to be a specialized form of the other (the supertype) and supertype is considered as GENERALIZATION of subtype. In practice, this means that any instance of the subtype is also an instance of the supertype. The relationship is most easily understood by the phrase ‘A is a B’. The UML graphical representation of a Generalization is a hollow triangle shape on the supertype end of the line (or tree of lines) that connects it to one or more subtypes. The generalized relationship is also known as the inheritance or â€Å"is aâ€Å" relationship. The supertype in the generalization relationship is also known as the â€Å"parent†, super class, base class, or base type. The subtype in the generalization relationship is also known as the â€Å"child’, subclass, derived class, derived type, inheriting class, or inheriting type. †¢ Generalization-Specialization relationship A is a type of B E. g. †an oak is a type of tree†, â€Å"a sedan is a type of vehicle† o Realization In UML modeling, a realization relationship is relationship between model elements, in which one model element (the client) realizes the behavior that the other model element (the supplier) specifies. A realization is displayed in the diagram editor as a dashed line with an unfilled arrowhead towards the supplier. †¢ General Relationship o Dependency(UML) A dependency exists between two defined elements if a change to the definition of one would result in a change to the other. This is indicated by a dashed pointing from the dependent to the independent element. Several named varieties exist. A dependency can be between instances, class, or both. †¢ Multiplicity The association relationship indicates that (at least) one of the two related classes makes reference to the other. In contrast with the generalization relationship, this is most easily understood through the phrase ‘A has a B’{a mother cat has kittens, kittens have a mother cat}. The UML representation of an association is a line with an optional arrowhead indicating the role of the object(s) in the relationship, and an optional notation at each end indicating the multiplicity of instances of that entity ( the number of objects that participate in the association). Common multiplicities are: Indicator Meaning 0.. No instances, or one instance(optional, may) 1 Exactly one instance 0.. * or * Zero or more instances 1.. * One or more instances(at least one) n Exactly n instances(n>1) 0.. n Zero or n instances(n>1) 1.. n One or n instances(n>1) [pic] COMPONENT DIAGRAM: In the Unified Modeling Language, a component diagram depicts how a software system is split up into physical components and shows the dependencies among these components. Physical components could be, for example, files, header, link libraries, modules, executables, or packages. Component diagrams can be used to model and document any system’s architecture. Component diagrams are particularly useful with larger teams. Your initial architectural modeling efforts during cycle 0 should focus on identifying the initial architectural landscape for your system. UML component diagrams are great for doing this as they enable you to model the high-level software components, and more importantly the interfaces to those components. Once the interfaces are defined, and agreed to by your team, it makes it much easier to organize the development effort between sub teams. You will discover the need to evolve the interfaces to reflect new requirements or changes to your design as your project progresses, changes that need to be negotiated between the sub teams and then implemented appropriately. [pic] INTRODUCTION TO RATIONAL ROSE Rational rose Rational Rose is an object-oriented Unified Modeling Language(UML) software design tool intended for visual modeling and component construction of enterprise-level software applications. In much the same way a theatrical director blocks out a play, a software designer uses Rational rose to visually create(model) the framework for an application by blocking out classes with actors(stick figures), use case elements(ovals), objects(rectangles) and messages/relationships(arrows) in a sequence diagram using drag-and-drop symbols. Rational Rose documents the diagram as it is being constructed and then generates code in the designer’s choice of C++, Visual Basic, Java, Oracle8,CORBA or Data Definition Language. Two popular features of Rational Rose are its ability to provide iterative development and round-trip engineering. Rational Rose allows designers to take advantage of iterative development(sometimes called evolutionary development) because the new application can be created in stages with the output of one iteration becoming the input to the next. (This is in contrast to waterfall development where the whole project is completed from start to finish before a user gets to try it out. ) Then, as the developer begins to understand how the components interact and makes modifications in the design, Rational Rose can perform what is called â€Å"round-trip engineering† by going back and updating the rest of the model to ensure the code remains consistent. Rational rose is extensible, with downloadable add-ins and third-party applications. It supports COM/DCOM(ActiveX), JavaBeans, and Corba component standards. Views in UML/Rational Rose There are four views for a model created in Rational Rose, each representing the system from a different point of view. The Use Case View The use case view contains the diagrams used in analysis(use case, sequence, and collaboration), and all the elements that compromise these diagrams(e. g. , actors). More recent versions of Rational Rose also allow for additional documentation in the form of word-processed documents and/or URLs to Web-based materials. The purpose of the use case view is to envisage what the system must do, without dealing with the specifics of how it will be implemented. Logical View The logical view contains the diagrams used in object design(class diagrams and state transition diagrams). It offers a detailed view of how the system envisaged in the use case view will be implemented. The basic element in this view is the class, which includes an outline of its attributes and operations. This directly corresponds to a class created in your chosen implementation language. From the logical view, skeletal code can be generated for implementation into a computer language. More recent versions of Rational Rose not only can generate skeletal code for Visual C++, Visual Java, or Visual BASIC, but also reverse engineer programs created in these languages into Rational Rose models. This allows existing components to be included in documented models, if there is access to the source code. In addition, changes that need to be made during implementation can be reflected in the documentation of the design model. Component View The component view is a step up from the logical view and contains diagrams used in system design(component diagrams). This includes information about the code libraries, executable programs, runtime libraries, and other software components that comprise the completed systems. Components can be pre-existing; for example, a Windows program in Visual C++ will utilize Microsoft Foundation Class to provide the framework for the Windows interface. Components that do not exist and need to be created by the developers will have to be designed in the logical view. Deployment View The deployment view illustrates how the completed system will be physically deployed. This view is necessary for complex applications in which a system will have different components located on different machines. For example, interface components may be located on a user machine while other components may be located on a network server. INTRODUCTION TO VISUAL BASIC Visual Basic (VB) is an event driven programming language and associated development environment from Microsoft for its COM programming model. Visual Basic was derived from BASIC and enables the rapid application development(RAD) of graphical user interface(GUI) applications, access to databases using DAO, RDO, or ADO, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. LANGUAGE BASICS: Visual Basic was designed to be easy to learn and use. The language not only allows programmers to create simple GUI applications, but can also develop fairly complex applications as well. Programming in VB is a combination of visually arranging components or controls on a form, specifying attributes and actions of those components, and writing additional lines of code for more functionality. Since default attributes and actions are defined for the components, a simple program can be created without the programmer having to write many lines of code. Performance problems were experienced by earlier versions, but with faster computers and native code compilation this has become less of an issue. Forms are created using drag and drop techniques. A tool is used to place controls (e. g. , text boxes, buttons, etc. ) on the form (window). Controls have attributes and event handlers associated with them. Default values are provided when the control is created, but may be changed by the programmer. Many attribute values can be modified during run time based on user actions or changes in the environment, providing a dynamic application. For example, code can be inserted into the form resize event handler to reposition a control so that it remains centered on the form, expands to fill up the form, etc. By inserting code into the event handler for a keypress in a text box, the program can automatically translate the case of the text being entered, or even prevent certain characters from being inserted. Unlike many other programming languages, Visual Basic is generally not case sensitive, although it will transform keywords into a standard case configuration and force the case of variable names to conform to the case of the entry within the symbol table entry. String comparisons are case sensitive by the default, but can be made case insensitive if so desired. The Visual Basic compiler is shared with other Visual Studio languages(C, C++), but restrictions in the IDE do not allow the creation of some targets (Windows model DLL’s) and threading models. Result: Thus the UML diagrams and introduction to Visual Basic was studied. PASSPORT AUTOMATION SYSTEM Ex. No: 2. a Date: Aim: To Study the software requirements specification for passport automation system. Problem Statement Passport Automation System is used in the effective dispatch of passport to all of the applicants. This system adopts a comprehensive approach to minimize the manual work and schedule resources, time in a cogent manner. The core of the system is to get the online registration form (with details such as name, address etc. ,)   filled by the applicant whose testament is verified for its genuineness by the Passport Automation System with respect to the already existing information in the database. This forms the first and foremost step in the processing of passport application. After the first round of verification done by the system, the information is in turn forwarded to the regional administrator's (Ministry of External Affairs) office. The application is then processed manually based on the report given by the system, and any forfeiting identified can make the applicant liable to penalty as per the law. The system also provides the applicant the list of available dates for appointment to ‘document verification' in the administrator's office, from which they can select one. The system forwards the necessary details to the police for its separate verification whose report is then presented to the administrator. The administrator will be provided with an option to display the current status of application to the applicant, which they can view in their online interface. After all the necessary criteria has been met, the original information is added to the database and the passport is sent to the applicant. Software Requirements Specification 1. 0 Introduction Passport Automation System is an interface between the Applicant and the Authority responsible for the Issue of Passport. It aims at improving the efficiency in the Issue of Passport and reduce the complexities involved in it to the maximum possible extent. 1. 1 Purpose If the entire process of ‘Issue of Passport' is done in a manual manner then it would take several months for the passport to reach the applicant. Considering the fact that the number of applicants for passport is increasing every year, an Automated System becomes essential to meet the demand. So this system uses several programming and database techniques to elucidate the work involved in this process. As this is a matter of National Security, the system has been carefully verified and validated in order to satisfy it. 1. 2 Scope †¢ The System provides an online interface to the user where they can fill in their personal details and submit the necessary documents (may be by scanning). The authority concerned with the issue of passport can use this system to reduce his workload and process the application in a speedy manner. †¢ Provide a communication platform between the applicant and the administrator. †¢ Transfer of data between the Passport Issuing Authority and the Local Police for verification of applicant's information. †¢ Users/Applicants will come to know their status of application and the date in which they must subject themselves for manual document verification. 1. Definitions, Acronyms and the Abbreviations  Ã‚  Ã‚     Ã‚  Ã‚   †¢ Administrator – Refers to the super user who is the Central Authority who has been vested with the privilege to manage the entire system. It can be any higher official in the Regional Passport Office of Ministry of External Affairs. †¢ Applicant – One who wishes to obtain the Passport. †¢ PAS – Refers to this Passport Automation System. †¢ HTML – Markup Language used for creating web pages. †¢ J2EE – Java 2 Enterprise Edition is a programming platform and it is the partof the java platform for developing and running distributed java applications. HTTP – Hyper Text Transfer Protocol. †¢ TCP/IP – Transmission Control Protocol/Internet Protocol is the communication protocol used to connect hosts on the Internet. 