Saturday, August 31, 2019

Bringing Adam Home Essay

Bringing Adam Home review examines the story of the decades-long investigation into the abduction and murder of 6-year-old Adam Walsh. The police investigation took 27 years to prove guilt of the serial killer, Ottis Toole, who made multiple confessions to the murder. The book is written by the experienced detective writer Les Standiford with the help of the retired detective Joe Matthews, who finally found evidence of Toole’s committing the murder 27 years afterwards. The case of Adam Walsh has influenced the American society in the way that legislatures were made protecting children, and practices were adopted helping find missing and potentially abducted children. Key words: abduction, evidence, investigation, kidnapping, murder. Bringing Adam Home Book Review Standiford, L., & Matthews, J. (2011).Bringing Adam home: The abduction that changed America. New York, NY: Harper Collins. ISBN:9780061983900. Bringing Adam Home is the story of the decades-long investigation into the abduction and murder of 6-year-old Adam Walsh who missed from a local Sears in Hollywood, Florida, on July 27, 1981. The police investigation took 27 years to prove guilt of the serial killer, Ottis Toole, who made multiple confessions to the murder – yet the Hollywood, FL, police department did not believe him and failed to use any of evidences that had been found. The abduction of Adam Walshblew people’s minds and undermined their sense of protection. The American society has never been the same ever since – parents did not let their kids play alone outside, nor did their ever say ‘Be home by dark’; a child could be left nowhere unsupervised. It was Adam’s family bad luck that at that time, there were no Amber Alerts and no national data base for crimes against children. Adam’s parents, John and  Revà © Walsh, bent backwards to change the situation. They became renowned crime fighters, propelled the passage of the 1982 Missing Children Act, and John Walsh became a host of the television program America’s Most Wanted (Standiford2011). Adam Walsh’s kidnapping was not only the most important casein American history of missing children that changed the corresponding legislature but also the most famous one. Many people still remember themselves being kids and watching it on the news (Martin, 2011). However, the details of the case are not as well-known as they should be; given the coverage in the media.The more emotional side of the story, through the eyes of the Walsh family, is rendered in Tears of Ragewritten by John Walsh (Scott, 2011). The puzzle of the botched investigation that ran over almost three decades was solved by the retired Miami detective Joe Matthews and written down by the acclaimed writer Les Standiford, the au thor of 9 fiction novels and 6 non-fiction books (Standiford, 2001). The authors open their cards in the very beginning of the book and introduce the killer, Ottis Toole, right in the second chapter. Toole was a low IQ drifter who set fires and assaulted people to relieve his psychological pressure. From chapter 2 to 4, the authorsgive a detailed recount of the work of Hollywood detective Hoffman who could not organize his work so not to lose important clues and evidence and who was not very keen on the idea that Toole was the killer. According toMatthews, Hoffman is portrayed as a moody and self-contained investigator who â€Å"looked like a guy who disapproved of most things on general principle† (Standiford, 2001). Apart from disregarded leads and lost evidences, Hoffman also treated Adam’s parents carelessly not bothering to inform them that their friend Jimmy Campbell, who was prime suspect, had been cleared. For many years John and Revà ©Walsh received no information from the police as for the investigation of their son’s murder. Matthews felt that it was extremely insensitive on the part of Hoffman. Together with undeveloped enough forensic methods, the case of Adam Walsh advanced by imperceptible pace. As Reve Walsh put it: â€Å"It was a sad thing for this country that the fight had to be led by two broken-down parents of a murdered child†(Standiford, 2001). The authors underscore that it could not be said that the Hollywood department was incompetent. Rather that the case was too difficult, and Detective Hoffman turned out to be too snobbish not only to ask for help but also to accept help from Joe Matthews when he  offered it not once. Hoffman was â€Å"too unstructured and ill-equipped† for such mind-bogging case (Standiford, 2001).Det. Serg. Matthews was a lie detector expert and an experiences homicide detective and, being hired by the Hollywood, Fl, Polic e Department, he was very interested by the case and was ready to use his knowledge to solve the case. Among other things, the difference in approaches of two detectives was that Hoffman was obsessed with finding physical evidences linking Toole to the Adam’s murder; while Matthews believed that circumstantial evidence could make do in some cases. That meticulous recount of all glaring mistakes of the Hollywood, Fl, police department and the detailed description of their daily working life had its aim in showing that detectives’ work is far from the glamorized TV series. Doing on a daily basis such boring chores as searching for a person who moved and did not leave the new address, or surveilling a suspect for many days, exhaust detectives, and the not very dedicated ones â€Å"let things slide† (Standiford, 2011).Standiford and Matthews seem to mention every lead that was not followed, and every report that was incomplete or even falsified. Matthews blames the manner of interrogation when the suspect was let speak without asking necessary questions, and he found the witness who was consistently ignored by Hoffman. The most shocking omission, the reader may consider, was the neglect of the repeated confessions by Toole with a graphic description of the whole process of abduction, murdering, sodomizing, and decapitating of Adam Walsh and the subsequent dismembering and setting ablaze his body. Toole even gave a sensational interview to Jacksonville Times Union where he repeated his confession to the murder of Adam Walsh (Standiford, 2011). Chapters 5 to 6 focus on Matthews’s account of how he proceeded with the investigation. It became possible only after Hoffman was transferred to the Patrol Division in 1994 (Standiford, 2011). Matthews spent two years and nine months reviewing the case and adding new materials. In the end,Matthews had multiple eyewitness identification of Toole taking Adam from Sears, twenty-five independent confessions to the crime made by Ottis Toole, and most important of all – missed by previous investigators – luminal images of machete and luminal outline of a child’s face on the carpet of Toole’s Cadillac. It finally proved Ottis Toole to be the man who committed the crime. The first part of the book does not make an easy reading. When Toole gives his numerous confessions to various  detectives all the same details of the murder, rape, and dismembering are repeated ad nauseam, without adding anything new. Because of it, for those readers who like genuine crime stories, the book may seem quite slow. Standiford and Matthews were extremely repetitive in details of the crime itself, its prolonged investigation, the history behind the suspects, and descriptions of Toole’s perversions. However, the authors rather had in mind to show how the process of investigation can be dragged for years due to the inability of the police to find hard evidence for the already confessed crime. Standiford, who is an experienced detective writer with a number of narrative non-fiction stories under his belt, narrates dryly and matter-of-factly, which contributes to the authentic feel of the blood-chil ling story. Despite waving their incompetence, Matthews provides a scrupulous evidence of the Hollywood, Fla., police department’s negligence, thus making it difficult to believe that behind such an undisciplined behavior may be anything other than a conspiracy to cover up its incompetence. The authors’aim seems to lay in proving two points. Firstly, the case could have been solved within two years, when Ottis Toole was arrested for arson and confessed repeatedly to the murder of Adam Walsh saying that he was â€Å"very, very sorry that he did it† (Standiford, 2011). Secondly, the police department of Hollywood, FL, had a chance to solve the case quickly, had they let do it to Det. Serg. Matthews. Bringing Adam Home is a gruesome story of justice finally served two decades too late. By that time, though, Ottis Toole had died in prison. And our society has changed. Now kids are warned about strangers. No one leaves their kids in the toy area and goes shopping anymore. Lawenforcement has transformed its practices to better protect children. Public places have adopted Code Adam, a powerful search tool for lost and potentially kidnapped children (Code Adam, n.d.). Code Adam is a predecessor to Amber Alert, a network of notifications to the public through urgent bulletins on television and radio. References Code Adam.(n.d.). The National center for missing &exploited children. Retrieved from http://www.missingkids.com/CodeAdam Martin, C. (2011, February 09). Book Review – Bringing Adam home by Les Standiford[Web log post].Retrieved fromhttp://www.chaoticcompendiums.com/2011/02/book-review-bringing-adam-home-by-les.html Scott, M. (2011, February 26). ‘Bringing Adam home’ offers strong proof in the 1981 murder of Adam Walsh. Cleveland.com. Retrieved fromhttp://www.cleveland.com/books/index.ssf/2011/02/bringing_adam_home_offers_stro.html Standiford, L. (2001). Biography[Web log post].Retrieved from http://www.les-standiford.com/Pages/Biography.html Standiford, L., & Matthews, J. (2011).Bringing Adam home: The abduction that changed America. New York, NY: Harper Collins. E-book

