Monday, September 30, 2019

Srs of Library Management

| |Software Requirements Specification | For A-Flex Automated Library Management System Version 1. 2 Prepared by A-FLEX Group |Jude Marlon B. Alegro |111694 |[email  protected] com | |Arnel G. Abagua |082198 |[email  protected] com | |Jun Jun G. Abanag |102206 |[email  protected] om | |Ronaldo R. Arbes |061491 |[email  protected] com | |Amado C. Tan |101078 |[email  protected] com | | | | | |Instructor: |Prescilla F.Catalan | |Course & Year: |BS in Information Technology 3 | |Schedule: |TTH 7:30 – 9:00 AM | |Date: |April 16, 2013 | | | | Table of Contents title pagei table of contentsii table of figuresiii Revisionsiv 1Introduction5 1. 1Document Purpose5 1. 2Product Scope5 1. Definitions, Acronyms and Abbreviations5 1. 4References6 1. 5Overview6 2Overall Description7 2. 1Product Perspective7 2. 2Product Functionality8 2. 3Users and Characteristics8 2. 4Operating Environment9 2. 5Design and Implementation Constraints9 2. 6User Documentation10 2. 7Assumptions and Depen dencies10 3Specific Requirements11 3. 1External Interface Requirements11 3. 1. 1User Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 2Hardware Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 3. 1. 3Software Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 4Communication Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2Functional Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 3. 2. 1Librarian Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 3. 2. 2Clerk Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 2. 3Borrower Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 4Other Non-functional Requirements27 4. 1Performance Requirements27 4. 2Safety and Security Requirements27 4. 3Software Quality Attributes28 4. 3. 1Functionality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 4. 3. Usability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 28 4. 3. 3Reliability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 4. 3. 4Supportability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 Appendix A – Data Dictionary. 30 Appendix B – Group Log. 31 InDEX. 33 Table of Figures Figure 1 Context diagram7 Figure 2 Operating environment9 Figure 3 Main interface11Figure 4 Logging station for Librarian12 Figure 5 Clerk station for connection13 Figure 6 Clerk station14 Librarian Use Cases15 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Search book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 Clerk Use Cases19 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 Search book †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Return book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Add book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 23 Borrower Use Cases24 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Borrow book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 24 Retu rn book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Revisions |Version |Primary Author(s) |Description of Version |Date Completed | |1. 2 |Jun Jun G. Abanag, Jude |The revision of this SRS was done by request. Error |04/16/13 | | |Marlon B. Alegro |corrections to some parts of the document were needed to fully| | | | |complete an accurate Software Requirements Specification.Some| | | | |specified features were removed because it was uncompleted due| | | | |to lack of time and preparation. Some small details in | | | | |chapters were also corrected and Content page was revised. | | | | |Finally, to finish the SRS, then Appendix B and Index were | | | | |added. | Introduction 1 Document Purpose This Software Requirements Specification will provide a c omplete description of all the functions and specifications of the project, A-Flex Automated Library Management System. It will explain the purpose and the features of the system, the interface of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both of the stakeholders and the developers of the system and will be proposed to the College Library of Samar College. Product Scope The A-Flex Automated Library Management System will be designed for the librarian, the staff and clerks and especially for the students of SC Library to maximize their productivity by providing tools to assist in automating the: production and transaction; logging in; monitoring materials; borrowing and returning of books and other library materials; assessing the overdue; inventorying; and creation of statistics and reports, which otherwise have to be performed manually in an ordinary daily basis.M ore specifically, this system will allow a certain user to manage, organize and monitor the data and attendance of the clerks, the status of the books and other library properties and the library records of the registered students to the library. Nevertheless the access to these capabilities will depend on the user privilege of an account. It will automatically provide statistical reports based on the data stored in its associate database which is updated consistently. Therefore the software will give an ease to do these tasks that are vital in managing the library. Definitions, Acronyms and Abbreviations |Term |Definition | |Borrower |Any person who wishes to borrow books inside the school library. | |Clerk |Any person who assists the librarian in minor tasks needed performed inside the library. | |Database |A collection of all data produced by the system. | |Librarian |A person who is assigned responsible in generally managing the school library. |QR Code |Quick Response code, a type of bar code/encrypted code that will be used for the project in identification | | |purposes. | |Requirements |Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC |Abbreviation of the name of the school where the system will be proposed. The Samar College | |SRS |Software Requirements Specifications.A document that completely describes all of the functions of a proposed| | |system and the constraints under which it must operate. For example, this document. | |Stakeholder |Any person with an interest to the project but is not a developer. | |User |Any person who operates or interacts directly with the product. | |VB |Visual Basic, a building/programming software used in creating the system | |XAMPP |An application used to have a connection between the product and its database. 4 References IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specifications. IEEE Computer Society, 1998. [IEEE] The applicabl e IEEE standards are published in â€Å"IEEE Standards Collection,† 2001 edition. [Bruade] The principal source of textbook material is â€Å"Software Engineering: An Object- Oriented Perspective† by Eric J. Bruade (Wiley 2001). [Reaves SPMP] â€Å"Software Project Management Plan Jacksonville State University Computing and Information Sciences Web Accessible Alumni Database. † Jacksonville State University, 2003. 5 OverviewThe next chapter, the Overall Description section, of this document gives an overview of the functionality of the product. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification section, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the product. Both sections of the document describe the same software product in its entirety, but are i ntended for different audiences and thus use different language. Overall DescriptionThis section provides a more detailed overview of the system, including a description of the product’s functions and overarching constraints. 1 Product Perspective A – Flex Automated Library Management System Figure 1 – Context diagram As shown in the Figure 1, A-Flex Automated Library Management System (A-Flex ALMS) is independent from other system and has three active actors and one database (where all information is stored and retrieved from). The Borrower, Clerk and the Librarian have a privilege to access the library system. However, the Librarian alone has the privilege to access the database, i. e. eleting, updating and/or adding such records and making reports. A-Flex ALMS uses Interaction Model, a Use Case Diagram, to make stakeholders easily view the system operation. 2 Product Functionality The product has the following major functionalities: †¢ Automated logging in of students into the library †¢ Automated borrowing and returning of books †¢ Enables to show the status of the books †¢ Enables the clerk to customize the due time of returning books for photocopying purpose †¢ Enables the user to search for a particular book using the system’s specialized built-in search engine †¢ QR code scanner functionality Database data storage 3 Users and Characteristics There are essentially three users for the system and are expected to be computer-literate: the borrower, as this project is being made so obviously the main client for this system who wishes to borrow materials in the library. The students of the school are not only the borrower, faculty and other employees of Samar College who are in the list of the school’s employees, for confirmation, may borrow books if they give envelop to librarian, this envelop will serve as their record of borrowing. The borrower may also be a student from other schools, that are required to register (P 50. 0) to school’s registrar to access a privilege and utilize the offered 8 hours services; the librarian, the main user of the system who manages the library and its database and responsible for activities such as adding book records, deleting book records, updating book status such as if book is issued and etc. ; the clerk, the assistant librarian and secondary user of the system who has a privilege to lend books, they are expected to have a different privilege as to librarian. 4 Operating Environment XAMPP Link from proposed system Figure 2 – Operating environmentThe system will be operated in the Samar College Library, as it was proposed to. When the user interacts into the system, the system will pass the user to the database, through XAMPP v. 3. 0. 