1. 4 References IEEE Software Requirement Specification format. 1. 5 Technologies to be used †¢ HTML†¢ JSP†¢ Javascript †¢ Java†¢ XML†¢ AJAX 1. 6 Tools to be Used †¢ Eclipse IDE ( Integrated Development Enivronment) †¢ Rational Rose tool ( for developing UML Patterns) 1. 7 Overview SRS includes two sections overall description and specific requirements – Overall description will describe major role of the system components and inter-connections. Specific requirements will describe roles & functions of the actors. 2. 0 Overall Description 2. 1 Product Perspective The PAS acts as an interface between the ‘applicant' and the ‘administrator'. This system tries to make the interface as simple as possible and at the same time not risking the security of data stored in. This minimizes the time duration in which the user receives the passport. 2. 2 Software Interface †¢ Front End Client – The applicant and Administrator online interface is built using JSP and HTML. The Administrators's local interface is built using Java. †¢ Web Server – Glassfish application server(Oracle Corporation). Back End – Oracle database. 2. 3 Hardware Interface The server is directly connected to the client systems. The client systems have access to the database in the server. 2. 4 System Functions †¢ Secure Registration of information by the Applicants. †¢ Schedule the applicants an appointment for manu al verification of original documents. †¢ Panel for Passport Application Status Display by the Administrator. †¢ SMS and Mail updates to the applicants by the administrator. †¢ Administrator can generate reports from the information and is the only authorized personnel to add the eligible application information to the database. . 5 User Characteristics †¢ Applicant – They are the people who desires to obtain the passport and submit the information to the database. †¢ Administrator – He has the certain privileges to add the passport status and to approve the issue of passport. He may contain a group of persons under him to verify   Ã‚  Ã‚     Ã‚  Ã‚     Ã‚  Ã‚   the documents and give suggestion whether or not to approve the dispatch of passport. †¢ Police – He is the person who upon receiving intimation from the PAS, perform a personal verification of the applicant and see if he has any criminal case against him before or at present. He has been vetoed with the power to decline an application by suggesting it to the Administrator if he finds any discrepancy with the applicant. He communicates via this PAS. 2. 6   Constraints †¢ The applicants require a computer to submit their information. †¢ Although the security is given high importance, there is always a chance of intrusion in the web world which requires constant monitoring. †¢ The user has to be careful while submitting the information. Much care is required. 2. 7 Use Case Model Description The usecase model is a representation of the interaction between the users and the system. It captures the goals of the users and the responsibility of the system to the users. It is a special flow of events through the system. Grouping of usecases can manages the complexities and reduce the number of usecases in the package. The usecase model describes the uses of the system and show the courses of events that can be performed. A usecase is an interaction between user and system; it captures the goals of the user and the responsibility of the system to its users. It defines what happens in the system when the usecase is performed. 2. 8   Assumptions and Dependencies The Applicants and Administrator must have basic knowledge of computers and English Language. †¢ The applicants may be required to scan the documents and send. Result: Thus the software requirements specification for passport automation system was studied. Gantt Chart for Passport Automation System Ex No : 2. b Date: Aim: To develop a risk management and project plan for passport automation system using Gantt Chart. Introduction: A Gantt chart is a type of bar chart that illustrates a project schedule. Gantt charts illustrate the start and finish dates of the terminal elements and summary elements of a project. Terminal elements and summary elements comprise the work breakdown structure of the project. Some Gantt charts also show the dependency (i. e. , precedence network) relationships between activities. Gantt charts can be used to show current schedule status using percent-complete shadings and a vertical â€Å"TODAY† line as shown here. [pic] Passport Automation System For the project, the activities considered are: 1. Requirement Analysis 2. Literature Survey and Specification 3. Preliminary Design 4. Detailed Design 5. Testing 6. Operation and Maintenance [pic] Result: Thus the risk management and project plan for passport automation system was designed using Gantt Chart. EX. NO:2 c DATE: PASSPORT AUTOMATION SYSTEM AIM: To analyze and design a system for Passport Automation using Rational Rose tool. 1. PROBLEM STATEMENT To create a software system for the applicant(s), applying for the passport by verifying the information provided by them. 2. OVERALL DESCRIPTION The modules are for 1. Applicant Applicant has to provide the information like Name, Gender, Age, Qualification, Parents’ Name, Communication address, Phone no, etc. Also, they need to provide the DD details. . Passport Issuing Authority This system will verify the details provided by the applicant. And check whether the applicant is provided with passport or not. The details of the applicant are stored in the Database. 3. Database This will store the details of the applicant for future reference. 2. 1 SOFTWARE REQURIEMENTS 1. Rational Rose 2. 2 HARDWARE REQURIMENTS 1. 128MB RAM 2. Pentium III Processor 3. DESIGN 1. USE CASE DIAGRAM [pic] 3. 2 CLASS DIAGRAM [pic] 3. 2 SEQUENCE DIAGRAM [pic] 3. 3 COLLABORATION DIAGRAM [pic] 3. 4 COMPONENET DIAGRAM [pic] JAVA CODING: Database. java ublic class database { private int applicantDetails; public database() { } public void storeTheDetails() { } public void issueDetailsToAuthortiy() { } } Applicant. java public class APPLICANT { private int firstName; private int surname; private int Sex; private int DOB; private int placeOfBirth; private int district; private int qualification; private int height; private int weight; private int presnetAddress; private int permanentAddress; private int fathersName; private int mothersName; private int emailId; private int phoneNumber; private int DDNO; private int DDDATE; ublic passportIssueAuthority thePassportIssueAuthority; } public APPLICANT() { } PassportIssueAuthority. java public class passportIssueAuthority { private int authorityName; private int authorityId; private int work Place; public APPLICANT theAPPLICANT; public database theDatabase; public passportIssueAuthority() {} public void issuePassport() { } public void verify() { } public void cancellation() { } } RESULT: Thus the UML diagrams for Passport Automation System was analyzed and designed using Rational Rose. EXNO:3 DATE:BOOK BANK 1. OBJECTIVE: a. To implement book bank system online. . To provide the students with the information on books and scheduled times of book rental available. c. To ensure validity and security in the online book bank management system. 2. SCOPE OF THE PROJECT: The book bank system project is a software tool created to help and access the students gather required information about the various books in the institution the project is web based interactive application. Focus is laid solely on the book display,schedule,categories,syllabus and payment as per required. 3. PROJECT DESCRIPTION: USER PERSONAL AND CHARACTERISTICS: The target client for our software are students who lively are interested in rental of books be it either from engineering or medical genre in the institution. They can log into our website and browse the courses which they have aspiration to study. The student must register themselves online,which is free. The booking or reservation of the books is online,the detailed description about their book package and necessary terms and condition norms would be emailed to the students registered email address which he/she may provide during the time of registration. PRODUCT PERSPECTIVE: This product requires a web browser which is capable of playing flash media. †¢ This program will not be dependent on any other software and is not a component of another program. †¢ This program does not require any new hardware. 4. REQUIREMENTS: (a). FUNCTIONAL REQUIREMENTS: A functional requirement defines a function of a software system on its component. A function is described as a set of inout ,the behaviour and output. i. A main menu including a brief help section. ii. Login iii. Viewing book details. iv. Displaying details. v. Maintain and update book details. vi. Logout. . REQUIREMENTS: The system should have the requirements of the project. The developer should prepare the requirements of the project. The should prepare the requirements which are need for the software. 2. ANALYSIS: Analyze the requirements whether it provides proper operations/output and performs the task. 3. DESIGN: Project manager should design the layout of the project before going to implement time allocation,cost allocation and staff allocation wil coming under design process. 4. IMPLEMENTATION: After encomposing all the diagrams,we have to generate code for each and every diagrams i. from usecase to deployment. 5. TESTING: Afteer implementing the diagram with domain language,we have to test the particular projects. 6. MAINTAINENCE: The system should be easily updated. The system should utilize t he interchangeable plugins software developed should maintain the cost and time schedule of the project. (b). NON- FUNCTIONAL REQUIREMENTS: Nonfunctional requirements define the needs in terms if performance, logical database requirements, design constraints, standard compliance, reliability, availability, security, maintainability and portability. i. PERFORMANCE REQUIREMENTS: Performance requirements define acceptable response times for system functionality. †¢ The total time for user interface screens will take no longer than two seconds. †¢ The login information shall be verified within the seconds. †¢ Queries shall results within five seconds. ii. DESIGN CONSTRAINTS: The software shall be a standard system running in a windows environment. The system shall be developed using rational enterprise suite and oracle 10i database. iii. RELIABILITY: Specify the factors required to establish the required reliability of the software system at time of delivery. iv. AVAILABILITY: The system should have an availability of 99. 99%. v. PORTABILITY: †¢ The system should be extremely via the usb drive. †¢ The system shall be easy to migrate or backed up via another use drive. vi. MAINTAINABILITY: †¢ The system shall utilize interchangeable plugins. †¢ The system shall be easily updateable for fixes and patches. (c). HARDWERE REQUIREMENTS: |1. |Processor |- |Intel Pentium IV-2. 0 GHZ. | |2. |Hardware |- |40 GB. | |3. |RAM |- |512mb | |4. |DVD RAM |- |1 nos. | | | | |(d). SOFTWARE REQUIREMENTS: | | | |1. |OS |- |Windows XP/vista. | |2. |Front end Tool |- |Rational Rose Enterprise suite. | |3. |Back end Tool |- |MSAccess | | | | | |5. MODULE DISCRIPTION: | | | In this project we have defined different modules to enable the Book Bank system in successful manner. i. REGISTER: The register module contains the application form or registration form which contains following details. †¢ Name, Address, Contact number, E-mail id, Password etc. ii. LOGIN: The Login module contains the form which contain membership name and member password. It includes Username and Password. iii. SEARCH BOOK: The search book module contain list of books, from this list we search for the book which we need. This also contains another field called as categories where can select the category of the book. iv. DISPLAY DETAILS: Display the details about the students particulars, the payments, the books, rental and schedule times for books etc. v. MAINTAIN BOOK DETAILS: The administrator maintains the details of books. vi. LOGOUT: To sign off from the webpage or your account log off. 6. DOMAIN MODEL: A domain model is a visual representation of conceptual classes or real situations object in a domain. In object oriented analysis, the domain model is the most important. †¢ It illustrates the concept in the domain. †¢ It act as a source of inspiration for designing some software objects. 7. PARTIAL LAYERED ARCHITECTURE: Sequence diagram is an interaction overview diagram. It provides a big picture overview of how a set of interaction are related in terms of logic and process flow. This P artial layer architecture shows the interface of the sequence diagram, here the administrator shows the interface by displaying actor symbol. 8. LOGICAL ARCHITECTURE: The Logical architecture is large scale organization of software class into packages, sub system layer, It is called logical architecture because there is no direction about how these elements are display on different operating system. 9. RISK ACTIVITY: †¢ Personal short falls. †¢ Unrealistic schedules and budgets. †¢ Developing the wrong functions and programs. †¢ Developing the wrong user interface. †¢ Continuing stream of requirements changes. †¢ Short falls in externally furnished component. †¢ Real time performance short falls. †¢ Straining computer science capabilities. RISK ASSESSMENT: Figure out what the risks are and what to focus on. †¢ Making a list of all of the potential dangers that will affect the project. †¢ Assessing the probability of occurrence and potential ross of each item listed. RISK CONTROL: †¢ Monitoring the effectiveness of the strategies and the changing levels of risk throughout the project. †¢ T echniques and strategies to migrate the highest ordered risks. 10. GANTT CHART: It describes the time schedule for the planning to complete the corresponding and after completion of core product, what the time is taken for the project action of core product. 