Culture Views on Health

Jessica Knott UOP HCA 230 04-19-2010 Cultural Views on Health Health can have different meanings to different people and in their cultures around the world. A person’s health is not any different when it comes to an individuals, nor does it matter what part of the world they are in but they still have the same thing in common physical, mental, social, and spiritual beings. A person’s health refers to how they feel and also how they relate to their environment and the people that share that environment with them. People’s lives and morals are a combination of the different areas is what makes them who they are, and this does not change because of the area where they are from. A person who is happy and has a healthy lifestyle has created a healthy balance of their physical, social, spiritual, and emotional part of their life. â€Å"There are different ways of looking at health. Every culture has a concept of health that is probably different to that of others† (Capdevila, 2006) A person’s upbringing or background can affect the medical treatment they receive. Some cultures believe in holistic medicine. Some cultures treat their people with such practices without seeking treatment from a clinic or facility. The ethnic, cultural, and personal belief of an individual can affects the ability to receive care. For example in China herbal and holistic medicines are use everyday to help treat patients. These remedies have been used for centuries and continue to be passed down from generation to generation. Now Asian Americans have faith and believe in plants and their healing properties. The new fad in American culture of wellness and feeling the harmony between the mind, body, and spirit has its roots also in the Chinese culture. American culture looks for healing in new modern techniques of medicine and in technology. Americans usually say that we treat the disease and not the patient because we don’t have a patient without the disease. A lot of people believe that the herbal approach is helpful, while others do not believe. Some people believe that it should not be relied on because different people have different ways of providing medical care when it comes to herbal medicines. But a lot of Americans still have a more modern views when it comes to health care, due to the fact that we have the best and latest medical technology. â€Å"The Asian American/Pacific Islander population in the U. S. is mostly foreign-born. Therefore, these families continue to hold on to traditional views of health and illness† (Cantore, 2008) Acupressure is usually what is used in the Asian culture. But it is also being used now in the United States because we have a mixture of cultures. People from all cultures are now using acupressure to help as a cure. It supposes to help with smoking addictions and relieve the pain of childbirth. â€Å"It can be used to stimulate sleep or digestion or to increase mental stability. †¦ Many doctors recommend meditation and yoga to relax patients undergoing modern procedures such as chemotherapy or surgery. † (Cantore, 2008) â€Å"Eastern practices are popular because health consumers are more informed and are taking more responsibility for and control of their health. In addition, these practices and remedies assist the body in maintaining health and aid the body in natural healing. (Cantore, 2008) Vietnamese culture which is still an Asian culture, believes in harmony, balance in their lives and with their health. There are many differences between the American and Vietnamese cultures, for example in America if you are overweight or obese it is not a good thing. But in the Vietnamese culture being overweight or obese is seen as a good sign of economic status and people actually envy yo u of this. There are implications to health care providers when it comes to both cultures. For example, in a culture where obesity is more acceptable, health care providers are challenged to provide care to more people. â€Å"Stopping the cycle of obesity before it becomes the leading cause of preventable disease and death in the United States is a priority for community health nurses. † (Durand E, Logan C, Carruth A, 2007) Every culture and society has their own beliefs and morals. Some believe in the herbal medicine, some believe that they are heal by faith, and some use technology for the answer. But I believe that the important side of that is that we must respect what a person believes is right. As long as the patient is not going to cause themselves any harm by holding onto cultural practices, is allowed to follow their traditional beliefs. Some of the medical practices that come from other regions and cultures are now being more accepted into the modern world, so we should be open to many different options when it comes to our health and treatment plans. References Capdevila, G (2006, May 25) BOLIVIA: Wanted – Healthcare Adapted To Indigenous Cultures. Retrieved on April 11, 2009 from http://ipsnews. net/news. asp? idnews=33372 Cantore, J (2008) Modern Nursing, Traditional Beliefs. Minority nurses can play a crucial role in helping Asian patients bridge the gap between East and West, old and new. Retrieved on April 10, 2009 from http://www. minoritynurse. com Durand E, Logan C, Carruth A. (2007). Association of maternal obesity and childhood obesity: implications for healthcare providers . Journal of Community Health Nursing. 24 (3): 167-76 (journal article – review, tables/charts). Retrieved on April 11, 2009 from EBSCOhost database.

Friday, August 30, 2019

Health Care Industry Paper Essay

Introduction In today’s society, healthcare and the issues surrounding the topic has went through some major changes within the last decade. Some of these changes in my opinion were decent and very important when it comes to providing exceptional quality care in this health care industry. Although some of the changes were not so reasonable in the eyes of most, these changes were in the best interest for the economy and for the improvement of the healthcare industry as a whole. In this paper the author will attempt to explain how the healthcare industry has changed over the last 10 years, the biggest change in healthcare in the next 10 years, and the role the author plan to have in the health care industry in the near future. The author will also explain how she would adapt her skills along with the industry’s needs, and how her perception has changed over the course of the program here at University of Phoenix. Finally the author will explain the most significant impact of the program, the role technology will play in healthcare organizations in the upcoming decade, and the financial and economic issues that will affect the healthcare industry in the next 10 years. Optimistically after the reader has carefully observed the content in this paper, he/she will have a better understanding of the delivery of healthcare and the changes that are made to ensure a better future for our health. How has health care changed in the last 10 years? Health care has changed dramatically over the last 10 years and the changes for the most part has been very successful in regards to delivering quality service in healthcare. One major change that has been very significant in healthcare is the dramatic decrease in the mount of hospital stays after a major surgery or procedure is done. In the past, an individual that  participated in a major surgery would have stayed confined to a hospital for at least a week to ensure proper healing and recovery. Now 10 years later several individuals may have the same surgery procedure conducted and will be home in a couple of hours, days, and in some cases the same day depending on the severity of the surgery. Technology has been a major contributing factor behind the improvement and delivery of quality healthcare within the last 10 years. According to Burchill 2010, technology is intended to assist several organizations accomplish specific tasks easier and more rapidly. An organization has to stay ahead of all the new changes and frequently shifting routines within the health care system (Burchill, 2010). Technology has ensured faster service when admitting patients, recovering patient’s information, and when providing surgical procedures that reduces the amount of time a patient has to spend in the hospital for recovery. What do you think will be the biggest change in health care in the next 10 years? There are some significant changes that I have observed recently that will be a dramatic change in healthcare in the next ten years. Some of those significant changes are; the rising costs of healthcare, lack of procedures covered under certain insurances, lack of access to care, and uninsured individuals. The most significant change is that now all individuals have access to care and are covered with insurance u nder the Affordable Care Act. By allowing all individuals to receive healthcare insurance and be given access to care this should more than likely reduce illnesses and motivate individuals to take advantage of the resources that are available under the insurance to better take care of themselves. Another big change that will be very significant in healthcare delivery will be through telemedicine. Telemedicine is where physicians and other healthcare providers can actually see and evaluate patients over the Internet. Many smaller communities in the United States are already utilizing telemedicine to great advantage (Burchill, 2010).Although telemedicine is a great way to deliver quality healthcare in a timely fashion, there is also a downside to the procedure as well. Telemedicine will in some way hinder the face to face communication between the doctor and patient that is vital in reducing errors. Most patients have a better understanding of what is expected of them when it is communicated clearly and effectively by their physician. Communication is the process of understanding and having meaning (Du Pre, 2005.) and it is  also the process of relaying information between people by the use of words, letters, symbols, or body language (Sallee & Forrest, 2005,). In my opinion I feel that telemedicine will decrease the moral as far as the Dr. and Patients are concerned. Although telemedicine may decrease a portion of the healthcare cost by less visits to the doctor, it will lose the value and importance of actually sitting down and talking with your doctor and receiving that one on one face to face time. Most patients are not even in tuned with technology and this can result in many errors and communication issues. What role do you plan to have in the industry? I think once I have entered the healthcare industry I will play a vital role in implementing fair but tough decision making when it comes to delivering efficient, friendly, quality healthcare. I feel that I will make reasonable decisions based on the enhancement of the facility while considering the needs of my patients and stakeholders as. I will be a leader that encourages a comfortable work environment where individuals are relaxed when reporting to work that will ultimately result in a productive staff that provides quality healthcare to our patients. How will you adapt your skills to evolve along with the industry’s needs? The skills that I have adapted here at University of Phoenix has changed my way of thinking. It has also assisted me with analyzing specific situations thinking outside of my way of thinking. So once I start working in the health care field, I will first observe my strengths and weaknesses within the organization, I would attempt to ask for advice on my weak areas, I will shadow other health care administrators, and I would also be willing to further my education to evolve with the industry’s needs if necessary. Has your perception of health care changed over the course of your program? What has had the most significant impact? Since I have been a student here at University of Phoenix my perception of healthcare has changed dramatically. I now have a better understanding of the different legal and state regulations that are involved, the stakeholders, and also how physicians and patients are billed for services received. This program has opened my eyes to a variety of situations that I did not know about in regards to healthcare. The most significant impact to me is the amount of individuals that were not covered under any type of insurance. I did not know that there were so many  uninsured individuals in the world. Now that I am aware of the problem of the uninsured, I am very satisfied with knowing that the Affordable Care Act will be something in motion to guarantee that all citizens will be covered under some type of insurance. What role will technology play in health care organizations in the coming decade? Technology will play a very important role in healthcare in the coming decade because technology in my opinion will become more advanced. I really do believe that most services such as x-rays, cat scans, etc. will be conducted without the patients leaving the comfort of their own home. What financial and economic issues will affect the health care industry in the next 10 years? I believe that with all the new technology out there, there will be more ‘baby boomers† and individuals living and this will have a significant impact on the health care industry in the next 10 years. The healthcare cost will rise significantly because with these individuals living longer there has to be individuals there to care for them and health services must be provided. Conclusion In Conclusion, The author explained how the healthcare industry has changed over the last 10 years, the biggest change in healthcare in the next 10 years, and the role the author plan to have in the health care industry in the near future along with how she would adapt her skills along with the industry’s needs, and how her perception has changed over the course of the program here at University of Phoenix. Finally the author explained the most significant impact of the program, the role technology has played in healthcare organizations in the upcoming decade, and the financial and economic issues that will affect the healthcare industry in the next 10 years. Hopefully after the reader has carefully observed the content in this paper, he/she will have a better understanding of the delivery of healthcare and the changes that are made to ensure a better future for our health. References Burchill, K. R. (2010, July/August). ARRA and meaningful use: Is your organization ready. Journal of Healthcare Management, 55(4), 232-235. Du Pre, A. (2005). Communicating about health: Current issues and perspectives (2nd ed.). Boston: McGraw Hill. Sallee, A. & Forrest, S. (2005). Effective communication and conflict resolution. In Contemporary nursing issues and trends (3rd ed.). St. Louis: Mosby