12 which allows Windows program to transfer data to and from the database to record every interaction of the user. 5 Design and Implementation Constraints The current constraints on the pro ject are related to the provision of hardware resources to implement and test high-performance features. At present, an Intel Dual-core processor is needed, with a 2 GB RAM, serves as the server, with XAMPP running on top of the Windows 7 operating system.For better performance analysis, a number of dedicated workstations would be beneficial for the student workstation. The hardware that the project will be running on may constrain some design decisions pertaining to real-time and performance, as well as the scanner’s accuracy. Also, certain required hardware within the library imposes specific requirements on the project. The following is a list of constraints pertaining to the accuracy of the library system: †¢ The information of all the users must be stored in a database that is accessible by the system. The students must have logged in upon entering the library before they can borrow materials or books. †¢ The librarian only has the privilege and responsibility for the system’s security and privacy. †¢ Clerk and librarian have different privileges upon using the system. †¢ LAN is not implemented. †¢ BIOS of the system unit should be working to get the real-time in issuing of the books to the borrowers. 6 User Documentation The user can easily understand of the usage of the system with a user’s manual to be delivered with the system.The manual would be helpful with the some screen shoots within it. User can easily learn operation of the system by displaying corresponding shortcuts on controls for simple task. Contacts numbers of the developers will be given to the school librarian for further assistance when complex problems arise. 7 Assumptions and Dependencies A number of factors that may affect the requirements specified in the SRS include: †¢ The users have sufficient knowledge of computers. †¢ The users know the English language, as the user interface will be provided in English. Hardware and syst em specifications might not compatible. †¢ System might not supported by the operating system. †¢ It is assumed that librarian and/or clerk might forget their password for logging in. Specific Requirements 1 External Interface Requirements Below is a list of enumerated requirements that provides additional specifications for the behaviour and functionality of the system. 1 User Interfaces Using this system is fairly simple and intuitive. A user, who has a familiarity with basic logging in navigation, should be able to understand all functionality provided by the system.As Figure 3 shows, the user with different privileges can now select his workstation, with corresponding shortcuts for options, so that the system may give the user an access to these and may let the not be able to use those of privilege he usually should not have. [pic] Figure 3 – Main interface If the user selects the Open Librarian (Ctrl + L), system now then identify him as Librarian, a Server, an d Figure 4 will display with a pop-up form that lets the Librarian to have a three (3) attempts of logging in. If the user failed to log in successfully, system then will automatically shuts down. pic] Figure 4 – Logging station for Librarian If the user selects the Open Clerk (Click + C), system now then identify him as Clerk and Figure 5 then will display asking for an IP address sin order to have a connection to Librarian Workstation, server. [pic] Figure 5 – Clerk station for connection As the Clerk workstation has successfully connected to its server, then Figure 6 now will be displayed. Letting the Clerk to log in, as same of Librarian, if the Clerk failed to log in successfully it will automatically shuts down. [pic] Figure 6 – Clerk station 2 Hardware InterfacesSince the system will be installed in a Local Area Network (LAN) for collecting data from the users and also for updating the Library System and making reports, it is recommended by the developers , in order to have a maximum usage of the system, that the library should have the following: †¢ at least one camera for students’ easy logging in and scanning of books; †¢ printer for making reports; and †¢ computer unit(s) for the Clerk Workstation(s). The librarian then has to decide the number of units whether the library’s clerks would use. 3 Software InterfacesThe system will use only one external software, XAMPP v. 3. 0. 12, for the connection between the system and database. The system has a built in QR (Quick Response) Code Reader. 4 Communications Interfaces The system will be installed and run in a LAN of computer units. 2 Functional Requirements This section provides the detailed list of all product operation with their corresponding specific use case. 1 Librarian Use Cases 1 Use case: Log in Diagram: Brief Description The Librarian accesses the system, and can do various tasks. Initial Step-By-Step DescriptionBefore this use case can be init iated, the Librarian has already set up or prepared the units to be used. 1. The Librarian hits Ctrl + L, the option log in for a Librarian. 2. The system displays the pop-up login for the Librarian. 3. The Librarian selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Librarian is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Librarian selects the OK button. 4. The system records the info into the database. 5. The Librarian has logged out. 3 Use case: Search book Diagram: Brief Description The Librarian gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian selects the form fo r books, borrowers, etc. then chose the book. 2. The system displays the list of books and shows the different categories. 3.The Librarian selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 6. 4 Use case: Issue book Diagram: Brief Description The Librarian is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Librarian confirmed the borrower that he has a validated registration. 1. The system Librarian searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. a.If the book’s copy is more than one (1) and is available, the Librarian sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Librarian that the requested book(s) is not available and thus will automatically gives the re ason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirmation that the transaction is successful. 5 Use case: Update database Diagram: Brief Description The Librarian wanted to do some tasks the he/she needed the data be manipulated in the database.He or she also can update the database. Initial Step-By-Step Description Before this use case can be initiated, the system has verified that the Librarian is logged in. 1. The system displays categorized options of the entire data. 2. The Librarian selects the category. 3. The system gives other options of that selected category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched selected category. 2 Clerk Use Cases 1 Use case: Log in Diagram: Brief Description The Clerk accesses the system, and can do various tasks.Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already set up o r prepared the units to be used. 1. The Librarian hits Ctrl + C, the option log in for a Clerk. 2. The system displays the pop-up login for the Clerk. 3. The Clerk selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Clerk is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Clerk selects the OK button. 4. The system records the info into the database. 5. The Clerk has logged out. 3 Use case: Search book Diagram: Brief Description The Clerk gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk selects the form for books, borrowers, etc. then chose the book. 2. The system displays the list of book s and shows the different categories. 3.The Clerk selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 4 Use case: Issue book Diagram: Brief Description The Clerk is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Clerk confirmed the borrower that he has a validated registration. 1. The system Clerk searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. . If the book’s copy is more than one (1) and is available, the Clerk sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Clerk that the requested book(s) is not available and thus will automatically gives the reason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirma tion that the transaction is successful. 5 Use case: Return book Diagram: Brief Description The Clerk returns the book he/she has borrowed. Initial Step-By-Step DescriptionBefore this use case can be initiated, the Clerk, now as borrower, must return the book on time. 1. The Clerk himself may return the book he has borrowed. 2. The Clerk selects the Borrowed tab on the Borrowed form. 3. The system will display on the grid the borrowed books including his book. 4. The Clerk may scan the book with QR Code, or he may manually put the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the clerk wasn’t able to return the book on time. 6. The system records info into the database.Note: All Librarian assistants in the school’s library are working students, so therefore they may somehow be a â€Å"borrower†. 6 Use case: Add Diagram: Brief Description The Clerk adds some info, it might be addi ng books or borrowers to the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has given permission from the Librarian and thus he has already data to be stored in the database. And he has successfully logged in to the Clerk’s form. 1. As he logged in, the clerk clicks the â€Å"Add† tab on the Clerk’s workstation. 2.The system displays an option on whether what the clerk wants to add or store. 3. The clerk chooses an option. 4. The system displays needed data to be filled out whether it’s either a new book or new borrower. 5. The system then evaluates the input before storing to the database. a. If the required data is completed, the system displays a message box as notification of a new data. b. If some required data is missing, otherwise, a message box will be displayed to notify that some important data are not properly filled out. 7 Use case: Update database Diagram: Brief DescriptionThe Clerk modifies some d ata that are stored in the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk scanned some info, might in the book or borrower, and is incorrect. 1. The Clerk selects the â€Å"Update† tab on the Clerk’s workstation. 2. The system displays the pop-up options of the data to be updated to be edited. 3. The system displays the info that the Clerk wanted to update. 4. After the Clerk verified the correct records, the system then will display the updated data of a specified record. 