11. POST- FUNCTION AND PRE-FUNCTION: MODULE: Registering PRE-FUNCTION: †¢ Login to the website. †¢ Collection the required documents to be submitted for registration. POST-FUNCTION: †¢ Verification of documents submitted. †¢ Conformation email sent accessing that authentication can be prevailed for the individual. MODULE: Display book details PRE-FUNCTION: Analyze the course of semester of logger. POST-FUNCTION: Display the required book details. 12. UML PACKAGE DIAGRAM: A package diagram provides a way to group element. Here we have grouped the 6 main elements of software project grouped the in order register, login, search book. It goes to update and sales record. A package name may be based on tab if the package shows the member of main package. 13. TECHNICAL SERVICES LAYER: Technical service layer describes the relationship between different actors, components of the software process for any admin seek the registration for new visitor. So that the new visitor can login the website and search for book and if need can buy it. 14. DOMAIN SERVICES LAYER: After technical services layer from partial layered architecture, we are going to generate the coding in java or VB the project domain is now finalized in JAVA/VB. 15. USER INTERFACE LAYER: . ADMIN: The administrator is used to register a new visitor for the website. Admin can keep those records update. Admin keep sales record i. e. , now much book is downloaded and how much book is buyed newly with copy write etc. ii. REGISTERED USER: Registered user can search the book whatever needs and can read the book in online. If user is satisfied with this book, can d ownload the book but after payment. iii. VISITOR: The visitor can register the application form and become a member of the website. The visitor can search books and read the boook but he must register to buy or download the book. UML USECASE DIAGRAM: Uml provides use case diagram notation to iilustrate the names of use case and author relationship between them. Use case diagram and case relationship are secondary in use case work use case text document. UML CLASS DIAGRAM: The Uml class diagram is to illustrate class interfaces as their actions. They are used for static object modeling, we have already introduced and used their uml diagram while domain modeling. UML SEQUENCE DIAGRAM: A sequence diagram illustrate a kind of format in which each object interact via message. It is generalize between two or more specialized diagram. PARTIAL LAYER ARCHITECTURE DIAGRAM: Sequence diagram is an interaction overview diagram. It provides a big picture overview of how a set of interaction are related in terms of logic and process flow. This Partial layer architecture shows the interface of the sequence diagram, here the administrator shows the interface by displaying actor symbol UML COLLABRATION DIAGRAM: COLLABRATION diagram illustrate that object interact on a graph or network format in which object can be placed where the diagram. In collaboration diagram the object can be placed in anywhere on the diagram. The collaboration comes from sequence diagram. UML STATE CHART DIAGRAM: A Uml state machine represents the interaction events and states of an object and behavior of an object in reaction to an event.. Transaction shown as allows labeled with their event. It is included with initial pseudo state and fins end state UML ACTIVITY DIAGRAM: A Uml activity diagram shows sequential and parallel activates in a process, work flows, data flows and compiler algorithm. UML COMPONENT DIAGRAM: Components are slightly fuzzy concept in this Uml, because both class and components can be used to model the something. UML DEPLOYEMENT DIAGRAM: Deployment diagram shows the assignment of concrete software artifact to computational nodes. It shows the deployment of software elements to the physical elements. Deployment diagram are useful to communicate or deployment architecture. IMPLEMENTATION: After the completion of UML diagrams for BOOK BANK SYSTEM we should generate the code. Select the tools option from main menu then select the sub option program module in which we are going to generate the code in JAVA/VB/J2EE. Then go ahead and select the generate code option as a result of code generation. TESTING: To perform the testing for the generated code again select the tools option from menu bar and choose quality architecture option a sub window gets opened. We are going to perform Unit Test and Scenario testing for our project. So, select these testing option one by one and testing activity is carried out for all the coding and testing is carried out. CONCLUSION: Thus the project for BOOK BANK SYSTEM has been successfully executed and codes are generated. STOCK MAINTENANCE SYSTEM Ex. No: 4 Date: AIM: To analyze and design a system for Stock Maintenance System using Rational Rose tool. Problem Statement: INVENTORY SYSTEM is a real time application used in the merchant’s day to day system. This is a database to store the transaction that takes places between the Manufacturer, Dealer and the Shop Keeper that includes stock inward and stock outward with reference to the dealer. Here we assume our self as the Dealer and proceed with the transaction as follows: The Manufacturer is the producer of the items and it contains the necessary information of the item such as price per item, Date of manufacture, best before use, Number of Item available and their Company Address. The Dealer is the secondary source of an Item and he purchases Item from the manufacturer by requesting the required Item with its corresponding Company Name and the Number of Items required. The Dealer is only responsible for distribution of the Item to the Retailers in the Town or City. The Shop Keeper or Retailer is the one who is prime source for selling items in the market. The customers get Item from the Shop Keeper and not directly from the Manufacturer or the Dealer. The Stock is the database used in our System which records all transactions that takes place between the Manufacturer and the Dealer and the Dealer and the Retailer. USE CASE DIAGRAM : [pic] ACTIVITY DIAGRAM : [pic] SEQUENCE DIAGRAM : [pic] COLLABORATION DIAGRAM : [pic] COMPONENT DIAGRAM : [pic] CLASS DIAGRAM : [pic] DEPLOYMENT DIAGRAM : [pic] Javacoding: Manufacturer. java public class manufacturer { private int manufacturername; private int companyname; private int dateofmanufactured; private int addres; private int contactno; private int name; public dealer theDealer; public manufacturer() { } public void purchase() { } public void sales() { } } Dealer. java public class dealer { private int dealername; private int dateofitemsreceived; private int address; private int contactnumber; rivate int price; private int noofitemsordered; private int noofitemssold; public manufacturer theManufacturer; public shopkeeper theShopkeeper; public dealer() { } public void purchase() { } public void sales() { } public void showstockdetails() { } } Shopkeeper. java public class shopkeeper { private int shopkeepername; private int address; private int contactnum ber; private int price; private int numberofitemsordered; public dealer theDealer; public shopkeeper() { } public void purchase() { } public void sales() { } } RESULT: Thus the UML diagrams for Stock Maintenance was analyzed and designed using Rational Rose. Ex No: 5 Date: ONLINE COURSE REGISTRATION SYSTEM AIM: To create a system through which students can register to the courses desired by them, using Rational Rose tool. Problem statement ? The system is built to be used by students and managed by an administrator. ? The student and employee have to login to the system before any processing can be done. ? The student can see the courses available to him and register to the course he wants. ? The administrator can maintain the course details and view all the students who have registered to any course. System requirements Rational Rose Software Use-case diagram The course registration system has the following use-cases Login View course details Registration Display details Maintain course details Logout The actors involved in the system are 1. Student 2. Administrator Use-case name: Login The user enters the username and password and chooses if the user is student or administrator. If entered details are valid, the user’s account becomes available. If it is invalid, an appropriate message is displayed to the user. Use-case name: View course details In this use case, a student can search all the courses available to him and choose the best course he wants. The student can view the course duration, faculty and department of the courses he may choose. Use-case name: Registration When a student has successfully chosen a course, he can register to that course. Upon registration, the student’s details are stored in the database. Use-case name: Display details After registration to any course, the student may see the details of his current course. He may wish to know details about fees and other information. The administrator also has the privilege to display details of the the students and the corresponding course for which they have registered. Use-case name: Maintain course details The administrator has to perform the duties of maintaining the course details. Any change to the course structure is maintained by the administrator. Use-case name: Logout After all the desired transactions are made, the user may choose to logout from the system to save all he changes they have made. Use-case diagram for course registration system [pic] Class diagram The class diagram is a graphical representation of all the classes used in the system and their operations, attributes and relationships. The course registration system makes use of the following classes: . Stud(student details) 2. Administrator 1) Stud It consists of the details of all the students present in the database. The attributes present in this class are student id, password, name, age, sex, course and attendance. The object of this class is created as soon as the student registers to a course. The operations available to this class are login (), logout (), confirmation () , register (), and view course details (). 2) Administrator It consists of details of all the courses available to the student. The attributes present in this class are username, password, course fees, fees due, marks, and attendance. The operations available to this class are login (), logout (), ma course details (), display course (), and confirmation (). Class diagram for course registration system [pic] Sequence diagram Sequence and collaboration diagram for login to the system [pic] [pic] Sequence and collabaration diagram for logout [pic] [pic] Sequence and collabaration diagram for registration to a course [pic] [pic] ACTIVITY DIAGRAM : [pic] JAVA CODE: Public class stud { Private int sid; Private string passwd; Private int age; Private int sex; Public admin; Public stud() { } Public void logout() { } Public void confirm() { } RESULT: Thus the Online course registration system was designed and analyzed using Rational Rose. Ex No: 6 Date: ONLINE TICKET RESERVATION SYSTEM (E – Ticket) AIM: To analyze and design a system for Online Ticket Reservation System (E – Ticket) using Rational Rose tool. 1. PROBLEM STATEMENT To book a ticket for a user online ticket reservation system software and to confirm the ticket booking, making the payment, printing the tickets has to designed using Rational Rose tool. . OVERALL DESCRIPTION 1. LOGIN †¢ Before entering the system, users have to login †¢ Get the username and password from existing users. †¢ Give new users the option to sign up. 2. AVAILABILITY †¢ Get the source and destination. †¢ Provide a dropdown box for the date. †¢ Check availability of tickets. 3. RESCHEDULE †¢ If tickets are available, get the number of passengers. †¢ Get the name and age of all passengers. †¢ If tickets are not available, reschedule. 4. PAYMENT DETAILS †¢ Print the cost of the tickets. †¢ Get the payment details from the user. †¢ Confirm the details and the ticket. Display confirmed ticket to the user. USECASE DIAGRAM [pic] ACTIVITY DIAGRAM [pic] CLASS DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] STATE CHART DIAGRAM [pic] COMPONENT DIAGRAM [pic] DEPLOYMENT DIAGRAM [pic] Javacoding: Customerdetails. java public class customerdetails { private int name; private int address; private int email; private int age; public booking theBooking; public customerdetails() { } public void book() { } } Booking. java public class booking { private int booking_no; private int date; private int total; private int status; private int name; public payment thePayment; ublic booking() { } public void pay() { } } Payment. java public class payment { private in t date; private int amount; public payment() { } } RESULT: Thus the Online Ticket Reservation System have been designed and verified using Rational Rose Tool. Ex No:7 Date: SOFTWARE PERSONNEL MANAGEMENT SYSTEM AIM: To analyze and design a system for Software Personnel Management System using Rational Rose tool. 2. PROBLEM STATEMENT To compute the gross pay of a person using the software personnel management system software and to add new details to the existing database and update it, using Rational Rose tool. . OVERALL DESCRIPTION The three modules are 1. Login The employee details has to be entered and if needed the details can be edited. 2. Pay slip It contains details such as employee id, employee name, department, experience, and basic pay. 3. View Updated database would be present. The details of the employee can be used for further reference. 2. 1 SOFTWARE REQURIEMENTS: 1. Rational Rose 2. 2 HARDWARE REQURIMENTS: 4. 128MB RAM 5. Pentium III Processor 3. DESIGN USECASE DIAGRAM [pic] CLASS DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] SEQUENCE DIAGRAM [pic] COLLABORATION DIAGRAM [pic] ACTIVITY DIAGRAM [pic] JAVA CODING: PAYROLLLOGIN. JAVA public class payrolllogin { private int enterdetails; private int editdetails; public payslip thePayslip; public viewdetails theViewdetails; public payrolllogin() { } public void exit() { } } VIEWDETAILS. JAVA public class viewdetails { private int eid; private int ename; private int dept; private int exp; private int basicpay; private int hra; private int da; private int bpf; private int gpay; public viewdetails() { }