Thursday, August 29, 2019

Preparing and exam taking Research Paper Example | Topics and Well Written Essays - 1000 words

Preparing and exam taking - Research Paper Example Preparation for exams starts during the first class. The classes that the student attend, various contributions made in class by the students, and assignments that students complete will help in preparing for any questions that an examiner may set in the future (Kesselman-Turkel & Peterson, 2010). The semester involves the addition of information to a students’ knowledge base. Essay questions normally involve information that one may have found irrelevant during class, which could be used as a supporting point to the thesis. Students who are involved in class have to cram less than those who skip class. Students should also note the topics that the lecturer finds interesting. Not surprisingly, the specific topics noted make up a significant proportion of the exam that the lecturer administers (Kesselman-Turkel & Peterson, 2010). Thus, it is important to note the topics in which the lecturer spends more time discussing. This will aid students in remembering important highlights when preparing for an exam. The students should also keep their syllabus. Losing the course syllabus is a big mistake since it is an important paper. It aids the students in organizing the information that they take in and will give the students ideas regarding the topics that the exam will emphasize. The syllabus will also act as a guide when studying for the exam. The students should also add notes to the syllabus as the lessons progresses, circling themes, topics, and books that appear most likely to be contained within in the exam (Kesselman-Turkel & Peterson, 2010). In addition, participation in class is a good way of preparing for exams. It aids the students in being better acquainted with the course material, as well as letting the lecturer know the areas that students are interested while in class. Test grades seem to reflect one’s attendance in class and the

Wednesday, August 28, 2019

Annotated Bibliographies Essay Example | Topics and Well Written Essays - 500 words - 1

Annotated Bibliographies - Essay Example They argue that the decline of American students in STEM threatens the country’s competitive edge in the world economy. In response, they recommend the D2D Model to increase the number of students in STEM. Onjira and Gilbert (2009) illustrate the affordances of machine-processable competency modeling. They argue that machine processing is invaluable in e-learning and assessment. They emphasize its effectiveness in e-learning. In addition, Onjira and Gilbert (2009) present the competency model’s affordances in generating questions, distractors, and adaptive query sequences. In the article, they conclude that using machine-processable competency overcomes many limitations in interoperability, reusability, and portability. They demonstrate the ease of automatically generating questions using templates. The system enables them to generate many questions from one template. They further argue that the presence of plausible distractors poses a challenge in generating multiple-choice questions. They conclude the article by looking forward to a future with an automated feedback system. Ricardo et al. (2009) explains the role of mathematics and statistics in the expression of scientific ideas. They conclude that mathematics and statistics are the languages of science. Because of the effect of the internet on learning approach of students, Ricardo et al. (2009) explored innovative ways of learning and teaching methodologies. They advocated acquisition of core competencies by students, development of relevant software and better methods of assessment emphasizing on higher-level abilities. In addition, the researchers propose student-centered learning that students employ Information Technology in acquiring knowledge and self-assessment. Ricardo et al. (2009) present the R-QUEST as a new programming language that solves many statistical problems, thereby

Tuesday, August 27, 2019

Motivation and Motivation Strategies-PSY Essay Example | Topics and Well Written Essays - 500 words

Motivation and Motivation Strategies-PSY - Essay Example Using Maslow’s Hierarchy of needs it is the case that I am not attending school to attain many lower level motivators (Food, shelter etc) but I am attending school for a spectrum of middle of higher needs. I do seek respect, and friendship from my peers but I also attend school to attain a higher level of education which could lead to a well paying career. Moreover I am also seeking enlightenment and wisdom through my studies. What motivates you generally? (Consider arousal, incentive, and self-determination theories) When utilizing a self determination theory I believe that I have a real desire to better myself through studies. There are a number of externalities in my life, however the experience that I get from studies is entirely self directed insofar as I enroll in classes that I believe are stimulating. In regards to incentive theory I believe that self directed rewards motivate me the best. In some regards I am not always motivated by money yet I enjoy physical activity because I know that it is healthy for me and will ultimately make me stronger. From an arousal perspective I believe that this theory holds particularly true for me because many activities are not solely directed for the reduction of tension (Such as exercising) yet I often seek a balance between physical activity and achieving goals.