3 Borrower Use Cases 1 Use case: Log inDiagram: Brief Description The Borrower, if student, logs in through the scanner by swapping their IDs with QR Code. Otherwise, if the scanner is not available he can manually input his student number. The faculty who wants to borrow has no record of logging in but they have to provide an envelope that the librarian refers to. Initial Step-By-Step Description Borrower enters the library. 1. The Borrower looks for the needed book(s) to borrow. He can ask the clerk to search the book(s) through the system. 2. The system displays the possible results for the input info. Use case: Borrow Diagram: Brief Description The Borrowers, either a student or faculty, borrows their needed book. Initial Step-By-Step Description Before the Borrower can have the needed book(s), he successfully logged in inside the library. 1. The Clerk selects the tab for borrowing within the Clerk’s workstation. 2. The system displays the required data to be filled out for the borrowing. 3. After the Clerk or Librarian hits the OK button, the system will evaluates the borrower if he or she has due book(s) that not yet been returned. 4.The system displays the notification and due date and time of the borrowed book(s) upon the request of the Clerk for borrowing the book then records it to the database. 3 Use case: Return Diagram: Brief Description The Borrower returns the book he or she has borrowed. Initial Step-By-Step De scription Before this use case can be initiated, the Clerk Borrower must log in inside the library. 1. The Borrower asks anyone among the Clerks for returning assistance. 2. The Clerk selects the â€Å"Borrowed† tab from the Borrowed form. 3. The system will display on the grid all the borrowed books including his book. 4.The Clerk may scan the book with QR code or he may manually input the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the Borrower wasn’t able to return the book on time. 6. The system records info into the database. Other Non-functional Requirements 1 Performance Requirements 1. Response Time – The Splash Page should be able to be load within seconds using a Windows 7 32-bit Operating System and at least 1 GB memory (RAM). The information is refreshed every two minutes. The access time for the computer unit should be less than a minute.The system shall respond to the member in not less than two seconds from the time of the request submittal. The system shall be allowed to take more time when doing large processing jobs. 2. Administrator/Librarian Response – The system shall take as less time as possible to provide service to the administrator or the librarian. 3. Throughput – The number of transactions is directly dependent on the number of users, the users may be the Librarian, employees of the Library and also the people who use the Library for checking-out books, returning books and checking library account. . Resource Utilization – The resources are modified according the user requirements and also according to the books requested by the users. 2 Safety and Security Requirements The server on which the Library System resides will have its own security to prevent unauthorized write/delete access. There is no restriction on read access. The use of email by an Author or Reviewer is on the client systems and thus is ext ernal to the system. The PC on which the Clerk resides will have its own security. Only the Editor will have physical access to the machine and the program on it.There is no special protection built into this system other than to provide the editor with write access to the Library System to publish reports. 3 Software Quality Attributes 1 Functionality Logon Capabilities The system shall provide the users with logon capabilities. Alerts The system can alert the Librarian or the administrator with notifications regarding the status of the books and in case of any problem. 4 Usability †¢ The system shall allow the users to access the system from a stand-alone client or its derivative technologies for public inquiries of the students.The system uses another computer unit for the client interface. †¢ The system is user friendly. 5 Reliability The system has to be very reliable due to the importance of data and the damages incorrect or incomplete data can do. Availability The s ystem is available 100% for the user. The system shall be operational 8 hours a day and 7 days a week. Accuracy The accuracy of the system is limited by the accuracy of the speed at which the employees of the library and users of the library use the system. Access Reliability The system shall provide 100% access reliability. 10 SupportabilityThe system designers shall take in to considerations the following supportability and technical limitations. Information Security Requirement The system shall support the information security requirements. Maintenance The maintenance of the system shall be done as per the maintenance contract. Standards The coding standards and naming conventions will be as per the American standards. Appendix A – Data Dictionary |Borrower – Any person who wishes to borrow books inside the school library. | |Clerk – Any person who assists the librarian in minor tasks needed performed inside the library. |Database – A collection of all data produced by the system. | |Librarian – A person who is assigned responsible in generally managing the school library. | |QR Code – Quick Response code, a type of bar code/encrypted code that will be used for the project in identification purposes. | |Requirements – Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC – Abbreviation of the name of the school where the system will be proposed, the Samar College | |SRS – Software Requirements Specifications.A document that completely describes all of the functions of a proposed system and the | |constraints under which it must operate. For example, this document. | |Stakeholder – Any person with an interest to the project but is not a developer. | |User – Any person who operates or interacts directly with the product. | |VB – Visual Basic, a building/programming software used in creating the system | |XAMPP – An applic ation used to have a connection between the product and its database. Appendix B – Group Log Notes Taken during our first meeting with Jun, Arnel & Marlon on January 23, 2013. †¢ Interview the librarian †¢ interview the library employees †¢ understand the flow of data in the library †¢ understand the processes used in transactions in the library †¢ new design †¢ lan network †¢ create a floor plan including 3 units for 3 stations of the whole system †¢ 3 stations: Admin station, Clerk Station, Log in Station †¢ provides photocopies of authentic documents from the library †¢ learn the penalty system of the library copy the list of books †¢ list the basic requirements †¢ Software Requirements Specification for Page 12 †¢ fix the QR scanner †¢ dry run the system †¢ Should we try this for different operating system environment? †¢ We might need licenses, ask if necessary. †¢ Given our budgets, th is is the best we can do. †¢ Set up servers. †¢ Began looking through test cases †¢ Will work on SRS †¢ Jun Abanag †¢ Created QR code samples for ID †¢ Will work on SRS. †¢ Marlon Alegro. †¢ Will work on SRS. †¢ Jun Abanag. †¢ Will work on SRS. †¢ Scrum Meeting 2/8/2013 †¢ Marlon Alegro Downloaded licensed software. †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Nicholas Cross †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Jun Abanag & Marlon Alegro †¢ Worked on SRS. †¢ Will wait on feedback from mentor to finalize SRS. Group activities †¢ Overnight sessions (starts at 10 in the evening up to 5 in the morning: 7 hours) Most of us have part time jobs during day time and we have different schedules for Software Engineering so we used our time to work during evening and midnight because of the busy schedule during day time.We spend seven hours during midnight to work on our system and the SRS. ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 †¢ Group meetings Since we have different schedules for Software Engineering, we try to meet up during free hours. And most of the times we are not complete because of the busy schedule. So what we do is two of our group mates meet up at certain time and the other one would discuss it to the other member when they meet.So in that way we can exchange ideas even though we don’t meet properly. Afterwards, the other few members will also catch up with updates from the recent group discussion. ? Samar College, twice a week. Every Monday, Wednesday and Friday ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 Index |A |Log out (use case), | |A –Flex ALMS, 5, 7, 8 | Clerk, 19 | |Add book (use case), 22 | Lib rarian, 16 | |Assumptions and Dependencies, 9 | | | |O | |B |Operating environment, 9 | |book, (use case) |Overall Description, 7 | | Borrow, 24 |Overview, Product, 6 | | Issue, 21, 1 7 | | | Search, 16, 20 |P | | Return, 21, 25 |Performance Requirements, 27 | |Borrower, 5, 7,8 |Product | | | Functionality, 8 | |C | Perspective, 7 | |Clerk, 5, 8 | | | use cases, 19 |Q | | station, 14 | QR (Quick Response), 5, 13 | |Context Diagram, 7 | | |Communication Interface, 15 |R | |References, 6 | |D |Reliability, 28 | |Delete (use case), 7 |Requirements | |Document purpose, 5 | External Interface, 11 | | | Functional, 15 | |E | Other Non-Requirements,27 | |External interface, 11 | Performance, 27 | | | Safety and Security, 27 | |F | Specific, 11 | |Functional Requirements, 15 |Return book (use case), 21, 25 | |Functionality, 8, 28 | | | |S | |I |Safety and Security Requirements, 27 | |Interfaces |SC, 6 | | Communication, 15 |Search book (use case), | | Hardware, 14 | Clerk, 20 | | Software, 14 | Librarian, 16 | | User, 14 |Software Interface, 14 |Issue, 17, 21 |Software Quality Attributes, 28 | | |Specific Requirement, 11 | |L |SRS, 6 | |Log in (use case) |Stakeholders, 6 | | Borrower, 24 |Supportability, 28 | | Clerk, 19 | | | Librarian, 15 | | | | | U | | |Use cases | | | Borrower, 24, 25 | | | Clerk, 19, 20, 21,22, 23 | | | Librarian, 15, 16, 17, 18 | | |User, 5, 6, 8 | | | characteristic, 8 | | | documents, 10 | | | interfaces, 9 | | | | |X | | |XAMPP, 6, 9, 14 | | ———————– Borrow books Librarian Clerk Search User System Database Librarian Update database Log in Article Borrower Issue book DATABASE Issue books Add Article Report Delete Article Update Librarian < include > < include > < include > < include > < include > Librarian Search book Log out Return books Log out Librarian Log in Librarian Log in