Saturday, September 28, 2019

The Invisible Spotlight Essay Example | Topics and Well Written Essays - 1500 words

The Invisible Spotlight - Essay Example Remarkably, managers would yet barely notice the influence of their actions about the relationship with the employees in pursuit of competitive advantage. Managers need to pay attention and facilitate the creation of the pivotal moments rather than depending on the reflexes or instincts in the course of addressing the demands and expectations of the consumers. From the book, I have been able to learn the need for employees to control the influence they have, as well as encouraging acting with intention or purpose. That is an illustration of the self-control, which plays a critical role in making it possible for the managers to turn the glancing moments in lasting outcomes. Categorically, it is valuable to that these moments enable the organizations in the contemporary society to promote management relationships. The core of the work of the managers is to understand and utilize their management relationships with the objective of inspiring the workforce to deliver in accordance with t he organizational policies and expectations. There is there is the necessity to facilitate innovation of the role of employees to encourage the achievement of diverse goals and targets. Managers should understand that an employee does not focus on creating the tone, standards, and direction for the relationship between the workforce and the management. Furthermore, it is ideal to note that the manager is the architect with the obligation and responsibility of creating the conditions that promote the best work among the employees.

Friday, September 27, 2019

How strong was Tsarism in 1914 Essay Example | Topics and Well Written Essays - 2000 words

How strong was Tsarism in 1914 - Essay Example If one looks at Russia before 1914 it may be possible to come to some ending about these various views. In the course of 1905 to 1907 there had been significant peasant unrest intended mainly at the gracious landowners. ‘’A lot of this had been put downward by oppression but the government also approved a number of measures intended to alleviate the circumstances, including the elimination of redemption duties and the addition of credit via the Peasant Land Bank’’ (Wade, 2005.p.25). ‘’Once he became Prime Minister, Stolypin set himself the job of pacifying the peasantry as the key to Russia’s long-term stability’’ (Gatrell, 1994.p.461). During the conflict, the administration had observed that the community had not been a warranty of rural steadiness. Indeed, it gave turbulence their consistency and organization. Thus, the solution was to support peasants to leave the community and to become confidential landowners. ‘ ’Stolypin’s plan was to make a group of peasant administrators with a stake in sustaining the regime (Polonov, 2005.p.50)’’. They could then be relied on to hold their radical neighbours in check. The rationale Stolypin surrendered the Duma for the agrarian reorganization was his wish to make a class of small, free farmers a gamble on the abstemious and the strong, which would be hard working and innovative. It was felt that the presented system encouraged the rising disintegration of the land because of the rise in population, and did not give the incentive to make advancements because the land did not stay in the family. In quintessence, what Stolypin planned was privatization. In August 1906, Stolypin prepared 6 million hectares of state and crown land obtainable for peasant buying and in October, the new management eliminated all limitations on peasant movement. Nevertheless, ‘’the key measure was his Land Law of 9 November 1906’⠀™ (Geary, 1989.p.17).’’The verdict passed this and Duma did not approve until June 1910’’ (Gatrell, 1994.p.78). ‘’It stated that in the third duma (1907-12) the main position was held by the Union of 17 October , the date of the regal manifesto of 1905, which was dedicated to working with the administration for improvement in the agrarian civil rights , field, worker’s insurance, education, justice and local regime’’(Mendum & Waugh,2001.p.47). They approved Stolypin’s agrarian improvement, passed unevenly under disaster verdict in 1906. ‘’The graciousness, which had endorsed Stolypin’s agrarian improvement, opposed him on a number of other problems where they felt their welfare or that of the realm threatened and they used their central location’’ (Saul, 1997.p. 45). If the duma had a small number of successful changes to its credit, it did alter extremely the climate of Russi an government by bringing bureaucrat mistreatments out into the open, and by empowering public talk of contentious problems. ‘’From 1912 there was a renaissance of workers’ actions following the slaughter of activists at the Lena gold mines in Siberia’’ (Bagnall & McGonigle, 2004.p.481) ‘’. Ultimately, this caused the erection of blockades and to street hostility in St Petersburg on the eve of the First World War’’ (Saul, 1997.p.34). ‘’Visions of a latest era of industrial harmony and prosperity were rudely shattered by a fresh wave of Labour complaint that began in April, 1912, once