Monday, August 26, 2019

Mao's paintings in Cultural Revolution and contemporary Chinese Art Term Paper

Mao's paintings in Cultural Revolution and contemporary Chinese Art - Term Paper Example The essay "Mao's paintings in Cultural Revolution and contemporary Chinese Art" discovers the Chinese contemporary Art and Mao's paintings in the context of Evaluation of Political Implication. This essay shall focus on the paintings of Mao Zedong during the Cultural Revolution of China and upon the matrix of the paintings by Zedong; a comparative study of the contemporary Chinese art shall enable to comprehend the different political messages inherent in the paintings evolving in different periods of Chinese history and cultural history. In order to compare the paintings of Mao during the Cultural Revolution in China with that of contemporary Chinese art, it is quintessential to understand the fact at the outset of the essay itself regarding the sources of the images of Mao Zedong in the Chinese art. If the span of leadership and influence of Mao Zedong is introspected from a close contour, it culminates into an inference that Zedong has reigned in the Chinese political regime for i n excess of a half century. This tenure is quite elaborate in nature; as a result the Chinese culture and art also underwent massive changes within the stipulated time frame. Not only did Chinese culture and society experience a massive change but also the Chinese art was not spared from the transformation the society was experiencing. In a very unprecedented manner, Chinese art experienced reforms that were related largely with its ideologies and presentations. Captivating the imprints of the revolutionary era., Chinese art evolved as one of the most celebrated and important facets of history of art in the world. Mao was dead but his physical death did not cease his eventual influence upon the people of China. Yan Shanchun correctly remarks in the essay, â€Å"The Image of Mao Zedong and Contemporary Chinese Art†, â€Å"Maoist’s thoughts on literature and art, and indeed his image, were the imperative factors in Chinese art movements in the entire later half of the t wentieth century† (Jiehong, 2007). It has been very rightly observed that most of the portraits of Mao Zedong have been sketched from the photographs of the great leader. The photographs of Mao since the initiation of the art of photography during the middle of the nineteenth century influenced the portraiture of Zedong. With the growing years, the influence of the soviet communist leaders on the cultural domain of China started gaining grounds. If the China’s political ideology is revised then it can be well observed that during the late 1950s the ideological foundation of China’s political philosophy found its base from the two elements; Marxism–Leninism evolved as a pure theory and the thought process of Mao Zedong acted as a practical ideology, a thought that was executed. And, in the similar fashion, the communist leaders were being worshipped in the houses and streets of Russia, the portrait of Mao Zedong started appearing in the walls, stations and important crossing across the country enabling a rage of personal cult worshipping in China (Chineseposters.net, 2013). Comparison While executing the introspection of the paintings of the great leader Mao Zedong during the years of Cultural Revolution and after the siege of the revolution which falls under the era of the contemporary Chinese art, a great variety in the size, transformation regarding the strategies of painting propagandas, and compositions

Sunday, August 25, 2019

English Research Paper Example | Topics and Well Written Essays - 1750 words

English - Research Paper Example Opposite gender becomes a source of distraction for the pupils in high schools, therefore, single sex schools provide more focused environment to the students by removing their object of distraction. Education is a process which entails transference of knowledge and practices, development of skills and learning of new concepts through innovative and strategic skills of the educator (Burner, p.9). Thus, beneficial teaching entails successful transference of knowledge with the development of quality person along with prominent accomplishments of the learners. The teaching strategies applied and environment impacts adversely or optimistically on the learner, which means either it supports the learning style of the child or it hinders that process. Hence, this process essentially takes place in a specific environment developed by the educator. Therefore, the choice of educator in developing such an environment for the learners impacts hugely on them. Parents and teachers chose and set en vironment for their children, which supports their learning style. ... Therefore, it promoted their participation and rights for higher education, which consequently resulted in admittance of girls in the same schools. The co-education was new and it was considered most beneficial for both girls and boys to learn and prosper; academically. Thus, co-education system is largely prevalent and active in the most parts of the world for teaching both girls and boys. Only in US majority of the schools only offer co-education school system and only a smaller percentage of schools offer single sex school system. In the recent years USA has faced serious decline over quality public education and lower high school graduate rate due to increased drop outs. Thus, government of America emphasized on developing a new policy or strategy, which would fully support the learning of its youth for its technological and educational development. According to study, American graduation rank has declined to 18th position among the developed countries, which is extremely low tha n before (Foster, p.2). Therefore, educators and policy makers have been considering single sex option for all public schools due to its impact on the academics of individuals. The notion which never came under research before was how male and female students impact on each other in an educational setting. In 2008, US Department of Education proclaimed that single sex schools benefit girls to pursue their carrier in mathematics or science as they minimize distractions, which consequently results in improved attention span and achievement record. However, in 2001 a law was passed against single sex schools, which clearly stated that if the single sex schools are equally available for both genders then such an education system can be approved

Saturday, August 24, 2019

Introduction to international relations class, summary related to Essay

Introduction to international relations class, summary related to course on Path to War - Essay Example However, Path to War did not only highlight the personal dilemmas that the president had to deal with during the Vietnam debacle. The movie also exposed the two lines of thought and the corresponding approaches in international relations during the time of the Cold War. In fact, many of the scenes of the debates that took place the Johnson administration’s cabinet meetings focus on these concerns. The ‘domino theory’ was a very influential concept among the politicians at that time. The U.S. government itself was its strongest believer. This theory is based on the analysis that if one country becomes communist, the neighboring countries would surely follow, just like the pieces of the domino. In Path to War, Johnson is portrayed to have firmly believed that once South Vietnam is reunited with the North, it would become communist too. Subsequently, the rest of the countries in Indochina and the entire Southeast Asia could all fall under communist regimes. With this theory in mind, the Johnson administration at the onset of the war were all one in arguing for the necessity of preventing the fall of South Vietnam to the hands of the local communist insurgents. To do so, it sent military advisers to the Southeast Asian country in order to train its armed forces.

Friday, August 23, 2019

Pluralism vs. Elitism in Public Policy Making Essay

Pluralism vs. Elitism in Public Policy Making - Essay Example The elitist view of power, on the other hand states that â€Å"political power should be in the hands of a relatively small part of the general population that shares a common understanding about the fundamental issues facing society and government†3. Those who advocate the elitist view of power argue that the general public is best served when a basic consensus exists among a country’s top leaders regarding fundamental issues. â€Å"Although these leaders may disagree on minor issues, or even compete against one another for positions of authority in government, the fact that they share a common view on issues that might otherwise split the nation is regarded as an important foundation for governing†4. With the practice of democracy in the United States as the principal basis of such claims by pluralists and elitists, is it safe to say that equality under the law is enforced in the face of political, social, and religious diversity among men, and the conflicting interests of their representatives? The Dispersal of Power among Groups Pluralism gives stress on the role of interest groups in political agendas in the United States. ... They further emphasize that politics is not the central decision-making of a united public acting through the state, but the result of continuous competition, bargaining, and exchange among groups representing different interests. Pluralists accepted Schumpeter’s broad view that what separate democracies from non-democracies are the methods by which government officials are elected. Democracy, in the United States of America, is generally regarded as synonymous to political pluralism despite the rise of scholarly notions that say otherwise. For Weber, elite domination within the state apparatus was inevitable. As Weber himself puts it, â€Å"all ideas aiming at abolishing dominance of men over men are illusory†5. The crucial feature of the state is located within its roles as the major authoritative associated within a given territory. For the state to maintain its central position it has to claim a monopoly of the legitimate use of force. Domination, or as Weber termed it, â€Å"the authoritarian power of command† is a necessary and inevitable feature of this process. However, the concentration of both economic and political decision making in the hands of a central government bureaucracy is incompatible with democracy. Democracy requires limited government, individual freedom, and dispersal of power in society On September 17, 1787 the Constitution of the United States of America was approved and instituted the following fundamental principles: (1) standard sovereignty, or control by the people, (2) a republican government in which the people select representatives to make decisions for them, (3) limited government with written laws, separation of powers, with checks and balances among branches to prevent any one branch from gaining too much power, and