Sunday, September 29, 2019

Banksy’s Artwork in Detroit

Once again, all of the pieces Banksy put up in Detroit have either been destroyed by the owners of the walls upon which they were created – not knowing the signiflcance of the work – by Individuals looking to profit from the sale of the work, or, in the case of this image, ‘preserved,' significantly altered, or ‘destroyed' – depending on one's perspective – by individuals in the community seeking to save them from their Inevitable destruction, It Is equally Important to recognize that they surely (and undoubtedly) would have been destroyed in one way or another.Street rt is one of the only – if not the only – plastic arts that embrace's its own eventual demise. It Is, In other words, and Its practitioners are eminently aware of this, inherently ephemeral. As this [SLIDE – GO SLOW HERE] sequence of images [SLIDE] by a Street Artist known as Mobstr indicates. [SLIDE] The inherent ephemerality [SLIDE] of these works of art Is the result [SLIDE] of a relatively unique set of contextual circumstances [SLIDE] and social relationships of power within which most street artists ply their trade. [SLIDE] Just now, I referred to these pieces as works of art and I believe that that's how they should be regarded.Not as vandalism, not as a crime, not as a nuisance, or blight – however all of these descriptors are accurate, once again, depending on one's perspective. There is no other contemporary art movement that works at the same scope [SLIDE] and grandeur as street artists' do. They consider walls that sometimes stretch horizontally [SLIDE] for entire city blocks as a canvas of massive proportion. They see the blank concrete of a high rise and think of It not as private property, or the structure of someone's home or business, but as a concrete canvas.The sheer size, complexity, [SLIDE] and detail involved in ome of street art's most notable exemplars qualifies it as an artform par excellence. However, In the eyes of the law, the majority of property owners. or In the by laws of municipal city councils, this is, for the most part, not the case. Once again, and for the most part, in the eyes of the law [SLIDE], street art is vandalism and property damage that upsets the stability of city life and the sensibility of city dwellers, making them fear for their safety on the streets of their city.From this perspective, street art needs to be eradicated, erased, and/or tuffed out,' as the terminology of the street calls It, as soon as possible. Removing graffiti and street art Is akin to fixing the broken windows that, if left unrepaired, as the infamous story told by Wilson and Kelling goes, will lead to further crime, disregard for private property, the apparent safety of others, and an overall degeneration of the city as a space reserved almost exclusively, according to David Harvey, for commerce and private property rights.Succinctly, then, the life expectancy of a piece of street art [ SLIDE] is very short. It is around buffing out the work of street artists, however. There are at least four other factors that make the work of street artists inherently ephemeral. In addition to municipal officers buffing out pieces, the second factor limiting the life expectancy of street art, are property owners themselves [SLIDE]. When a piece of private property gets tagged without the permission of the property owner, the inclination of the property owner is to get to rid of what they consider to be vandalism as soon as possible.This is especially the case when the owner isn't aware of the value of certain pieces. This one [SLIDE], done by Banksy in Melbourne, Australia, was apparently destroyed when, someone's father was house sitting and he thought he would do his son-in-law a favour by getting rid of it. However, and generally speaking, the commercial value of street art by the vast majority of street artists, save a very select few, is close to nil. If you're a street arti st and you're not Banksy, you breaking proverbial windows all the time.Property owners, then, seeking to maintain the aesthetic integrity of their property, are the second cause of street art's limited life expectancy. The third cause is other street artists themselves. Ever since the appearance of graffiti on the subways and walls of New York City [SLIDE] and Philadelphia in the late 70s and early 80s, graffiti and street art have been caught up n a clandestine contest that revolves around territoriality, prestige, ego, and fame, based on the courage and capacity to get one's tag up in the most dangerous and visible locations possible.Looked at from these five different perspectives, street art is one of the few ‘plastic arts' that is planned, designed, and created in full knowledge that the end product will, in one way or another, disappear or be destroyed over time – and in some instances, very short periods of time. This inherent ephemerality is, of course, where th e digital camera and the Internet become incredibly important implements in the treet artist's quiver.As much as these artists are reliant on the physical qualities of cinder block, concrete, wood, and steel, to exercise their creative vision, they are equally reliant on the immaterial, virtual, and distributed hardware and software characteristic of the Web 2. 0 era, to document that which in all likelihood, and in the very near future, will disappear for one of the five reasons listed above.Taking into account the ephemeral transience of street art from the perspective of the artists themselves, these same artists can, then, as much as they are regarded as street rtists, also be regarded as digital artists, digital photographers, albeit digital artists and photographers that go to great lengths, and put themselves at great risk, in the preparation of their compositions.This point is important enough to recognize, but to stop here would be to cut short a more in depth examination o f the practice of creating street art and the absolute importance of the concrete yet entirely transient and stochastic qualities of the urban canvas to the art form. As I hope to demonstrate, the vagaries of the urban fabric serve only to reinforce the point Just ade regarding the importance of the digital camera and the Internet.AWKWARD – The very particular qualities of the surfaces upon which this kind of art is produced – the individual qualities of very particular walls – and the either serendipitous or pre- planned incorporation of trash, foliage, or other elements of the natural (or stretched canvas upon which other forms of art are produced – play an incredibly important role in the creation of street art. Reciprocally, and at the same time, they also underscore the importance of the digital camera, the digital photograph, and the Internet to the preservation and dissemination of the works themselves.I think this can best be explained by referenc e to the photographs themselves. If we look at this piece by Banksy for instance, [SLIDE] created in the run up to the London Olympics in 2012 and around the same time as his ‘Slave Labour' piece, we see a pole-vaulter falling backwards, not quite making it over the barbed wire fence and onto the discarded mattress below. For the time being, I'm less interested in a semiotic reading of the piece than I am in paying attention to the actual physical things that play a part in the construction of this semiotic meaning.The mattress and the fence are absolutely integral elements of the piece. They are as important to the work as the pole and the pole-vaulter. If absent, for whatever reason, the piece itself wouldn't be the same piece. Or, rather, it would be an entirely different piece, with an entirely different meaning. For instance, after this photograph was taken, there is a good chance that the mattress might have been discarded, the fence taken down in order to install the re quisite Plexiglas. The point being, that the artist has obviously deemed these elements of the urban fabric to be elemental to the overall work itself.If removed or altered in any way, as they surely will be, the work is no longer that of the artist. Much like deleting scenes from Hamlet would fundamentally alter the play as Shakespeare intended it, removing the mattress alters the piece as Banksy intended it. If the mattress goes missing, is moved, or shifted, the artwork, as the artist envisioned and created it, is no longer. This example [SLIDE] too, indicates how important the actual elements of the urban fabric are to the piece. They are intricately woven into the artwork itself.This is becoming ever more important and prominent in Banksys work and†¦ f I can speculate for a moment, I think this has everything to do with his politics – I presume he's a ‘he' at least – it has everything to do with his politics, the market value of his work, and the propen sity of property owners to remove it and auction if off, or of municipal councils to put it behind Plexiglas. So what would happen if this wall was cut out and moved to a gallery, into a private salon, or placed behind Plexiglas? Or what if we simply come back in Winter?Well, of course, the flowers that this boy is vomiting would die. They would either be uprooted and killed, squashed behind the Perspex and killed, or in time, and as a esult of the elements, die of natural causes. This is, of course, in addition to, and on top of, the fact that the piece itself has a very limited shelf life for the five reasons described above. As mentioned previously, once the work of street art is finished, the artist responsible for its production turns his/her back on it, in effect abandoning the work, leaving it to live or die as the street sees fit.Before doing so, however, and for the most part†¦ The work, as the artist intended it (and as he/she created it), is documented with a photogr aph. This practice too has its historical lineage. SLIDE] These are slides taken by Martha Cooper, a photographer, along with Harry Chalfant, responsible for archiving the early history of graffiti on the streets of this fair city we all find ourselves in today. Without the photographs of Cooper and Chalfant, not to mention the artists themselves, this important stage in the history of arguably one of preserved for us to see today.The photographic record of these inherently ephemeral works, then, preserves them and at least some of the context within which they existed at the time of their creation. In a manner of speaking, then, not only oes the digital photograph enable the preservation and dissemination of the artwork in a state that the artist obviously approved of, but the physical act of taking the digital photograph is the final brush stroke that signifies the piece is finished and the artist is done with his/her work. The moment at which he/she can turn around and walk away. Much like an oil painter who, when the canvas is completed to his/her satisfaction puts his/her name to the piece [SLIDE], the digital photograph serves as the street artist's signature of sorts. [SLIDE]lt signifies that the work is as the artist ntended it and that, in the state it was when the photograph was taken, is complete. So, again, similar to the signature in the top right corner of the Picasso, the signature is a sign that signifies the painting is complete. The digital photograph plays much the same role.Once again, it functions in much the same way as the artist's signature in that it denotes that the artist is happy with the result and the scene looks as it should. One of the more provocative questions that this pushes to the fore of our investigation, is, then, what if the piece is altered or removed from the context in which it was created for any reason whatsoever? SLIDE]. Extracted from the broader landscape that plays such a pivotal role in its interpretation and m eaning. Does it continue to be a Banksy for instance? And I think there's a very good argument that it does not.Doesn't the digital photograph of the work – in the place where the artist created it and inclusive of the elements so pivotal to its meaning – more accurately represent the artwork than the ‘salvaged' (or preserved) work [SLIDE] when it's placed in the white cube ofa gallery? And I think the answer is, yes, yes it does. If this is the case, then, the photograph serves not only as the signature of the artist, but because f the ephemeral nature of the work and the resolute importance of the surroundings to it's meaning also as a work of art itself – albeit one that reciprocally depends on spray paint to be completed.As mentioned earlier, in these instances, the street artist can be equally considered a digital artist, albeit a digital artist that goes to great lengths and puts him/herself at great personal risk in the preparation of their composit ions. This piece [SLIDE] was placed inside the perimeter of the dilapidated and abandoned confines of a Packard Assembly plant – a 3-and-a-half illion square foot ruin [SLIDE] on the south east side of metro Detroit. To be honest, and in my opinion, the piece itself isn't one of Banksys best [SLIDE].It is, however, notable because it makes specific and pointed reference to the very particular and exact location in which it was created. It is, much like a lot of his more recent work, heavily context dependent. â€Å"l remember when all this was trees. † And it is this this' [SLIDE] that I think distinguishes this piece. At the end of the process of filling in the stencil, and writing the phrase, Banksy metaphorically signs the piece by taking a hotograph of it. And he takes the photograph of the piece as he wanted it to look – knowing full well that it will probably disappear in the near term.The stencil itself is frame left, [SLIDE] with the ruins occupying fram e right, inviting the viewer of the photograph to complete the story the boy is telling by following the implicit directions offered in the word bubble. This is how Banksy wanted us to see the piece. This is he wanted it interpreted. The location and the broader context in which it is placed is, in fact, as important (or more so) than the image of the boy himself. This photograph, then, is a more accurate representation of the artwork in the way the artist created it than the actual piece that is now housed in a Gallery in South West Detroit.The only thing that marks the place of the original – in January of 2012 at least [SLIDE] – this too has probably changed – is an odd tangle of colourful fabric whose origins and purpose are impossible to verify – other than the fact that they are placed at the exact location where the piece was once located. Completely extracted [SLIDE] from the context that constitutes an incredibly important part of the canvas' its elf, the meaning of the piece as the artist intended it, no longer makes sense.Or perhaps, and rather, it still makes sense, but the sense that is now being made is not that intended by its creator, but, rather, by those persons who ‘saved' it from its eventual destruction†¦ or by somewhat obsessed academics like myself. Therefore, by moving the piece and extracting it from the place that is part and parcel of itself – that plays such an important role in the work – those individuals that preserved it, or saved a relatively small portion of the piece, did so by means of destroying the larger piece which might include the 3. million square feet that constitute the abandoned factorys footprint.In the absence of these 3. 5 million square feet, we no longer have a piece of street art by Banksy, but a roughly 7†² x 7†² corner of a piece that forms part of a much larger work of art. The fact that the photograph is also a poor representation of these 3-an d-a-half million square feet is something I'm still thinking through†¦ To concluders however, and completely omitting from consideration any conversation regarding the ephemeral nature of street art in relation to Benjamin's notion of the ‘aura' as it relates to works of art that o longer in exist, something I'm going to take up in my book†¦ s a result of the ephemeral nature of street art and the fact that the urban canvas is part and parcel of the artwork itself†¦ I would like to conclude by reiterating that as much as street artist's can be thought of as artists that work within (and with! ) the very concrete confines and materials of the urban fabric, they can also, and perhaps better, be thought of as digital artists that go to great lengths in the preparation of their compositions. Thank you so much for your time and attention today. YouVe no idea how much I appreciate them both.