Thursday, September 26, 2019

Political Speech (Obama Inaugural Address 20th January 2009) Essay

Political Speech (Obama Inaugural Address 20th January 2009) - Essay Example The inauguration ceremony of Barak Obama set out new records in the history of United States of America. More than a million people were there to congratulate Obama and to welcome him as the new president of America. (Jem Aswad and Jennifer Vineyard) The detail scrutiny of Obama’s speech laid out the fact that all three persuasive appeals that is Ethos, Pathos and logos were used in this speech. Ethos (credibility) is an appeal in which the speaker tends to put forward his potential, knowledge and credibility regarding certain fact. Pathos is an emotional appeal in which the orator tries to convince people about something by targeting their emotions. The selection of words greatly influence people’s emotions, the better the language the better will be its effect on emotions of people. Pathos is an effective way to improve an argument or speech. Logos is a logical speech. It is a means of putting forward arguments that are based on logics and facts. Any disagreement rega rding such argument can be discarded immediately by considering and having a look at facts. In order to analyze Obama’s speech I will start with Pathos. From the very inception of his speech Obama started to target people’s emotions in an effective manner. ... Moreover he also appreciated President Bush’s efforts by thanking him. This shows that he holds no grudges against any political leader. Obama again by indicating the past tried to tap the emotions of people by saying: â€Å"What is required of us now is a new era of responsibility - a recognition, on the part of every American, that we have duties to ourselves, our nation, and the world, duties that we do not grudgingly accept but rather seize gladly, firm in the knowledge that there is nothing so satisfying to the spirit, so defining of our character, than giving our all to a difficult task.† Here he made them realize that each and every individual has certain responsibilities which are to be fulfilled. He has advised them they should accept their duties willingly without any resentment if they want their nation to prosper and progress fluidly. He said that giving yourself completely to a task which seems difficult and impossible and then coming out of the odds and ac hieving your goal is the finest accomplishment that one can ever have. In the end of the speech Obama again motivated the people by discussing the hardships which the United States of America has faced in the past. He put forward those difficulties by saying; â€Å"So let us mark this day with remembrance, of who we are and how far we have traveled. In the year of America's birth, in the coldest of months, a small band of patriots huddled by dying campfires on the shores of an icy river. The capital was abandoned. The enemy was advancing. The snow was stained with blood†¦ America. In the face of our common dangers, in this winter of our hardship, let us remember these timeless words. With hope and virtue, let us brave once more the icy

Wednesday, September 25, 2019

Theology Exam Essay Example | Topics and Well Written Essays - 1000 words

Theology Exam - Essay Example pective of the perception one has to consider the formation, the majority has started to appreciate that the situation of the bionetwork is declining due to the wasteful ways of humans. A number of individuals are certain that the risk of a universal calamity can be avoided. For some, there is the conviction that if appropriate learning as well as economic safety can be given to everyone, people can act in a responsible manner. Others are anticipating that the technology will show them a â€Å"miracle cure† via things such as â€Å"contamination-free energy and wonder drugs† (Bouma-Prediger, p. 152). Hoping for such solutions is useless because it would merely take care of the warning signs, as though the troubles will leave on their own. Without the worldview that Christians infer from Bible, attempts to solve the problems will not be tackling the actual concerns. According to Christian’s belief, it is not the things that people do that are unhygienic, but it is what flows out of their hearts; the attitude of humans is merely a part of the problem. Post-modern Christianity is as complicated to lock down in a precise definition as post-modernism itself. What began during the 1950s within structural design as a response to modernist thinking and technique was quickly approved by the art as well as literary world during 1970s and 1980s. The Church did not actually think about this consequence until the late 1990s. This response was a closure of â€Å"cold, hard† (Waters, p. 142) reality in support of â€Å"warm, fuzzy subjectivity†. One can imagine anything known to be post-modern and then attach Christianity into that perspective and he will get the idea about post-modern Christianity. Post-modern Christianity is similar to fundamental post-modernist thoughts. It is regarding â€Å"experience over reason, subjectivity over objectivity, spirituality over religion, images over words, and outward over inward† (Waters, p. 156). However, the positive or negative aspect

Tuesday, September 24, 2019

Half Nude Woman with Coin Research Paper Example | Topics and Well Written Essays - 1250 words

Half Nude Woman with Coin - Research Paper Example The particular 17th century Dutch art under focus caught the attention of the eye relates to a variety of factors. The first reason behind the art attracting the eye relates to the fact that even for less keen observers, one must realize that something seems unrelenting about the art. Other than capturing the other common presentations with most of the paintings in that period, the work by Baker presents something different. The interesting thing about the painting is that it seeks to explore a moral issue within the society and a portrayal that morality existed even in the time of its painting. The painting sends a message of an existing connection between women nudity and money. That serves as the driving factor behind the need to share the piece of art since it holds a deeper meaning based on the prostitute’s image, holding a gold coin, yet her breasts are exposed as she gives a half smile to the viewer. The artwork proves of significant importance because it captures the t heme of prostitution and how it involves money. Description of the art work first focuses about the author of the art work and the respective name and origin of the author if such is given. Jacob Baker a painter in the 17th century and one of the artists regarded as the 17th century Dutch Golden Class is the author of the painting. Records attribute the painting to be from around 1636 with the painting measuring 64.5 centimeters by 56.7 centimeters. With oil and canvas serving as the common materials used in paintings across Europe.

Monday, September 23, 2019

Econ exam Essay Example | Topics and Well Written Essays - 250 words

Econ exam - Essay Example Furthermore, HR managers and supervisors are blamed for gender inequality practices, even when the job is suitable for professionals from both genders, mostly because of personal beliefs and the ‘glass ceiling’ effect. Even though such incidences are much more common within second or third world countries, where the position of women is mostly confined to domestic chores, the media in the US is more active on this issue. The economic impacts have been better in the case of US as well as other developed economies, especially after the recent recession, which forced many otherwise homemakers to pursue employment, and thus utilizing their unharnessed talents for economic gains; while creating a healthy competition in the job market. Moreover, even though media has been frenzy about racial and gender discrimination in the workplace (especially within the HR department), such incidences are much more common within developing and under-developed countries. As far as racial differences are concerned, the election of a President with African-American descent is evidence of the fact that the beliefs of the American populace are changing for the better. The economic influence of such events will be advantageous and profitable. Undoubtedly the most obvious and terrible social effect is that some of these couples are treated as outcasts by their own family and community members. Along with this, generation gaps cause even more negative social impacts towards the issue, especially if the cultures and beliefs amongst the couple’s culture differ substantially. Nevertheless, there is a silver lining [†¦] a social significance of interracial marriages, it is the fact that the couple will leave behind a lesson for their next generation, which is to remain indifferent towards racial differences. For something that is considered a taboo in the US, interracial marriages encompass an imperative economic

Sunday, September 22, 2019

Structuralistic Criticism and Gerard Genette Essay Example for Free

Structuralistic Criticism and Gerard Genette Essay Gerard Genette writes at the outset in his essay ‘Structuralism and Literary Criticism’ that methods developed for the study of one discipline could be satisfactorily applied to the study of other discipline as well. This is what he calls â€Å"intellectual bricolage ’, borrowing a term from Claude Levi-Strauss. This is precisely so, so far as structuralism is concerned. Structuralism is the name given to Saussure’s approach to language as a system of relationship. But it is applied also to the study of philosophy, literature and other sciences of humanity. Structuralism as a method is peculiarly imitable to literary criticism which is a discourse upon a discourse . Literary criticism in that it is meta-linguistic in character and comes into being / existence as metaliterature. In his words: â€Å"it can therefore be metaliterature, that is to say, ‘a literature of which literature is the imposed object’. † That is, it is literature written to explain literature and language used in it to explain the role of language in literature. In Genette’s words, ‘if the writer questions the universe, the critic questions literature, that is to say, the universe of signs. But what was a sign for the writer (the work) becomes meaning for the critic (since it is the object of the critical discourse), and in another way what was meaning for the writer (his view of the world) becomes a sign for the critic, as the theme and symbol of a certain literary nature’. Now this being so, there is certain room for reader’s interpretation. Levi-Strauss is quite right when he says that the critic always puts something of himself into the works he read. The Structuralist method of criticism: Literature, being primarily a work of language, and structuralism in its part, being preeminently a linguistic method, the most probable encounter should obviously take place on the terrain of linguistic material. Sound, forms, words and sentences constitute the common object of the linguist and the philologist to much an extent that it was possible, in the early Russian Formalist movement, to define literature as a mere dialect, and to envisage its study as an annex of general dialectology. Traditional criticism regards criticism as a message without code; Russian Formalism regards literature as code without message. Structuralism by structural analysis makes it possible to uncover the connection that exists between a system of forms and a system of meanings, by replacing the search for term by term analysis with one for over all homologies (likeness, similarity)†. Meaning is yielded by the structural relationship within a given work. It is not introduced from outside. Genette believed that the structural study of ‘poetic language’ and of the forms of literary expression cannot reject the analysis of the relations between code and message. The ambition of structuralism is not confined to counting feet and to observe the repetition of phonemes: it must also study semantic (word meaning) phenomena which constitute the essence of poetic language. It is in this reference that Genette writes: â€Å"one of the newest and most fruitful directions that are now opening up for literary research ought to be the structural study of the ‘large unities’ of discourse, beyond the framework – which linguistics in the strict sense cannot cross – of the sentence. One would thus study systems from a much higher level of generality, such as narrative, description and the other major forms of literary expression. There would be linguistics of discourse that was a translinguistics. Genette empathetically defines Structuralism as a method is based on the study of structures wherever they occur. He further adds, â€Å"But to begin with, structures are not directly encountered objects – far from it; they are systems of latent relations, conceived rather than perceived, which analysis constructs as it uncovers them, and which it runs the risk of inventing while believing that it is discovering them. Furthermore, structuralism is not a method; it is also what Ernst Cassirer calls a ‘general tendency of thought’ or as others would say (more crudely) an ideology, the prejudice of which is precisely to value structures at the expense of substances. Genette is of the view that any analysis that confines itself to a work without considering its sources or motives would be implicitly structuralist, and the structural method ought to intervene in order to give this immanent study a sort of rationality of understanding that would replace the rationality of explanation abandoned with the search of causes. Unlike Russian Formalist, Structuralists like Genette gave importance to thematic study also. â€Å"Thematic analysis†, writes Genette, â€Å"would tend spontaneously to culminate and to be tested in a structural synthesis in which the different themes are grouped in networks, in order to extract their full meaning from their place and function in the system of the work. † Thus, structuralism would appear to be a refuge for all immanent criticism against the danger of fragmentation that threatens thematic analysis. Genette believes that structural criticism is untainted by any of the transcendent reductions of psychoanalysis or Marxist explanation. He further writes, â€Å"It exerts, in its own way, a sort of internal reduction, traversing the substance of the work in order to reach its bone-structure: certainly not a superficial examination, but a sort of radioscopic penetration, and all the more external in that it is more penetrating. † Genette observes relationship between structuralism and hermeneutics also. He writes: â€Å"thus the relation that binds structuralism and hermeneutics together might not be one of mechanical separation and exclusion, but of complementarity: on the subject of the same work, hermeneutic criticism might speak the language of the assumption of meaning and of internal recreation, and structural criticism that of distant speech and intelligible reconstruction. † They would, thus, bring out complementary significations, and their dialogue would be all the more fruitful. Thus to conclude we may say, the structuralist idea is to follow literature in its overall evolution, while making synchronic cuts at various stages and comparing the tables one with another. Literary evolution then appears in all its richness, which derives from the fact that the system survives while constantly altering. In this sense literary history becomes the history of a system: it is the evolution of the functions that is significant, not that of the elements, and knowledge of the synchronic relations necessarily precedes that of the processes.