Politics and the Media, News Coverage Analysis Assignment Research Paper

Politics and the Media, News Coverage Analysis Assignment - Research Paper Example The significant aspect of immigration is fundamentally described as the transfer of individuals or people from one particular country to other in order to make permanent settlements. In this similar context, several political figures and intellectuals of the United States referred to the country as the nation of immigrants. This is owing to the reason that in excess of 23 million immigrants particularly from the European nations had become enduring residents of the US between the years 1880 and 1920 (Jimenez, â€Å"Introduction†). It has been apparently observed that the immigration policies of the US have become a widespread political debate for last few decades. It is in this context that the present President of the US i.e. Barack Obama has been recognized to take speedy action towards providing the opportunity for legal residency relating to the significant concern of the US immigration policy. Moreover, it has also been viewed that ratings or polls have been conducted for the approval or the disapproval of the new immigration policy that is especially designed for the illegal immigrants in the US. In this similar context, the ratings or the polls have eventually acquired the attention of the Americans and raised the political image of President Obama (The New York Times Company, â€Å"Obama Urges Speed on Immigration Plan, but Exposes Conflicts†). The New York Times is regarded as one of the renowned American based daily newspapers, which was founded in the year 1851 in New York City. It has been viewed that the newspaper published one similar kind of article relating to the US immigration policies entitled â€Å"Immigration and Emigration† in recent days that was of quite narrative type (The New York Times Company, â€Å"Immigration and Emigration†). Conversely, The Washington Post is the other American based daily newspaper that was established in the year 1877 in Washington D.C. The newspaper has been identified to publish several articles linked with the US immigration policies in recent days that are of quite narrative type (The Washington Post Company, â€Å"Company Profile†). Thesis Statement This paper intends to critique the news coverage concerning Obama’s initiatives towards making immigration comeback and speedily working upon the US immigration plan. 1. How Does The News Story Conform T o Prevailing Standards Of Newsworthiness? What Criteria Are Present In The Story? How Do These Criteria Appear To Be Driving This Story? The news story that was published by the newspaper The New York Times, conforms to prevailing standards of newsworthiness by depicting Obama’s one of the significant initiatives towards facilitating a large number of unlawful immigrants residing in the US on a clear pathway to nationality or residency. There

Thursday, August 22, 2019

Britannia Airways and Virgin Upper Essay Example for Free

Britannia Airways and Virgin Upper Essay Ill start by reporting on the Virgin Atlantic Upper Class suite website. To start with you are prompted to select what country you live in. This is so the person who enters the website can get it in the relevant language. To start with, you get to click on the different things on the plane, and a menu appears in this you get to select which item you want to read about. On the navigation menu on the top of the page, if you click on the box saying Experience you are able to have a virtual tour of the different features of the plane. On this page there are 3 sub-menus. These are Reaction this is reports on what other professional plane experts have said about it, the second one is Have your say this is obviously where the explorers of the sight can leave their feelings and their views about the site, and lastly there is Response this is where the members of Virgin Airways Flying Club have written what they think of it and what they would do to improve it. The next section on the navigation bar is The Facts. This is all about the design, and how they came up with it, how it compares to other aeroplanes, the essential facts, and all questions answered. This helps people to get a good feel for the aeroplane and its features before they consider booking a flight on the newly designed Upper Class plane. If you have already booked a flight, you can check details on the Internet if you enter you departure City and arrival city. You can do this under the Routes section. There is an Offers section, but at the time of producing this report an offer had just finished, but another one was yet to start. If you go onto the Competitions button on the navigation bar, you can do a quiz about the new aeroplane and if you answer them all correctly you can win a pair of tickets to New York on a Virgin Upper Class plane. The next icon is called Loyalty Programme in this area you can sign up to become a member of the Virgin Flying Club. There is also a section called E-Cards where you can send them to your friends, to show them how beautiful the new Upper Class Plane is. If you scroll down to the bottom of the page them you can select Book a Flight. This was unavailable when I went on there, but it was only because the site is quite new and they are just putting on the program that will aid with online flight bookings. The pages are easily navigable, and user friendly, even for those who are only beginners with computers. There are loads of pictures, and the background to the site is black and dark purple; the writing is red and white. It looks very eye catching, and would make you want to go back to the site again. They currently only go to New York, Los Angeles and a couple of other places, but the places in America they fly to is going to increase as the new improved plane flies more, and more are obviously made. You get a T. V, a bed in which they will give you bedding on request, refreshments and food available when you request them, video playing facility, and much, much more! I am now going to review the Britannia Airways website. When you first go onto the website you are greeted by a bright blue screen, with the word Britannica in red letters on the top left corner. There are also 2 blocks of three colours on the page. There is a picture in the middle, which changes to give you different views of the aeroplane. If you scroll down, after this there is a booking form for booking a flight. I decided to fill this in; however the airport I fly from most frequently was not on the list. (London Heathrow) I filled in the rest of the details. However, it was not easy as it would not let me enter the data quickly, it was slow. Then it too quite a while to search the records and find what I had requested. Then I realised a new page had appeared and asked me to re-enter the data. I got annoyed!! On this one it had London Heathrow but only had 4 destinations that were flown to from there. I got annoyed and left it. I clicked on the icon called Pre-Bookable Options here you could choose to order Champagne, go into the VIP lounge, special meals, extra leg room or get Executive Check-In. However, when I clicked on them no estimated prices for these services were given. This was not good, as if you were a family on a budget then you would not really want to phone up and ask as they might push you into getting a service that you cant afford. There is a bit called In-flight Shopping this is what is available when they go along the plane with the trolley. They have a Check in and Advice icon, where it tells people who maybe have never flown with Britannia before, or those who are not familiar with airports the process to undertake, before during and after you are in the airport. They have many different planes all with different seat capacities. The seat capacities are as follows: 757-200 235seats 767-200 274seats 767-200 290seats 767-300 315seats 767-300 328seats The i 10. 00 charge is for Select your Seat only and must be booked in conjunction with seats together, extra or premium seating. Combined price from i 20. 00 return per adult (from i 27. 00 return per adult long haul) and from i 15. 00 return per child (from i 20. 00 return per child long haul). The price varies dependent on your choice of seating combination and the length of the flight. It also has a section called Can I Take it this includes what size your allowed for hand luggage, and how much your luggage should weigh. This is very interesting. There is also a lot more relevant information. There are not many pictures. It is quite easy to navigate. The flight destinations are mainly in Europe. Food is available on longer flights. After carefully studying both websites, I prefer the Virgin Upper Class website for the design, interesting features and layout. However I would choose the Britannia website for the most relevant information. If Virgin put some interesting features on their website, and Britannia put some more pictures, and so different colours apart from Blue, then I would give them both 10 out of 10. as it stands I would give Virgin 9 and Britannia 8 1/2 as it is not that far behind, but at the end of the day the Virgin website is designed for business personnel and the Britannia website is designed for families. So both I think are good for the audience they are aimed upon.