Saturday, September 28, 2019

Reflective practitioner Essay Example | Topics and Well Written Essays - 1500 words

Reflective practitioner - Essay Example In this case, I cannot take the risk of not working hard with thinking that a miracle will happen, and I will pass. This is the exact thing that gets to happens in the world of sports. For a team to prosper, its members must take many risks that always make them get injured. We cannot fear taking risks because on one side lies getting injure. We should learn to look at the bright side that success lays. In reference to outdoor kinetic experience, different people get to have different experiences on different adventures. For example, one may vie fishing as a leisure activity; just for fun, while another person on the same boat will take fishing as a toll for measuring progress in that the other time he or she got two, this time the person wants to get three or four. This is what applies to people in the contemporary society. For example, I may consider education valuable because it will help me get a career while another person in the same class as me considers it necessary because i t will help him or her get more knowledge and not for career entry. According to John Rawls, every living thing should have the capacity to define a life plan. Different people get to hold different perspective in life. ... I tend to think that in the present age, despite having a life plan, a person is not sure he or she will be able to follow it as intended. This is because life brings along many bottlenecks that one gets to redefine the position of the life plan they once drafted. Handling different types of data Data is the most valuable asset that an organization may have. It is due to this fact that information systems are made, so as to ensure efficient analysis of the data, its storage and security. As a professional individual, it is crucial that one knows how to handle and present data, portraying the intended information analysis. Below we get to analyze a data from a survey on availability of university school courses and other dependent factors. Figure 1: Data University’s Business School Course Availability Survey Category Strongly Disagree Disagree Neutral Agree Strongly Agree Will you be satisfied if more sections are offered 0 2 9 9 13 Will you be more successful 4 3 12 7 7 Do yo u prefer to take business cources in the UCD 1 3 16 5 8 Sum 5 8 37 21 28 Average 1.666666667 2.666667 12.3333 7 9.333333333 Median 1 3 12 7 7 standard deviation 2.081665999 0.57735 3.51188 2 3.214550254 Figure 2: pictorial representation Pictorial representation of data is important due to a myriad of factors. The first reason is for easy analysis (AGRESTI, 2002,78). We can all conform that it is easier to deal that that is represented on a bar graph, rather than using the one on the spreadsheet. The second reason is for presentational purposes; when is representing data say to board of directors, it will be hard for them to conceptualize the progress of a company using raw data on a spreadsheet than on a bar graph. However, it is pertinent to

Friday, September 27, 2019

Therapeutic Polysaccharides Essay Example | Topics and Well Written Essays - 1500 words - 1

Therapeutic Polysaccharides - Essay Example On a fundamental level, polyssarcharides are defined as polymeric chains composed of mono- or di-saccharides bound together by glycosidic bonds, a special type of covalent bond. Carbohydrates possess a hemiacetal group that contains a reactive anomeric carbon that readily reacts in certain low pH cellular environments to form a stable glycosidic bond. While the ring structure of the carbohydrate subunits confers a rigid form, the glycosidic bonds allow for chain flexibility, conferring similar mechanical properties found in other semi-elastic polymers (Andre and Gushlbauer 1974, p.803-805). The unique properties yielded by this chemical structure allow polysaccharides to fulfill a variety of biological roles. The plant commonly referred to as the Butternut Squash, also commonly called the Winter Squash, Pumpkin Squash, and Field Pumpkin, is scientifically known as Cucurbita moschata, a member of the same family as gourds and cucumbers. Like its close relatives, the plant grows on a v ine with soft, hairy stems and is found in both North and South America in growing zones USDA 8 through 11 (Saylor and Network Vista, Inc. 2008, p.4175). The plant is widely grown for foodstuffs and is a common home gardener favorite. The leaves of the plant are broad, with nearly orbicular structure, and few lobes are present in the vine. Annually, Cucurbita moschata produces yellow colored flowers with wide spreading and crinkled petal structures, of a monoecious variety possessing both male and female structures within a single plant.

Thursday, September 26, 2019

Leadership & Communication in Health Care Service Organizations Essay

Leadership & Communication in Health Care Service Organizations - Essay Example Without communication, an organization will not be able to function well. Eventually, this will lead to underachievement of organizational goals considering that the success of an organization is highly influenced by the entire communication process involved. It is in line with this that this paper includes the discussion about leadership, motivation and communication in an organization. The proponent tries to apply the information in line with leadership functions and activities of managers and their influence on the successful performance particularly in health services organizations. Thus, some theories, concepts and terms related with leadership are included based on their association with a successful performance and goal attainment of the health care service organizations. Leadership There are many existing theories about leadership and these primarily include great man, trait, contingency, situational, behavioral, participative, management, and relationship (Cherry par. 1-8). All of these theories have important contribution in understanding the success of health care service organizations. ... Thus, they usually end up differentiating their services and product offerings. However, the implementation of this specific approach is not going to be easy. In fact, this highly involves specific leadership approach depending on the type of strategies at hand. Great man theories assume that leadership is innate and that every great leader is born not made and that they will rise above others if it is necessary, while trait theories state that leadership traits are innate among leaders (Cherry par. 1-2). These theories are believed to be very applicable in an organization before but today the fierce competition existing between health service organizations would require competent leaders based on experience and other relevant qualifications. Thus, it is in this reason that in order to have effective leadership activity, a certain health service organization must necessarily understand other modern leadership concepts. Today’s leadership activity requires basic understanding o f both external and internal business environment. Thus, the remaining leadership theories are making sense on how exactly organizations are performing when it comes to their ability to apply the leadership concept. Contingency theories of leadership state that leader’s response to leadership is affected by factors in the environment such as leadership style, followers and situational aspects (Cherry par. 3). Thus, there are some health service organizations today that try to give more emphasis on enhancing leadership style and character development of their staffs. Situational theories state that leaders choose the best course of action in situations that requires decision making (Cherry par.4).