Saturday, September 21, 2019

Employment at Will Essay Example for Free

Employment at Will Essay There are several concerns and issues that had been analyzed by the new COO of the organization. Many aspects need to be carefully considered before making sound decisions of any corrective action or termination in effort to avoid legal actions. According to Connell and Castro, issues need to be carefully investigated by exploring relevant witness such as co-workers (Castro Connell, 2009, p.31). This will ensure that situations with misunderstandings are not the issue. However, the conclusion made by the COO should be practical and within reason, not made on impulse or suddenly, and in line with the Employment-at-will doctrine. Although, employees can be dismissed at any time for whatever reason if there aren’t any statutes that would prohibit the act, careful review of the concerns listed below is needed for the betterment of the company and its strategic plans. John posted a rant on his Facebook page in which he criticized the company’s most important customer. Jim sent an email to other salespeople protesting a change in commission schedules and bonuses and suggesting everyone boycott the next sales meeting. Ellen started a blog to protest the CEO’s bonus, noting that no one below director has gotten a raise in two (2) years and portraying her bosses as â€Å"know-nothings† and â€Å"out-of-touch† Bill has been using his company-issued BlackBerry to run his own business on the side. The secretaries in the accounting department decided to dress in black-and-white stripes to protest a memo announcing that the company has installed keylogger software on all company computers. After being disciplined for criticizing a customer in an email (sent from his personal email account on a company computer), Joe threatens to sue the company for invasion of privacy. One of the department supervisors requests your approval to fire his secretary for insubordination. Since the secretary has always received glowing reviews, you call her into your office and determine that she has refused to prepare false expense reports for her boss. Anna’s boss refused to sign her leave request for jury duty and now wants to fire her for being absent without permission. Summarization of Employment-At- Will Doctrine In any kind of employment relationship, employment is a moment to moment employment contract between the employer and the employee. Therefore, the employment- at – will doctrine allows the employer to do whatsoever it feels to the respect of the employee. Putting it differently, the doctrine permits an employer to terminate a worker for any reason good, bad, or without reason as long as the termination is within the legal parameters (Urhuogo, 2010, p.29). In other words, if nothing else applies to the situation at hand such as a specific law of court case that would support the termination (Anti- Discrimination Law), then the employment – at – will doctrine will succeed. However, exceptions at the federal, state, and city level such as specific statutes or laws and common laws (contract and public policy) allowed for modifications to be implemented to the employment-at-will-doctrine in effort to prevent an employer in terminating a worker under the more precise exemption. At the federal level Title VII (Civil Rights Act), which includes race, sex, national origin, and religion are protected. In addition, workers are protected under the Age Discrimination and Employment Act, Americans with Disability Act, and National Labor Relations Act, which protects workers that participate in a union. Most state laws are paralleled to those laws implemented at the federal level. However, some states have expanded their laws to further modify the employment-at-will doctrine for example; some states have included sexual preference as being protected, which is not covered under the federal law. Common law exception, which is applied to all levels is based on precedence and therefore, does not need   o apply. An example would include a judge handing down a verdict in his or her jurisdiction creating an exception to the employment-at-will-doctrine. The decision made by the judge would therefore become a binding on employers, which is independent or separate of the laws or statutes that was created by the legislative body. In conclusion of the employment-at-will doctrine, if the workers termination does not fall within the statutory or common law exception, the employment-at-will doctrine will default. Recommendation and Implementation Firstly, many of the concerns and issues referenced above could have possible been eliminated if a whistleblowing policy had been implemented. Realizing and executing this policy within the workplace, allows for whistleblowers to exhibit a role of importance that could eliminate unethical or illegal behaviors within the workplace before any issues become too difficult to handle. When organizations continue to have employees that display a characteristic of being unethical, they position the organization to be at risk in a negative manner legally, financially, and publically. The fact of the matter is that wrong doing occurs in many organizations, but workers at ALL levels should feel comfortable and confident that their work environment is not one of being hostile. Therefore, including a whistleblowing policy should be safe for the worker in knowing that if or when a matter is reported internally; any corrective action can be quickly executed thereby, causing workers to become more ethical. In addition, ongoing ethics training for workers at ALL levels in effort to enhance a moral environment or climate should be applied so that: Objectives and strategic plans are met and the best way to ensure that they are met Leaders are â€Å"walking the walk and talking the talk† (setting examples for all) Workers will feel as though their communication and responsibility is of value to their place of work. Finally, the assurance of the policy should be an image of the company and therefore, being upheld than just words on a piece of paper. The whistleblower should feel confident and safe that when an investigation is done, it will be conducted in an objective manner and investigated by one that has absolutely no influence on the outcome. This too will give a feeling that confidentiality is of value within the organization to the whistleblower. After careful review of the employee issues and concerns, the following recommendation has been made: Firstly, the real boss in my opinion is the customers and especially the high profitable ones because they are the major source of buying. And if your high profitable consumers decide to take business to your competitors then you basically have fired yourself. Although, John decided to criticize the most important customer, it is best to terminate his position due to the fact that at that moment a competitive disadvantage had been created. Jim and Ellen have some real legitimate grievances that need to be address by the company in effort to determine if other employees have the same concern and if so, developing ways to correct the issue. However, both Jim and Ellen have real concerns in reference to pay and therefore, it should be addressed. I believe that they both need to be coached and maybe even disciplined on the way of handling their concern but, I feel that they are both protected under the retaliation law and public policy. In Bills cases, grounds for termination can be expected assuming he did not get permission first. The use of the company’s cellular in effort to start his business is considered theft. Misusing the company’s resource for personal business causes the business to lose time and money. Im afraid it is perfectly legal for an employer to monitor company computer usage while you are at work, you do not have the right without permission to do your private work on your companys computer. Therefore, the accounting department need to be coached on the expectations of the company but also understand that they are not obligated to continue their employment with the organization if they feel disapprove of the key loggers. I believe that Joe has the right to sue the company due to the fact that it was his personal email that had been reviewed. I believe that if Joe’s criticism had been done on the business email then corrective action must stand. In order for the business to prevent personal email usages, it should be clearly outlined in the employee handbook as well as explaining the extent of computers being monitored. Employers should make sure that workers clearly understand the policy. The information provided by the secretary should be investigated thoroughly. If her claim is true, then she would be protected by the violation of public policy. The secretary cannot be terminated due to the fact that she declined to prepared false expense reports for her boss. However, the boss should and need to be investigated and terminated for his actions to eliminate a hostile work environment. Anna exercised her legal right under public policy law reporting to jury duty. However, Anna’s boss may ask for proof of jury duty and unless the employee handbook state otherwise, the employer does not have to compensate Anna. Termination in this case would be illegal. In Conclusion, understanding the employment-at-will doctrine and carefully executing the parameters of the doctrine can still leave the employer with sense of being uneasy and becoming apprehensive that an employee will attempt to sue. According to Wood and Karau, it is imprtant to respect employees during the process of which the termination is taking place because it will show the employee that their work was appreciated while they were working for the company (Wood Karau, 2008, p. 521). This can help or assist in preventing legal actions when respect is given. According to Urhuogo, Giving employee’s reasons for termination may result in employees to be understanding of the situation (Urhuogo, 2010, p.33). However, in the end, every employers and workers must display a demeanor that is ethical and suitable for the company and themselves.