Wednesday, August 21, 2019

Use of Azithromycin for Asthma Patients

Use of Azithromycin for Asthma Patients Does adding azithromycin to standard therapy for asthma patients with acute exacerbations improve symptom resolution? Background: ÂÂ  Asthma is presented as a chronic long term disease that causes inflammation, narrowing and mucus production in the lungs airways resulting in difficulty breathing. It is assumed to be initiated by genetics or environmental influences. Physical activities and other contributing factors can exacerbate asthmatic symptoms that include coughing, wheezing, shortness of breath, and chest tighten. Most patient symptoms occur at a rapid onset and requires immediate treatment. Asthma is not curable but symptoms can be controlled with appropriate therapy. Patients with asthma are given treatment based on the severity and frequency of symptoms. Therapy options include SABA, LABA, corticosteroids or leukotrienes and adjustments are made as needed. However, many patients still experience uncontrolled symptoms that effect their daily activities. Macrolide antibiotics such as azithromycin have been recently studied as adjunct therapy for asthmatics, due to their anti-inflammatory and antimicrobial properties. Researchers are geared to believe that untreated bacterial infections within the lungs are the underlying influences of asthma related problems. Despite these findings, the issue is still being investigated as patients on traditional standard therapy are still experiencing unwanted symptoms. Literature Search A literature search was conducted utilizing the MEDLINE database of Pubmed using MESH terms asthma and azithromycin and MESH subheading therapy. The terms were combined using AND which returned 37 articles. The application of additional limitations of 5 years, randomize controlled trials and humans were applied which reduced the search total amount to 17 articles. Although 17 articles were retrieved during the search, each article was evaluated based on their relevancy and criteria, the above article was selected because it addressed the question at hand. Results AZIthromycin in Severe ASThma (AZISAST) was a randomized double-blinded placebo control trial conducted to determine if adding azithromycin to asthmatic patients as standard therapy would be statistically and clinically beneficial.ÂÂ   The trial was conducted from September 2011 to April 2014, as a United Kingdom multicenter study. The study consisted of individuals ages 18-75 that had been diagnosed with persistent asthma. Inclusion criteria consisted of patients whose current therapy included high doses of inhaled corticosteroids, inhaled long acting beta agonist LABAÂÂ   for six months prior to the study, two severe asthma exacerbations required systemic steroid therapy, or if they experienced a lower respiratory tract infection that required antibiotic treatment within a twelve month period2. Subjects were excluded if they had prolong QT interval, severe bronchiectasis, currently receiving macrolide treatment in past three months, laboratory abnormalities, pregnant or b reastfeeding and concomitant anti-IgE treatments2. Participants were randomly selected to receive to 250mg capsules of azithromycin (n=55) and a placebo (n=54) in combination with inhaled corticosteroids and LABAs for six months2. Subjects in both treatment groups were matched in respect to the baseline characteristics. The intervention instructed patients to take one capsule daily for five days and continue with one capsule three times a week with a total treatment period of twenty-six weeks. The primary outcome measured severe asthmatic episodes during the treatment phase in both groups, which was defined as hospitalization, emergency department visits, and the utilization of systemic corticosteroids for three days2. Secondary outcomes measured lung function (FEV1), peak expiratory flow (PEF) quality of life (QOL) and asthma control score2. Analyzing the secondary outcomes, the azithromycin group reported a number of thirty exacerbations occurred in comparison to twenty-seven form the placebo group. (p=1.000)2. Additionally, azithromycin and placebo group experience two hospitalization admission due to exacerbations (p=1.000)2. Other efficacy outcomes showed there was no significant improvement in the Asthma Quality of Life Questionnaire score between both groups. The treatment period lasted for six months and demonstrated no significant difference between the azithromycin group and the placebo group in relation to asthma exacerbations. The estimated primary endpoints without adjustments resulted in 0.71 (95% CI 0.52 to 0.97) in the azithromycin group and 0.80 (95% CI 0.59 to 1.07) in the placebo group with a p-value of 0.6002. With the addition of sensitivity analyses restricted to asthma exacerbations results were 0.55 (95% CI 0.38 to 0.78) in the azithromycin group and 0.52 (95% CI 0.36 to 0.75) in the placebo group with a p-value of 0.8472. Based on the aforementioned data, add-on therapy of azithromycin is statistically and clinically insignificant, as well as did not reduce the rate of asthma exacerbation in adults. Recommendations Although, the clinical trial failed to demonstrate that azithromycin was clinically /statistically significant in patients with asthma. This should not be a definite factor to rule out the therapeutic benefits azithromycin can have on patients with respiratory infections that contributes to asthma exacerbations. Developing an accurate interpretation from the study can be difficult considering the study focused on a small population and the duration of treatment was only twelve weeks. I would not recommend azithromycin as add-on therapy for patients with asthma due to it showed no improvement in comparison to patients receiving a placebo, as well as long-term use of a macrolide might lead to resistance. References Brusselle GG, VanderStichele C, Jordens P, et al. 2013. Azithromycin for prevention of exacerbations in severe asthma (AZISAST): a multicenter randomized double-blind placebo-controlled trial Thorax 2013;68:322-329. 10.1136/thoraxjnl-2012-202698mm