Wednesday, September 25, 2019

Retail Management Career Path Paper Assignment Example | Topics and Well Written Essays - 500 words

Retail Management Career Path Paper - Assignment Example It gives an individual an opportunity to interact with employees and understand their weaknesses and how to improve them (Sims, 2008). This form of skill empowerment is not only important to the organization but is also crucial in improving personal relationships. This is the ability of the human resource manager to maintain focus on the activities that possess the greatest potential of meeting the work commitments. It is an attribute that allows them manager to understands and concentrate on facts that have a greater impact in the meeting of work requirements While other professionals may work from their homes or in pleasant working conditions, an average human resource manager works for a standard 40 hours per week. This is due to the requirements involved in fulfilling the role. These include organizing trainings and concentrating on improving employee output. Human resource managers are required to attend various refresher courses in handling the dynamics of manpower management. The mangers are also expected to work on their individual relation building attributes so as to ensure that they understand the needs of the organization and how to align them with the available manpower (Martin, 2008). Career advancement in the field of human resource goes to the doctorate level. This is the highest point of academic advancement that a human resource manager can archive. There are also training sponsored by renowned human resource trainers in the world. Human resource managers’ are expected to attend such training and receive certifications that are globally recognized (Martin, 2008). The training is tailored to meet the modern requirements in the field of human resource management. The compensation in this field is decided by a number of facts including; education and personal achievements. There is no limit to the nature of compensation that a human resource manager is entitled to. The dynamic involved include the size of the organization, the

Tuesday, September 24, 2019

Homelessness Essay Example | Topics and Well Written Essays - 500 words - 2

Homelessness - Essay Example There are a number of factors that have contributed towards homelessness in the nation. The National Coalition for the Homeless (NCH), in this regard, identifies two dominant trends that have been responsible for the rise of homelessness: â€Å"a growing shortage of affordable rental housing and a simultaneous increase in poverty† (National Coalition for the Homeless, Why Are People Homeless?). Poverty and homelessness are interrelated as poor people very often are forced to sacrifice their desire for housing in order to meet other basic needs food, clothing and healthcare. Unemployment, unstable employment, low-wages, lack of affordable housing for the poor, excessive waiting lists for public housing, and decline in public assistance are other significant predictors for homelessness (NCH, Why Are People Homeless?). It is worthwhile to review the definition of homelessness and to identify the dominant demographic characteristics of homelessness in the nation. Homeless people are defined as â€Å"individuals who lack a fixed, regular, and adequate nighttime residence;† this definition takes into account people who share the housing of others; people who live in motels or camping grounds; people who are in emergency or transitional shelters; abandoned children who await foster care placement; and migratory children (NCH, Who is Homeless?). Reviewing the demographic characteristics 39% of the homeless population comprised of children below the age of 18 whereas 25% of the homeless were individuals in the age category of 25 to 34 (NCH, Who is Homeless?). Similarly, males were more likely to be homeless than females. However, homeless families with children have considerably increased in the past decade. Regarding the ethnicity of homelessness, African-Americans form the majority of the homel ess population (49%) followed by Caucasian (35%), Hispanic (23%), Native American (2%), and 1% of Asians (NCH, Who is Homeless?). It has also been observed by NCH that

Monday, September 23, 2019

Is green capitalism resistance to change Use a case study to explain Essay

Is green capitalism resistance to change Use a case study to explain your answer - Essay Example The advocates propose moderation of damages while the critics propose an overhaul of the principle of free market economies. From the thread of logic, it is conclusive that green capitalism is a resistance to curtailing the presupposed form of ‘liberty’ there is in an unregulated market. Natural capitalism is an action initiated by capitalists and capitalistic environmentalists alike as a grandiose experiment to stash the truest form of capitalism (as it has evolved now) in a sanctuary where it can enjoy from the naivete of many; and to avoid dialogue with or outwit discreet environmentalists and Marxist’s ideologists who reside on the principle that there can never be ecological preservation with capitalism in existence. Yet so far, there is a relative success to it. II. The Triple Crunch Communities around the world admit to experiencing three types of crises with which third world economies run up against the most: energy, financial, and environmental crises. A ll are similar in effects in terms of equality, resource distribution, and human development. Although the three crises are interrelated, of the three confronting the world in the 21st century, climate change is perhaps the most severe and uncontrollable but it remains the second agendum next to the financial crisis. It is said that one of the major causes to this phenomenon is people’s over dependency on oil and other non-renewable gases for everyday domestic and commercial consumption. As predicted, this will lead to an energy crisis. Energy resources are unquestionably indispensable in the course of modern-day living especially to a country undergoing industrialization. There would not be any wonder if oil extracts will be lesser and lesser everyday therefore (Winter, 2006, p. 14). This is based on simple logic that natural resources are ‘naturally’ scarce but oil consumers and miners choose to think that oil is unlimited because energy experts and political a uthorities implant such idea to prosumers and consumers. In 1993, a news organization reported that the 700 million barrels of oil Shell Oil Company mined was only good for 42 days (16.6 million bbl/day) for the U.S. economy at that time (Bartlett, 1998, p. 3). The US economy has always been one of the world’s largest oil consumers as it is the world’s second biggest economy (only behind the European Union). Although it is a mixed market, one may not argue that it is highly capitalistic more than it is socialised. More than that, the country is probably over developed as it is now. The clincher however is that major pollutants don’t directly suffer the effects of climate change. Third world nations do which is why these the same catalysts to ecological degradation are the same agents (e.g. G7 countries) that spearhead initiatives which appear ‘globally than locally beneficial’ (e.g. Endorsement of the Tobin Tax). The worst case scenario is that they are likely solving the wrong problem. For instance in the UK, oil dependency is misrepresented (however intentional or not) by energy experts and political authorities wherein the topic for domestic consumption eats more than half the time during public discussions when in fact, domestic consumption only accounts for 30% of the aggregate consumption (Mobbs, 2005, p. 1). As made implicit, the global financial crisis of late is another serious trouble that has garnered more than enough attention (e.g. initiatives for

Sunday, September 22, 2019

General science Research Paper Example | Topics and Well Written Essays - 1500 words

General science - Research Paper Example The first and most apparent recognized use is as communications apparatus with people you already have a strong acquaintance. Email and instantaneous messaging has gone way past the previous adopter phase. For many enterprises, societies and families, it has become one of the prevailing forms of communication. Email is up there with the telephone, and more and more is replacing physical mail and fax. This is fascinating. It took the telephone eons to be at par with this level of acknowledgement for such routine uses. Fax never reached it for personal utilizations (Zittrain, 2009). On the other hand, the Internet has been also used as an information-collecting tool. Reports by Pew Internet Project show that over 50 percent of adult Internet consumers utilized the Internet, most probably, for job-connected research. On any given day, nearly 16 percent of Internet consumers are online doing research. Ninety-four percent of youth ages 12-17 who have Internet access claim that they utiliz e the Internet for social research. Seventy-one percent of online teenagers assert that they utilized the Internet as a key source for their current major school project or report. The History of early medium of communication Example: Printed communication (i.e. books and newspapers), television, and radio According to Wyman( 2009) written communication flourished off developing technology, such like the discovery of paper and printing press. In fact, publishing media is the oldest type of mass media. This media includes newspapers, books and magazines. The conception of books is apparently not new. It is thought that the first ever book in the world was published and printed in 863 AD in China. Although it was the first book to be officially printed, many historians assert that books had been released way before this period. On the other hand, newspapers are not as well new. They were invented during the seventeenth century in Britain and by the nineteenth century were widespread m ass media. The publishing media is currently the only source of mass communication. However, there has been considerable fall in its prominence but yet is a very essential source of mass media among the massive masses (Zittrain, 2009). Even now, radio remain a very prevailing means of communication and there are numerous kinds of radio utilized by institutions and people for the purpose of conveying information. Radio is used to send messages through signals by commonly modulation and many other means. It is characteristically utilized institutions and person who are far way from each other but need to maintain a constant communication. The idea of the television developed from the concept of being capable of see an individual while interacting with him on the phone. The social, political, and technical forces that have sustained the dominance of the medium of communication. Example: military interest, media enthusiasm and public triumphs In the communications niche, Motorola brough t about innovation. In 1983, Motorola introduced the first industrial portable cell phone, known as Motorola DynaTac 8000X phone. This as a result transformed how the world communicates. The corporation was the pioneer for radio communications. In the year 1940 Motorola grew its first handheld radio, the Handie-Talkie transferable two-way radio, designed for the United States military. This was followed by increased production of two-way