Friday, September 20, 2019

US Law Protections Against Child Laundering

US Law Protections Against Child Laundering Child Laundering: Is U.S. Law Doing Enough? Introduction The paper is an in depth examination of the issue of child laundering in the United States of America. This is done by first defining what child laundering is, how it work in the country, bringing forth some vital statistics concerning its prevalence as well as its ill-effects. Additionally, the existing laws in land that help combat child laundering as well as relevant statistics on whether the current laws have been effective or not are brought to light. Lastly, a set of recommendation are brought forth to help make the law better in addressing the problem of child laundering. Due to globalization, mainly characterized by free movement of people, goods, services and capital due to advent in technology, there are a number of benefits as well as drawbacks associated with it. Political, social, cultural, economic as well as environmental aspects of mankind have been impacted in either way. One social; ill that has been catalyzed by globalization is child laundering. By definition, child laundering has been thought of as; [The practice of illegally using children for exploitative purposes like labor, prostitution, and adoption after stealing and selling a child to adopting parents under false pretenses. The children that are trafficked in or out of a country mostly come from poor and backward families who may willingly give them over for laundering in the hope of earning money or providing a better place to the child. However, most of these children end up in neglect, abuse, and torture at the hands of their recipients] (Garrison, 2000) It is worth noting that this act also known as child trafficking is done mainly by agencies that facilitate adoption mainly against the will of the parents as well as the involved child. The offender does hide or falsify the kids details for instance controlling the origin of the child with the aim of making such children legitimate orphans (Jerome, 2001). On the same note, offenders are capable of manipulating birth certificates, intake records, or even records concerning death of parents who may be alive. Generally speaking, the phenomenon entails unlawfully attaining children by kidnapping or buying for reasons of adoption. As suggested by Zimmerman, 2005 child laundering has been associated with a number of social ill such as sexual abuse, removal of some vital body organs, child labor, illegal adoption, prostitution and slavery among others. For these reasons, governments locally and in collaboration with their international counterparts have set laws that make the act a serious crime that is punishable. Persons under the age of 18 years are deemed to be children accordance to the international law and recruit, transport, harbor and or to obtain such person to be exploited is seen as child trafficking. Although the laws of the land seem to have helped curb the problem, it is evident that there are some loopholes that need to be sealed to successfully and effectively help America address the issue of child laundering. Child laundering in United States of America It is a difficult task to succinctly establish the exact number of children being laundered which is characterized with kidnapping, stealing buying and trafficking children. in the United States of America, child laundering is mainly accomplished by the following ways or mechanism, child buying, intra-familial kidnapping, traditional kidnapping, kidnapping children place into orphanages, hostels or schools for purposes of being educated or cared for, obtaining children through false pretenses, lost children and finally taking children in payment of debts your money or your baby. The children are elated unlawfully to cities within a given country and or trafficked foreign countries (Smolin, 2005). Children, both males and females are culprits, though the reason of laundering does vary for the genders involved. Child buying involved an interconnected link that may constitute independent facilitators, directors of orphanages as well as attorney who are corrupt. They form a system that enables them buy kids from their families. An individual with skills and knowledge is at the realm of the whole scandal and recruits scouts to help him carry out his/her plans. The target here are the poorest families, money is the inducing factor (Smolin, 2006). It is estimated that person at the realm of the whole thing gets between 2,000 and 20,000 US dollars per child. Paying the family, the recruiters as well as bribing the relevant authorities obviously leaves him/her with something substantial. Kidnapping of children placed in homecare, schools or hostels has been another way of child laundering. Parents from very poor background due to financial constrain may relinquish their responsibility of housing, caring and educating their kids to an institution that provide the same. This has been used by facilitators and scouts to convinced parents to place more kids into such systems. It is sad to not that upon entering such institutions, the children are made orphans and transferred to adoptees usually without the consent of the childs parents. Smolin, 2007 held the view that child laundering has been made possible through obtaining minors through false pretense. This entails inducing parents to give custody of their children to a number of agencies. Parents are made to understand that their children are taken to have a better life and are promised they will be constantly updated about the wellbeing of their children. Financial gain from adopting persons or agencies as well as the possibilities of going to America to live there with their children makes thing easier for the perpetrators especially when the parents are naÃÆ'Â ¯ve and poor. What follows after the parents have given custody of their kids is adoption which is done through manipulation of the kids origin as well as parents whereabouts. Parents in the end loss the family contact with their kids forever. There are also cases where a family is forced to surrender the custody of their child due to inability to settle debts. This happens especially with regards to failure in settling medical bills associated with giving birth. Similarly, a woman who is poor is in debt with individuals or agencies that give loans, failure to repay makes the agency to force such women to place their kids to orphanages where the illegal adoption is then done without her consent (Zimmerman, 2005). Additionally, familial kidnapping where one parent takes away the kid from the other and place him/her in another location especially orphanages. This is usually motivated by financial gain and evading the responsibility of raising children due to lack of adequate resources. Countries where parent have to incur cost of marrying of daughter are at more risks. Traditional kidnapping of children especially from hospitals, schools homes, playing grounds, streets for sale has been on thrive as one major way of fostering child laundering. Lastly, cases involving lost children have been capitalized to enhance child laundering. It is common knowledge that once a child is established to be lost; efforts opt to be made too establish his/her family and rejoin them. However, according to Landes Posner 1978 in the wake of lust for money, such efforts are not made and involved children are deliberately given false name as well as manipulated background eventually adopted in an illegal manner wher e they may languish in sex abuse, child pornography, and child labor among others. Statistics Child laundering is deemed to be the second most serious crime in the United States only after drugs. It is the fastest growing crime globally. Globally, about 1.2 million children are stolen and illegally adopted a business that run in excess of $12 billion annually (Wuiling, 2006). Above 2.8 million children are brought to America annually, upon setting foot on U.S soils a third of these children are coerced to engage in prostitution and child pornography, these individuals are 12 years on average. It is asserted that 300,000 children in America are at risk of being exploited via commercial sex. Although foreigners are trafficked into the country, the number of American kids being laundered is much higher with close to 200,000 children of American origin being lured into commercial sex business Zimmerman et al. 2006). Statistic has it that a perpetrator of child laundering can make up to $200,000 annually from one young girl. Additionally, child pornography has been on the rise and threatens the moral stability of the country. According to FBI there has been an increase of 2500% in arrests in the last 10 years (Zhang, 2007). The concept of intercountry adopting has been hailed to create room for child laundering. Between 1990 and 2003, intercountry adoption into U.S tripled up to 21, 654 from 7,093. Table 1 Intercountry adoption to U.S Statistics. Year Intercountry adoption to U.S 2003 21,654 2004 22,990 2005 22,734 2006 20,680 2007 19,609 2008 17,475 2009 12,753 2010 2012 Projected to be Source; Smolin, D. (2010). Child Laundering and the Hague Convention on Intercountry Adoption. The Future and Past of Intercountry Adoption. Retrieved on 15 March 2011 from https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplaycrawlid=1doctype=citedocid=48+U.+Louisville+L.+Rev.+441srctype=smisrcid=3B15key=997ad293e589e3af1af27ed695146555 Ill-effect of child laundering It is no doubt that child laundering has a lot of negative attributes to the involved children as well as the society as a whole. As stated previously, laundered children are subjected to exploitative conditions such as prostitution, child pornography, child labor, illegal adoption, slavery and to extreme ends removing vital body parts (Landes Posner, 1978). The children involved under go serious sufferings at the hands of their adoptees. They are inflicted with mental/psychological torture as well as physical torture impacting on various aspects of their lives (Lifton, 1975). Child laundering usually denies the involved kids the opportunity of growing up with their blood sibling as well as sharing the bliss of life with their biological parents. Such incidences usually impact on their perception especially towards parents when they come of age and realize that where they are is not their home and their parent cannot be traced (Mabry Kelly, 2006). In incidences that the child was taken from the mother forcefully or by being threaten, the mother will live in guilt for the rest of her life for failing to defend her child. Such traumatic events psychologically torture the victim that it may escalate to her day to day way of living. The emotion associated with losing family ties can be very detrimental to the health of the victim as they may spent a better part of their time crying and thinking about home, siblings, friends and parents (Tyuryukanova, 2002). In cases where the children are subjected to sexual abuse for instance prostitution and child pornography, there are potential possibilities of them contacting sexual transmitted diseases and more seriously HIV and AIDS. It is no doubt that these kids have seen to it that the spread of such diseases are on the rise posing danger not only to them but also to the general public (Marshall Gerald, 2002). Additionally, when molested at such early ages as 12 years, they stand a chance of holding lower esteem of themselves ending up withdrawing from sexual activities even with their beloved partners once they are grown ups. The problem with intimacy can also be along with problems with their kids. Survivors more often that not push away those individual close to them which is seen to be a disturbing issue to one of the spouse. It has been established that close to 80% of children engaging in sexual abuse and child pornography if not saved earlier and put into rehabilitation will definitely engage in prostitution in future especially when they are adults (Williams, 1999). Where the culprit is physically abused, by their recipients there are chances that they my turn to be violent when they grow to adulthood. When the same goes to the extreme, such children are a time physically and permanently deformed. Additionally, the children that are abused physically loss some body senses and cannot feel anything which is dangerous to their growth and development (Wolfe, 2005). On the same note, despite the fact that when facilitators are trying to induce the biological parents of children to be adopted by promising better life, education, provision of basic need, in reality, these children end up languishing in more trouble as compared to before being taken. Basics needs such as health, shelter, food among others are poorly administered. It is only a small fraction that is lucky to have a better shelter over their heads. Lack of education in most cases renders such individual useless later in life as they cannot secure better jobs and for this reason, most of them have ruined life (Torgoley, 2006). It is also a fact that these individuals are subjected to social ill such as drug use/abuse and other forms of crime. The involved children when growing up in such an environment approach adulthood already mentally polluted and corrupted. The end result is having a society that is full of crime, irresponsible and holding negative views on themselves as well as others. Strictly speaking, when children are trafficked to urban centers which is usually the norm, it is obvious that the surging numbers are not in line with the available resources (Vu, 2004). This does contribute to overcrowding of the existing infrastructure in states that are striving to provide financial as well as other resources to meet children needs. As noted by Lindsey Biel, author of Raising a Sensory Smart Child, [Internationally adopted children demonstrate higher incidences of sensory integration and health problems than domestically adopted children. The crowded adoption facilities typically lack adequate medical, educational and nutritional care for children, leading to cognitive, emotional and behavioral disorders in adopted children]. Another social ill that is associated with child laundering is irresponsible parenting. Once couple are given the room to sell their children, this will be the norm hence making the society have irresponsible individual who are not capable of taking care of young individuals and providing them with basic needs. This will provide a wider avenue for the