Tuesday, August 20, 2019

Automation Process in Online Shopping

Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the Automation Process in Online Shopping Automation Process in Online Shopping 1. INTRODUCTION Online Shopping 1.1 About The Project This project is developed for the automation process of shopping throw online i.e through web. In marchant module adding the catogories,products,itemSales, giving orders, stock maintenace, creating invoice (bill) for orders, shipping of items order given by customer. creation, details, and other transactions like automatic increment,decrement of stock, paid invoice(amount),shipping invoice And all other transactions for large scale whole sale or retail sales, very big shops, or organizations. This project mainly contains 3 modules like Marchant module, Customer module, and invoice module. In customer module customers will give orders for items which are being available in that shop. In our project that order is processed and details are stored in data base. In invoice module total bill for ordered items will be created. In case if the ordered items are not being shipped at a time then the pending order details will be processed and the bill for the pending order will be created. In Marchant Module products are being maintained in category wise and product wise, item wise and up to date stock will be maintained in computerized manner. And up to date order given by the customer through online web status will be shown with help of dynamic web pages by getting data from database. EXISTING SYSTEM In existing system every thing is manual like customer will go to shop manually and he/she selects items which are available in shop and the marchant will calculate the bill for products selected by the customer and then shipping process will take place. Existing System is manual, every thing we have to do manually displaying items Selecting items Billing process Shipping Problems in present system Could not synchronize the Outward information to shopping order details. No track of the complaints and replaced goods after ordering Order status is updated manually using Order Confirmation. Very high levels of effort for preparing invoices and dispatch related documents and routing them to relevant departments or locations and high levels of clerical activity on account of applicability of different customers and products. Increased levels of expectation from customers with respect to prompt delivery of items. Inability to accurately judge changing patterns of fast and slow moving items on account of large volumes of data, and inability to track goods in transit. Difficulties in handling customer queries pertaining to consignments in-transit and partial dispatches. Important orders not discriminated from others since all orders since all orders were processed on a FIFO basis-hence need to be able to prioritize and process orders on a preferential basis (for high value orders or important customers), if required. Increase in frequency of goods returned on account of damage leading to high stock levels of damaged goods in the factory. Discrepancy between ordered and invoiced quantities on account of either partial availability of stocks or clerical oversights. Insufficient checks in the current system for ensuring customer credit limits are not exceeded. Sales data not analyzed properly to streamline production volumes. This is primarily on account of varying sales patterns across the year and high volumes of transaction. Customers could communicate to the Sales people but no information is kept in track for future references. Marchant or Management couldnt not have any information regarding latest sales reports unless requested and taken it for Spreadsheet applications. Marchant or Management requires the Quality information updates against the complaints and quality measures and metrics, which the current system couldnt provide such facilities. The end user of this product is a departmental store where the application is hosted on the web and administrator maintains database.This application which is deployed at the departmental store will automate the following process. the customer details are appended to the customer database. The details of the items are brought forward from the database for customers view based on the selection through the menu. Database of all the products are products are updated at the end of the each transaction. 1. MODULE Marchant Module Marchant will enter into the next form by entering username,password in this login page,after entering into next page marchant will add new products, categories, different different items what are all the items available in that store,and if he wants he will modify the things,he will delete things And maintains everything by date wise. Enhancing stores update stores delete from stores Software and Hardware Requirements The following software and hardware are recommended for the company. Hardware Requirements: Processor : Pentium Speed : 233 MHz Monitor : samtron HardDisk : 4.2 GB RAM : 128 MB Software Requirements: Operating : SystemWindows NT Language : JAVA (JSP, JDBC).JDK 1.4 Backend : ORACLE 2.0 SYSTEM SPECIFICATION 2.1 Introduction 2.4 Advantages of the Proposed System Inter-Department Communication using Intranet Mailing Services (emails)Tracking the mails received from the customers as complaints and using them for appraisal and audit purpose purposes. Customized and adhoc reports for the MIS for decision-making. Order indent-automation from the direct sales dept. Shop Inventory Database updates. Stock in shop information Communication with the customers regarding the orders and complaints and tracking them for the future purposes. Application Portfolio It is recommended that the organization takes up the following four functional areas for automation Marchant department customer department Stores department Billing, shipping Information System The reasons for selecting the above are that firstly they directly address the problems enumerated. Secondly, together they forma cohesive set of well-integrated application with one system acting as the feeder system for the other. System Architecture DATA FLOW DIAGRAMS: A data flow diagram is a logical model of a system. The model does not depend on hardware, software and data structures of the organization. There is no physical implication in a data flow diagram. Because the diagram is a graphic picture of the logical system, it tends to be easy for every non-technical user to understand and thus serves as an excellent communication tool. Finally a data flow diagram is a good starting point for system design. To construct a data flow diagram it uses four basic symbols. They are given below. Rectangle: The above symbol is used to define source or destination of data. Circle or Rounded Corners Rectangle: The above symbols are defined to represent a process that transforms or modifies the data. 3.21 INTRODUCTION UML is a notation that resulted from the unification Of Object Modeling Technique and Object Oriented Software Technology .UML has been designed for broad range of application. Hence, it provides constructs for a broad range of systems and activities. An Overview of UML in five notations 1. use case diagrams Use cases are used during requirements elicitation and analysis To represent the functionality of the system.Use cases focus on the behaviour of the system from the external point of view.The actor are Outside the boundary of the system,whereas the use cases are inside the boundary of the system. 2. class diagrams Class diagrams to describe the structure of the system. Classes Are abstraction that specify the common structure and behaviour of a set Of objects. Class diagrams describe the system in terms of objects, classes, attributes, operations and their associations. 3. Sequence diagrams Sequence diagrams are used to formalize the behaviour of the system and to visualize the communication among objects. They are useful for identifying additional objects that participate in the use cases. A Sequence diagram represents the interaction that take place among these objects. 4. Statechart diagrams State chart diagrams describe the behaviour of an individual object as a number of states and transitions between these states. A state represents a particular set of values for an object. The sequence diagram focuses on the messages exchanged between objects, the state chart diagrams focuses on the transition between states. 5.Activity diagrams An activity diagram describes a system in terms of activities. Activities are states that represents the execution of a set of operations. Activity diagrams are similar to flowchart diagram and data flow. Screens of online shopping 3. REQUIREMENTS SPECIFICATION PURPOSE The purpose of â€Å"Online Shopping† is to evaluate the performance of the various products, maintain stock details, product details, and customer details of â€Å"very big shops†. SCOPE This document is meant for the use of the organization and also will be the basis for clarifications. Alterations will not be made without the permission of the organization. PRODUCT FUNCTIONS OVERVIEW Online Shopping is mainly designed for the big shops to automate the maintenance of stock, maintaining customer details, manipulating product details and maintaining the payment details. It also promotes in monitoring the marketing strategy to be implemented depending on the performance of the various products. 3.1 Requirements In system analysis the developer interacts with the customer/client and works with him in order to find out what he specifically needs. Later he sees the past system, which is in use, and tries to find out what is lacking in that system. This examination of past system is not mandatory. That helps the developer to dig in the problem of the client or the customer. System Analysis is the study of gathering and interpreting facts, diagnosing problems, and using the recommended improvements to the system. Analysis specifies what the system should do whereas design states how to accomplish the objective. System Analysis is comprised of following things. Identify the customers need. Feasibility study. Analyzing the system technically and economically. Resource allocation. Cost Estimations and Work schedule preparation. Defining the system, which forms the base of the following activities. The success of a system depends largely on how accurately a problem is defined, thoroughly investigated and properly carried out through the choice of solution. User need identification and analysis are concerned with the user needs rather than what the customer wants. This step is intended to help the user and the analyst understand the real problem rather than its symptoms. This package has been developed in order to overcome the difficulties encountered while using the manual system. Faster and timely generation of reports is another motivating factor for the development of this package. The following requirements are identified. 3.1.1 Functional Requirements Customer Order Processing New order (Order no auto generated). View Products in category Status. Log User Complaints. Order Search and Processing Status. Internal Mail. Merchants Inventory Processing Category wise prod Details. Department Orders. Internal Mails. Management Information System Processing Adhoc Report. Internal Mails. Inter office Memos. 3.1.2 User Interfaces: A LOGIN form is presented with three fields to be entered. When the Login button is pressed, based on the empid, department values in the login form, database the respective form gets displayed. After that the user can perform the required activities. 3.2.2 Analysis Objects 1. Interface Objects: The interface object (also known as Boundary Object) is responsible for controlling access to the Enterprise Java Beans tier from any client. This includes other server-side components, such as Servlets and Jsp pages.An excellent example of interface object is the controller servlets for the web applications MVC architecture. 2. Control Objects: Control objects provide services to the application. They model functionality that is not naturally associated with a particular entity or interface. Often, this is because more than one entity needs to be operated on at one time; an example might be determining if there is sufficient inventory to manufacture a product. Other times, it may be because a relevant entity was not identified in the model; an example might be charging someones credit card. 3. Entity Objects: Entity objects model those business objects that should maintain their state after the use case completes. Typically, this means that they represent data from the database. Some examples are Customer, product, and an order. Entity objects should be represented by entity beans in the implementation model. The Entity Objects: Customer Invoice Order Stock Product 3.3 INPUTS The following inputs are collected for proposed system during the requirements specification from the Industries. 1. Goods Inward Note (GIN) The factory receives this document from the factory along with the finished goods. It consists of the details of items received .The warehouse in charge is supposed to physically verify the stock received against this document. Discrepancies are to be noted on the GIN and send back to the factory. It is use to enter details into the Goods inward register. It is also used to update stock book on weekly basis. 2. Goods received Confirmation On receiving the goods the customer is supposed to send a letter or telephonically in form the receipt of the consignment. Having got this information, the relevant invoice from the in transit file is to be removed and destroyed is fixed format for this document. 3. Goods Returned Note This is prepared based on the information send by the direct customer or dealer on goods that have been damaged in transit. It contains the details of the damaged goods. A copy of this is sent to the order-processing department, anther copy to the quality control department and third is field in the GRN file. The GRN details are entered into the damaged goods ledger. 4. Order Company receives order from their direct customer and detailers. The dealers fill in the details on Flowells order form itself. The orders from the direct customers are transcribed on the regular format. Orders can be sent by one warehouse to another. They are used for checking the availability of the stock. They are serialized and then filled. In is used to check the availability of the required stock in stock book and the goods inward register. The order could be serviced completely, partially or pending as the case may be. 3.5 Outputs The following outputs are collected for proposed system during the requirements specification from the Shops. 