Saturday, September 21, 2019

Tourism Is, Perhaps, An Impossible Dream Essay Example for Free

Tourism Is, Perhaps, An Impossible Dream Essay Tourism is considered as a very important sector for most developing countries. It has been viewed as a source of both foreign currency and income for the natives. In this essay I will discuss the importance of tourism and whether it can be sustained, by first trying to represent how important tourism is to developing countries and then making a point how sustainable development can be different to sustainable tourism. I will discuss the problems of modern day tourism and will conclude whether sustainable tourism is possible. The tourism industry has shown to be very important to most developing countries as a source of government revenue and therefore a chance to achieve economic growth and development. A successful tourism industry might mean, that the country’s unemployment rate will fall, as now there will be more job opportunities available. Therefore standards of living are likely to increase due to the fact that more jobs are provided, which indicates that the native population will have more disposable income available for spending. Therefore on the second Earth Summit in 1997 â€Å"Earth summit II† tourism was debated as a recognised economic sector (Holden, (2008). Countries such as Jamaica, who continues to derive most of its foreign exchange from tourism, have remittances equivalent to tourism revenues accounting for nearly 20% of GDP (CIA, (2009)). This is an example of how important tourism can be to a developing country, which poses great physical natural beauty. Therefore the aim of its government should be to protect and sustain this habitat in order to keep the tourism industry alive. However, today’s situation of global recession for example threatens the country with an increase in unemployment as a decline in consumer confidence is expected during 2009, which will take its toll on demand for tourism (WTO, (2009)). Therefore the need to attract tourists brings us to the concept of sustainable development. Sustainable development is a term that has been raised accompanying the heightened awareness of environmental problems (Holden, (2008)). Development cannot take place upon a deteriorating environmental resource base and neither can the environment be protected when the development excludes the  costs of its destruction. However, the need for economic growth often does not take in consideration the need for sustainable development. Tourism in developing countries can be viewed as a way of achieving development. Therefore sustainable development and sustainable tourism are linked together but are not the same. Sustainable tourism places the emphasis on the customer and marketing considerations of tourism to sustain the tourism industry and sustainable development emphasises on developing tourism as a means to achieve wider social and environmental goals (Holden, (2008)). â€Å"Since the early 1990s, the sustainable tourism debate has become more holistic to cover not just environmental issues but also socio-cultural, economic and political dimensions† (Holden, (2008), p158). There are some traditions through which sustainability has been injected into tourism. The first one is the resource based tradition, which emphasises conservation and the need to protect the nature and culture of the country from the potential threats of tourism activities (Holden, (2008)). This brings us to the next tradition, which is the â€Å"activity-based† tradition, which accepts that tourism development can contribute to sustainability. â€Å"This is a position that is strongly advocated by the tourism industry in a desire to sustain tourism and its resource base for future development, aiming to sustain the capital investment in tourism† (Holden, (2008), p161). The third â€Å"community based† tradition focuses on the political economy by advocating the wider involvement of stakeholders. The difference between the resource based traditions is that it views sustainability in a physical way, whereas the other two have a bias towards social construction of sustainability, in which decisions are made about acceptable levels of trade-off between economic and social gains against natural resource losses (Holden, (2008)). The key difference between the two is the important relationship between the stakeholders and those parties who hold the absolu te power of decision making (Holden, (2008)). These traditions however are affected by political forces, which determine which stakeholders have access to and management of natural resources. Therefore a huge threat to the country’s tourism is the desire of local government and hotel owners to maximise their profits from the increased foreign interest in their natural country’s beauty, by building more and more hotels. This  leads to the destruction of a big part of the surrounding natural habitat, which will not only harm the country’s nature but also will chase away the tourist, who coming with the idea to escape one metropolis is put into a different one, or as from my own personal experience – a half-ready metropolis, meaning that some of the hotels are still in construction. Therefore it is necessary to realise that sustainable tourism is not merely connected with conservation or preparation of the physical environment but incorporates cultural, economic and political dimensions (Holden, (2008) ). A common definition for sustainable tourism is â€Å"tourism development that avoids damage to the environment, economy and cultures of the locations where it takes place† (Forsyth, (2000)). It aims to ensure that the development is a positive experience for local people and tourists themselves. Despite this, sustainable tourism is not widely understood, as it is sometimes compared to ecotourism. Ecotourism is â€Å"a form of tourism that focuses exclusively on wildlife, nature, or exotic cultures† (Forsyth, (2000)). Such tourism has been show not to be good for environment, or for the people who experience this attention. Therefore, sustainable tourism is â€Å"an attempt to improve the impacts of all types of tourism, and this implies seeking ways to build partnerships between tourism companies and local governments or managers of resorts† (Forsyth, (2000)). However to what extent is sustainable tourism achievable? Sustainable tourism requires co-operation between companies and the managers of destinations. It does not, however, require a marked interest from consumers as it is believed. Sustainable tourism does not have to be advertised as environmentally or culturally sensitive in order to succeed, rather:†profits may be increased simply by adopting some general environmental principles, such as recycling waste, planning for long-term sustainability, and seeking local partnerships for resort management. If these actions result in cleaner, less crowded, holiday resorts, then they are in effect sustainable tourism without being labelled so.† (Forsyth, (2000)). One way of achieving this is to increase the vertical integration of tourism companies, so that individual companies have greater control over the marketing of holidays, transportation of tourists, and then management  of resorts (Forsyth, (2000)). Another way of achieving sustainable tourism is by reducing competition from smaller companies, which may result in reducing the pressure for lower prices of holidays, as presence of competition leads to the rapid over-development of resorts and the reluctance of large companies to increase their costs by attending to the long-term sustainability of locations (Forsyth, (2000)). However there are some aspects of tourism that might inhibit it to be sustainable. The first one is that the primary product of tourism is heritage, wealth, and expected legacy of the community that serves as the tourist destination, not something produced by the industry. If these business activities, promoting the â€Å"saleable† or appealing aspects, degrade the community’s heritage and wealth, then the community suffers more directly than the consumer, who can return to his or her own country without responsibility for or awareness of the impacts of his tourist activities (ICLEI, (1999)). This unfortunately is the situation for mass tourism. Mass tourism holds the threat of bringing large numbers of uninformed foreigners into local social systems that with their tourism activities can undermine and degrade pre-existing social relationships and values, as well as destroying the sights by leaving their mark or taking a â€Å"souvenir† (ICLEI, (1999)). Also the intrusion of large numbers of foreigners with high consumption into natural areas can produce severe changes in those areas. This is going to be inevitable in the future, as the world population has been predicted to increase by 47% by the year 2050 (ICLEI, (1999)). Therefore the future of sustainable tourism might be in danger due to the high amount of resources that will have to be used in order to support the population and satisfy the needs of the tourists. More and more resorts are likely to become overcrowded and will lose their credibility as an attractive destination. Solutions to most tourism impacts are found in the shared interest of local communities, tourism businesses, and tourism consumers to maintain the natural wealth and social heritage of the tourist destination (ICLEI, (1999)). Therefore to achieve sustainable tourism over the short-run,  companies and resort managers must be provided with the right incentives to influence them to reduce the negative impacts of tourism. However over the long-run tourists and companies have to think more about how tourism can impact other people. Marcel Proust once stated that most tourists seem to want to travel through one hundred countries with one pair of eyes, whereas the best journey would be to travel through one country with a hundred pair of eyes (Forsyth, (2000)). Providing more diversity of holiday destinations may help avoid some of the negative impacts and will assure a better experience. However, tourism will never be completely sustainable as every industry has impacts, but it can work towards becoming more sustainable. References Central Intelligence Agency (CIA) (2009) â€Å"The World Factbook: Jamaica† available at: https://www.cia.gov/library/publications/the-world-factbook/geos/jm.html as at 21st April 2009 Forsyth T. (2000) â€Å"What is Sustainable Tourism?†, available at: http://www.fathom.com/course/21701788/session1.html as at 21st April 2009 Holden A. (2008) Environment and tourism, Second edition, Abingdon, Routledge, p150-162 Department of Economic and Social Affairs: International Council on Local Environmental Initiatives (ICLEI) (1999) â€Å"Tourism and sustainable development: sustainable tourism: a local authority perspective†, available at: http://www.un.org/esa/sustdev/csd/iclei.pdf as at 21st April 2009 Sustainabletourism (2009) â€Å"Sustainable tourism† available at: http://www.sustainabletourism.net/ as at 21st April 2009 World Tourism Organization (WTO) (2009) â€Å"World tourism barometer†, available at: http://www.unwto.org/facts/eng/pdf/barometer/UNWTO_Barom09_1_en_excerpt.pdf as at 21st April 2009