illicit business deemed lucrative to thrive at the expense of values of any given society. Similarly, there are problems faced by the children trafficked to new areas especially if they are from a foreign country. It will take them time to fully adjust to the environment as well as the culture of destination area (Wolthuis Mirjam, 2001). Laws addressing child laundering and their effectiveness Laws that address child laundering especially in US depend on the state. However, it has to meet accreditation law from Hague convention adoption law. It is also affected by the human rights laws to ensure that in legal adoption process is catered for to curd child laundering. The Hague convention is put in place to affect all the adoptions that talk place within the countries that signed the treaty withy it. Therefore, such countries as US, which signed this Convention in 1994, that came into force in April 2008 must comply with their laws during international adoption to ensure that child laundering is avoided. Therefore, Hague convention ensure that each country respect human right in their laws of adoption (Vu, 2004). Hague adoption process The adoption process from a convention country may differ from a non-conventional country in various ways. However, the numbers of the countries that ascertain adoption process from the Hague statute are about seventy-five where US is a member. To eliminate child laundering among conventional countries during adoption, Hague Conventional Adoption process should be followed (Zhang, 2007). Each person should complete six steps during convention process. First, one should ensure that he/she choose accredited adoption agencies that provide this service. Second, apply to them to ensure that they find you legible to adopt. This is to make sure that one is able to be given right to acquire an adoptee legally reducing chances of child laundering. For example According to adoption laws in New York State, a person to be legible to undertake adoption process must be an adult. He/she can be married or unmarried (Williams, 1999). Persons who had married but living separately from each other either under or in pursuant of the decree of separation or through a written separation statement is also legible. A minor husband with an adult wife or a minor wife with an adult husband can together adopt a child. Other groups according to legal proceeding can still adopt provided there is an adult to take care of the adopted child. An adaptor will be referred to a child who she/he is required to adopt. According to the law, adoption should be done with the consent of the adoptee if fourteen years and above with sane mind, from their parents if below that age or incapacitated or from the court of law IdeaConnection (2011). After getting the consent, one is supposed to apply for the child to ensure that one is eligible to immigrate to US. After immigration documents are offered, now the person can adopt the child. The immigration visa for the child is processed as the final process of the adoption. According to the Hague adoption process, it was meant to provide protections to the prospective parents, children and the birth parents. The key principle of Hague adoption convention process follows the interest of the child (Wolfe, 2005). It is meant to ensure that there is no child laundering during inter-country adoption. According to US, the federal government upholds these laws with utmost faith where Inter-country Adoption Act of 2000 and its implementation regulations govern them. According to the Hague convention law, the adoptive service should be accredited, temporarily accredited or should have been approved in a national level to carry out conventional adoption services. Through this, the adapting parents learn about the agency through the adopting lawyer. This ensure that the selected agency have comprehensively been evaluated based on standards contained in the federal regulations. This eliminates the tendencies that develop cartels that propagate child-laundering process. The standards provided for the accredited agencies are meant o address unprofessional adoption practices (Kristof, 2000). The other principle of the Hague adoption process is to address immigrant visa petition and application process. This ensure that the children are notified about potential problems that pose legal bar of children from getting to US before following due adoption process to be adopted by the prospective adaptor. This is to ensure that the child especially who have been adopted from oversee is given a legal permit to reside in the US after adoption. This regulates the illegal child trafficking as the children from other countries are identified by the federal government (Wolfe, 2005). Conventional process The first step in the adoption process is choosing accredited agency in the US. This will help in connecting one with the other country where one is required to adopt the child. It will also offer legal adoption law of that country to ensure that no children laundering (Spangenberg, 2002). Adoption service providers should have complied with federal regulation (22 CFR Part 96). The adoption process is monitored by the council of accreditation (COA) and Colorado Department of Human Services. In addition, the Office of Childrens Issues monitors accrediting entities in compliance to Inter-country Adoption Act (IAA). To ensure that legal adoption is followed and child laundering is minimized, IAA outlines services that the agencies should provide to their client as follows. The agency should identify child for adoption and ensure that they arrange on the due adoption process this regulating irregularities that lead to child laundering. The agencies should also ensure that it secure necessary consent terminating parental adoption right. It should also do home study to ensure that it offers a report on prospective adoptive parents and child background (Zimmerman et al. 2006). The accredited agencies are supposed to perform child non-judicial determination of a child best interest and the appropriate adaptor. They are supposed to ensure that they are capable of providing healthcare to children and any other social care if need arises. This is in accordance to the rights protecting the welfare of the children. After getting an accredited agency, one is require d to apply to ensure that legibility. This done through the help of the accredited agency chosen to ensure that the whole process follow the required laws and child adoption laws. For example, if a US citizen is applying to adopt a child from other country he/she must be found legible by US citizenship and Immigration Service (USCIC). They will access the ability of one to hold capability to cater for the child (Wolthuis Mirjam, 2001). The application is done through a form called 1-8000A. It ensures that one is suitable to adopt the child and ensure that legal process is followed. The form is applied in conjunction with a form showing in detail once health, finances, background among others details. This is mandatory for adoption process to ensure that no child laundering. The agency will help the adoptive parent through referring him/her to the child after being convinced that he/she is legible for adoption. This will depend with the law put in place by the federal government of each country or state. Each country has its adoption law that has to comply with human rights regulation (OHalloran, 2009). Therefore, the agency through the attorney will be sending a report showing determining once legibility. Legibility is determined by article 4 of the Hague Conventional Adoption Process. It says that the child adoption should be done to meet the child interest. It postulate that the legal custodian should be counseled to ensure that he/she understand the repercussion that underlay the adoption and especially illegal adoption otherwise child laundering (Kristof, 2000). The law also provides that the person who give adoption consent on behalf of a child who is not capable of giving own consent does this in writing after counseling. This will offer a legal background incase any undue process is cited elsewhere. It will in addition reduce any child-laundering occurrence. If the child is above 14 years and is capable of giving her/ his adoption consent is counseled on adoption effects and gives consent afterwards in writing. This reduces cases where parents conspire to have child laundering (Spangenberg, 2002). The law also provides that there should be no payment or inducement that should b e offered prior to the completion adoption process to ensure that the process is not compromised whatsoever. For the report to be offered to prospective adoptive parent, it should be accompanied by a translated to ensure that everything in the report is duly understood. It will also be accompanied with birth certificate of the child or secondary evidence showing child age (Wuiling, 2006). Duly signed irrevocable consent by the legal custodians and other entities or individuals who have are entitled to give adoption consent on behalf of the child as provided for in article 16 of the Hague Adoption Convection , the federal law of the country and the habitual certified report. This is to ensure that the adoption process follows legal order to eliminate irregularities (Marshall Gerald, 2002). The next thing is to apply for the legitimacy of the child to the Immigration to the United State after accepting the referral proposed. This is where the USCIS under the department of homeland security come in to approve the adoption of the child through form 1-800 (Smolin, 2003). USCIS makes the provisional determination whether the child is legible to be adopted in US according to the law and in accordance to the information enclosed therein. For a child to be adopted in US, he/she must meet a convention adoptee to ensure that she/he is legible to migrate to US. This will help in controlling the number of children getting in the country illegally consequently curbing child laundering. If Consular Officer finds that the child is legible for adoption, the net thing is the prospective parent adopting him/her. Finally, the application of immigrant visa for the child is done after legal adoption is carried out. This ensure that the child become a citizen of US by adoption. Visa is a necessary document to ensure that the child trafficking is regulated (Torgoley, 2006). Recommendations to better curb the menace As suggested by OHalloran, 2009 no matter how much the child trafficking act is combated; this has been a thorny issue due to some loopholes that have been there for a long time. United State of America being the chief anti children trafficking agents in the world has to some level failed to come up with laws that are concrete to combat completely this vice (Lifton, 1975). To the contrary, it is the highest recipient of the adopted child which most of them are from the same vice. Therefore, from the study that is done herein, some of the recommendation have been proposed to ensure that the vice is reduced if not eliminated. To ensure that the child laundering is combated in US, the federal government of US should work together with State of Department to overcome the confusion that has ever existed in the approach of the child trafficking (Jerome, 2001). First, the project propose to congress to extended the mandate of the Office to Monitor and Combat Trafficking to include trafficking in purpose of adoption in addition to their normal mandate of labor and sex trafficking (Mabry Kelly, 2006). If its mandate is extended, it should include buying children with adoption purpose as child trafficking contrary to its normal counter-productive approach. Congress and the Office of the Children Issues that is within the Department of the State should implement the Hague Convention depending with its fundamental purpose as anti-trafficking treaty. This will call fro the federal government to review critically the incidences caused by child trafficking within the intercountry adoption system (Garrison, 2000). The US government should provide regulatory measures to ensure that the US consular and immigration being used as child laundering mechanisms. This is through provision of comprehensive criminal and civil actions towards children trafficking and children laundering and remedies within the intercountry adoption system (IdeaConnection, 2011). US government should concern themselves in the aftermaths brought by the vice of children trafficking and children laundering. This is through offering resource support to the prone countries as most of this vice is driven by poverty. Conclusion From the review of the issue of child laundering, it is apparently that it entails illegal stealing and selling of children to adopting parents under false pretenses. The phenomenon has been prevalent thanks to globalization which is free movement of people, capital, goods and services due to technological advancement. Coming second after drug trafficking, child laundering is serious crime in the United States. Globally, about 1.2 million children are stolen and illegally adopted a business that run in excess of $12 billion annually. Above 2.8 million children are brought to America annually, upon setting foot on U.S soils a third of these children are coerced to engage in prostitution and child pornography, these individuals are 12 years on average. The ill-effects of child laundering are both physical and psychological. It is evident that children are subjected to social ill such as pornography prostitution, child labor among other which in the long run impact on their health, how they perceive themselves as well as others, some grow to be abusers and lone rangers even if they are in an intimate relationship. America does have numerous laws that have been put in place to curb child laundering. It is worth noting that each and every state do have varied version of how to tackle the menace. From the statistics, it seems the laws have helped curb the problem as there was a decline on the number of children being adopted. However, the laws have not been effective in successfully addressing the matter. For that matter, there is need for U.S to tighten the mechanisms it uses to verify the validity of the children in question, collaborate with other countries and involve other relevant state organs in fighting the menace, coming up wi th better proposal that will help curb poverty which seems to be the root cause of child laundering. The later can offer a long term solution if successfully adopted.