1. Invoice Once an order (either direct customer order or the dealer order) gets serviced partially or fully, an invoice for the same needs to be prepared. Most of the details are picked up from the order itself .An order may have multiple invoices. The discount for special customers is worked out. The rate is got form the product rate file. A copy of the invoice is sent to the direct customer, dealer, in-transit file, invoice file. The invoice details are entered into the issue register. Once supplementary gets service partially or fully nil valued supplementary invoice for the same needs to be prepared. Most of the details are picked up from the supplementary order itself. A copy of the supplementary invoice is sent to the direct customer, dealer, in-tansit file, and supplementary invoice file. The supplementary invoice details are entered into the issue register. 2. Dispatch Instructions The invoice department picks up dispatch instructions for the invoices that are prepared from the order form. This they send to the dispatch department. They prepare a packing slip. This is a regular report being prepared, consisting of order that are pending as of a particular date. The details for this report are taken from the pending orders. 3. Weekly Stock Status Report This is another weekly report prepared giving the details of the stock of each product. The details are obtained from the stock book. This report is prepared on adhoc basis. Whenever the actual stock is compared with book stock, and discrepancies found, they are entered product wise in this report. 4. DESIGN SPECIFICATION 4.1 DATA DESIGN Data objects A data object is a thing about which you want to store information. It has independent existence and can be uniquely identified. The following data objects are derived for the system. Customer Order Product Invoice category Relationships A relationship is a named association between agent and customer entity or more than entities we say that relationship exists between clerk and customer entity type. Similarly a relation between a clerk entity type and a manager entity type. The following relationships are identified for the system. For instance let us take the objects CUSTOMER, CATEGORY,PRODUCT, ORDER ,BILL the following relationships are identified. Customer â€Å"places† an Order. Order â€Å"contains† Product. Product â€Å"dispatched to† Customer. The relationships between the remaining entities are as follows : Customer â€Å"receives† Invoice. Invoice â€Å"has† Product. E-R Diagram E-R Diagram as a method to represent a Data model and was developed by Chen (1976). The main focus of a Data Model is to identify the required data and show it diagrammatically, which is called Entity Relationship Diagram. Its popularly is attributed to its simplicity. It has a top-down design approach to decide the minimum data that we would like to store for a given information system. 4.2 Screens ONLINE SHOPPING SCREENS TESTING It is a process of establishing confidence that a program or system does what it is proposed of. Testing is the only way to assure the quality of software and it is an umbrella activity rather than a separate phase. This is an activity to be performed in parallel with the software effort and one that consists of its own phases of analysis, design, implementation, execution and maintenance. 5.1 Testing strategy 5.1.1 Unit Testing: This testing method considers a module as single unit and checks the unit at interfaces and communicates with other modules rather than getting into details at statement level. Here the module will be treated as a black box, which will take some inputs and generate output. Outputs for a given set of input combination are pre-calculated and are generated by the module. 5.1.2 Integration testing: Here all the pre-tested individual modules will be assembled to create the larger system and tests are carried out at system level to make sure that all modules are working in synchronous with each other. This testing methodology helps in making sure that all modules which are running perfectly when checked individually and are also running cohesion with other modules. For this testing we create test cases to check all modules once and then generated test combinations of test paths through out the system to make sure that no path is making its way into chaos. 5.1.3 Validation testing: Testing is a major quality control measure employed during software development. Its basic function is to detect errors. Sub functions when combined may not produce than it is desired. Global data structures can represent the problems. Integrated testing is a systematic technique for constructing the program structure while conducting the tests. To uncover errors that are associated with interfacing the objective is to make test modules and built a program structure that has been detected by design. In a non-incremental integration all the modules are combined in advance and the program is tested as a whole. Here errors will appear in an endless loop function. In incremental testing the program is constructed and tested in small segments where the errors are isolated and corrected. Different incremental integration strategies are top-down integration, bottom-up integration, regression testing. 5.1.4 High-order testing (a.k.a. System Testing) Modules are integrated by moving downwards through the control hierarchy beginning with main program. The subordinate modules are incorporated into structure in either a Breadth First manner or in a Depth First manner. This process is done in five steps: Main control module is used as a test driver and steps are submitted are all modules directly to main program. Depending on the integration approach selected subordinate is replaced at a time with actual modules. Tests are conducted. On completion of each set of tests another stub is replaced with the real module. Regression testing may be conducted to ensure that new errors have not been introduced. This process continues from step 2 until entire program structure is reached. In top down integration strategy decision making occurs at upper levels in the hierarchy and is encountered first. If major control problems do exists early recognitions is essential. If Depth First integration is selected a complete function of the software may be implemented and demonstrated. Some problems occur when processing at low levels in hierarchy is required to adequately test upper level steps to replace low-level modules at the beginning of the top-down testing. So no data flows upwards in the program structure. BOTTOM-UP INTEGRATION TESTING Begins construction and testing with automatic modules. As modules are integrated from the bottom-up, processing requirement for modules subordinate to a given level is always available and need for stubs is eliminated. The following steps implement this strategy: Low-level modules are combined in to clusters that perform a specific software sub function. A driver is written to coordinate test case input and output. Cluster is tested. Drivers are removed and moving upward in program structure combines clusters. Integration moves upward, the need for separate test drovers lesions. If the top-levels of the program are integrated top-down, the number of drivers can be reduced substantially and integration of clusters is greatly simplified. REGRESSION TESTING Each time a new module is added as a part of integration as the software changes. Regression testing is an actually that helps to ensure changes that do not introduce unintended behavior as additional errors. Regression testing may be conducted manually by executing a subset of all test cases and results for subsequent playback tools enables the software engineer to capture the test case and results for subsequent playback and compression. The regression suit contains different classes of test cases. 6. CONFIGURATION 7. FEATURES USED 7.1 About J2EE (Javaâ„ ¢ 2 Platform Enterprise Edition, v1.3) Today, more and more developers want to write distributed transactional applications for the enterprise and leverage the speed, security, and reliability of server-side technology. If you are already working in this area, you know that in todays fast-moving and demanding world of e-commerce and information technology, enterprise applications have to be designed, built, and produced for less money, with greater speed, and with fewer resources than ever before. To reduce costs and fast-track enterprise application design and development, the Javaâ„ ¢2 Platform, Enterprise Edition (J2EEâ„ ¢) technology provides a component-based approach to the design, development, assembly, and deployment of enterprise applications. The J2EE platform offers a multitiered distributed application model, the ability to reuse components, integrated Extensible Markup Language (XML)-based data interchange, a unified security model, and flexible transaction control. Not only can you deliver innovative customer solutions to market faster than ever, but your platform-independent J2EE component-based solutions are not tied to the products and application programming interfaces (APIs) of any one vendor. Vendors and customers enjoy the freedom to choose the products and components that best meet their business and technological requirements. Distributed Multitier Applications The J2EE platform uses a multitier distributed application model for both enterprise applications. Application logic is divided into components according to function, and the various application components that make up a J2EE application are installed on different machines depending on the tier in the multitier J2EE environment to which the application component belongs. The following Figure shows two multitier J2EE applications divided into the tiers described in the following list. The J2EE application parts shown in the Figure are presented in J2EE Components. Client-tier components run on the client machine. Web-tier components run on the J2EE server. Business-tier components run on the J2EE server. Enterprise information system (EIS)-tier software runs on the EIS server. Although a J2EE application can consist of the three or four tiers shown in Figure, J2EE multitiered applications are generally considered to be threetiered applications because they are distributed over three different locations: client machines, the J2EE server machine, and the database or legacy machines at the back end. Three-tiered applications that run in this way extend the standard two-tiered client and server model by placing a multithreaded application server between the client application and back-end storage. J2EE Architecture The required relationships of architectural elements of the J2EE platform are shown in Figure. Note that this figure shows the logical relationships of the elements; it is not meant to imply a physical partitioning of the elements into separate machines, processes, address spaces, or virtual machines.The Containers, denoted by the separate rectangles,are J2EE runtime environments that provide required services to the application components represented in the upper half of the rectangle. The services provided are denoted by the boxes in the lower half of the rectangle. For example, the Application Client Container provides Java Messaging Service (JMS) APIs to Application Clients, as well as the other services represented. All these services are explained below. The arrows represent required access to other parts of the J2EE platform. The Application Client Container provides Application Clients with direct access to the J2EE required Database through the Java API for connectivity with database systems, the JDBCTM API. Similar access to databases is provided to JSP pages and servlets by the Web Container, and to enterprise beans by the EJB Container. As indicated the APIs of the JavaTM 2 Platform, Standard Edition (J2SETM), are supported by J2SE runtime environments for each type of application component. J2EE Architecture Diagram J2EE Components J2EE applications are made up of components. A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and that communicates with other components. The J2EE specification defines the following J2EE components: Application clients and applets are components that run on the client. Java Servlet and JavaServer Pagesâ„ ¢ (JSPâ„ ¢) technology components are Web components that run on the server. Enterprise JavaBeansâ„ ¢ (EJBâ„ ¢) components (enterprise beans) are business Components that run on the server. J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and â€Å"standard† Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server. J2EE Clients A J2EE client can be a Web client or an application client. Web Clients A Web client consists of two parts: dynamic Web pages containing various types of markup language (HTML, XML, and so on), which are generated by Web components running in the Web tier, and a Web browser, which renders the pages received from the server. A Web client is sometimes called a thin client. Thin clients usually do not do things like query databases, execute complex business rules, or connect to legacy applications. When you use a thin client, heavyweight operations like these are off-loaded to enterprise beans executing on the J2EE server where they can leverage the security, speed, services, and reliability of J2EE server-side technologies. Applets A Web page received from the Web tier can include an embedded applet. An applet is a small client application written in the Java programming language that executes in the Java virtual machine installed in the Web browser. However, client systems will likely need the Java Plug-in and possibly a security policy file in order for the applet to successfully execute in the Web browser. Web components are the preferred API for creating a Web client program because no plug-ins or security policy files are needed on the client systems. Also, Web components enable cleaner and more modular application design because they provide a way to separate applications programming from Web page design. Personnel involved in Web page design thus do not need to understand Java programming language syntax to do their jobs. Application Clients A J2EE application client runs on a client machine and provides a way for users to handle tasks that require a richer user interface than can be provided by a markup language. It typically has a graphical user interface (GUI) created from Swing or Abstract Window Toolkit (AWT) APIs, but a command-line interface is certainly possible. Application clients directly access enterprise beans running in the