Friday, September 20, 2019

Market Research On Primarks Clothing Marketing Essay

Market Research On Primarks Clothing Marketing Essay The UK clothing and footwear (or apparel) market was worth an estimated  £46.05bn in 2009, accounting for 5.3% of total consumer spending (Key Note Publications Ltd, July 2010). According to Mintel, (June 2010), nearly half (12.7 million) of women in the UK spent the same or even more on their clothes in 2009 despite the economic recession. Consumers have cut back on leisure activities such as holidays and eating out, they have continued to spend on clothing and footwear indicating that they are being selective about what to spend their money on and are choosing to buy clothing over a meal out. Over half of overall UK consumers (54%) did not reduce the amount they spent on clothes during the past year and one in ten (11%) of consumers say they actually spent more on clothes than they usually would over the past year, despite the economic difficulties. This could be because consumers have cut back on leisure activities (Mintel, June 2010). Between 2005 and 2009, the womens outerwear segment actually declined slightly in value, because average prices were 22% lower in 2009 than they were in 2005. This occurred despite the dynamism of `fast fashion, in which more and more garments are bought but worn only a few times before they go out of fashion and are disposed of (Key Note Publications Ltd, July 2010). Consumers are now tending towards the budget end of the market, which is targeted by companies such as Primark, Peacocks and Matalan, or the designer, premium-priced extreme. The mid-market has consequently become very competitive, with the struggles of Marks and Spencer, Arcadia Group and BhS to retain market share (Infomat, August 2006). Besides the mid market trend, the quality over quantity trend appears to have risen up the consumer priority list, with almost four in ten consumers who intend to spend more on clothing in the coming year claiming that they will pay more for quality clothes (Mintel, June 2010). Consumers might consider that expensive products tend to be of better quality. Therefore, the UK Retailers should react quickly in responding and considering the quality message of their clothing in order to satisfy consumers needs and wants and therefore, increase their market share. Background to the study The Primark story has been one of continuing success founded on a unique combination of fast fashion and lean operations. Its operations in Great Britain began in 1973 with four out-of-town stores. The following year saw the opening of the first UK High Street stores in Derby and Bristol. In the next ten years, 18 stores were added in the UK bringing the number of stores in the 22. Till date, Primark has been able to open 145 stores in the United Kingdom. (Primark, 2010). Over the years Primark has been able to provide cheap and affordable clothing, but the quality of the product has been questionable. In the first and second quarter of the year, Primark recorded a 17% year-on-year sales increase in which it was driven by more selling space, Primark looks likely to continue in a similar successful vein for the predicted future, but its continued growth is not without some market barriers, Primark could be hit hard; and its lack of association with quality could also prove unfavourable in the long term.(Mintel, 2010) The retail landscape is about to change as the deflation of the last decade comes to an abrupt end. Raw material prices, freight and labour costs (particularly in the Far East) are rising and, coupled with the impending VAT increase and unfavourable foreign exchange movements, clothing prices on like-for-like items are expected to rise by at least 5% next year Mintel (2010). Primark cannot continue to provide cheap clothing because of the high production cost and tax rate, if the prices of the products are increased and the quality keeps disappointing the consumers, consumers could decide to switch back their loyalties to the mid market retailers like Gap and H and M who have celebrity designers such as Stella McCartney and Jimmy Choo designing ranges for them to reassert themselves in the clothing retail market. Primarks main focus of clothing is producing value clothing which can be afforded by the low and middle class consumers. But there could be trouble along the way as the perception of product quality appears to be slipping, consumers are now shopping for deals and finding value for money. The main test of this brand is to improve its quality and reposition its image in the minds of the existing and new consumers. Management Problem: The major issue facing Primark is to improve its quality and reposition its image in the minds of the existing and new consumers and thereby increase its market share than its current market position. Therefore the Management decision Problem would be: How Primarks clothing could increase its market share. Market Research problems: A market research problem will be carried out to support the management decision problem of Primark. Therefore the market research problem for the study will be: To determine consumers attitudes and the level of satisfaction derived from current product qualities. Research Components: The research components are used for identifying the market research problem. Therefore the research components are: à ¢Ã¢â€š ¬Ã‚ ¢ What criteria do consumers use in selecting a clothing brand? à ¢Ã¢â€š ¬Ã‚ ¢ How do consumers evaluate Primark and its competitors based on the identified choice criteria? à ¢Ã¢â€š ¬Ã‚ ¢ What are the consumers attitudes towards Primark? à ¢Ã¢â€š ¬Ã‚ ¢ To determine the psychographic and demographic profile of the consumers Literature review Globally, clothing continues to serve the three basic functions of concealment, protection and identity. However, when shopping for a piece of clothing, the third factor identity is the criteria that the consumer in modern society is completely engrossed with. Clothing has the ability not only to represent status in society, or act as a measurement of self-esteem, but can reveal personality and what values a person holds dear to them (What you wear is what you are, 2010). Solomon and Ranbolt (2004). confirm that revealing identity through the clothes a person wears is a conscious decision: A consumer exhibits attachment to an objectto maintain his or her self-conceptClothing can function in a similar way (p. 148). This perception of how consumers see themselves is called the Self-Concept Theory, which categorises the term Ideal Self as something a person is always trying to achieve. Therefore a retailer will be more successful if the goods they sell facilitate a person in realizi ng their ideal self (Diamond 2006). Undoubtedly, the ideal self of the UK consumer is an increasingly fashionable one. This does not just apply to the younger age group, but also the older and more affluent age group who enjoy keeping up to date with current trends. Previously, this was very hard to accomplish as there was virtually no consumer choice for the older market segment, but value stores have attempted to address this issue (Clothing Market in the United Kingdom, 2006). These value chain stores allow consumers to remain fashionable while shopping on a budget and have arguably led to the creation of the term Fast Fashion. This refers to the current consumer habit of only wearing a piece of clothing a handful of times before it becomes unfashionable and is discarded (Clothing Footwear Industry Market Review 2010). Selling unfashionable items at rock-bottom prices and thereby encouraging this unsustainable practise does not enhance a companys reputation as Solomon and Rabolt (2004) believe: the green movement, is a priority for many consumers around the world (p. 148). Being socially responsible has been a constant issue for Primark and its low pricing and so-called fast fashion has prompted inquiries into how it can achieve this without ignoring ethical guidelines. This answer became clear when BBCs Panorama series went behind the scenes in India only to find children working in slum-workshops for poor pay on terribly long hours (Primark: on the rack, 2008). Such production lines contribute to the quality of the end product that Primarks displays on its rails and while consumers may be prepared to put up with poor quality during the recession, the latest research shows that this, among other factors, will soon change: The average prices paid for apparel could well start to increase, for three reasons: a move towards higher quality, comfort and design; demand for more expensive but sustainable products (Clothing Footwear Industry Market Review, 2010). Due to the competitiveness of the UK clothing industry (Clothing Market in the United Kingdom, 20 06), it is vital that in order to remain successful retailers become more responsive to the needs and wants of consumers (McMeekin, 2009). As argued by Alex Blyth, presenting a brand as cheap without ruining its value is one of the trickier marketing strategies to master ( Alex Blyth, 2010). Primark really needs to focus more on adding value to their product while having minimum effect on price as lower price is eventually their strength the same has been concluded by Robert Passikoff The buying decision has shifted from price to an even greater emphasis on value. Primark which already made a good use of its Suppliers chain during recession, by offering break down prices to pull more customers and successfully maintaining its competitive edge .However Primark can stress on its suppliers to add more value (Quality and other attributes) to the products so that growing market segment which tend to adopt to quality product can be attracted. This will not only help Primark attract more customers but will also turn the satisfied customers to loyal customers. A leading communications company found via satisfaction research that those customers proclaiming to be extremely or very satisfied were their least profitable customers in terms of revenue and product usage indicators( Pete Clark / Graham Tutton Oct 2007). Our research is led by the spirit of growth and increasing the market share, this is required by the market implicitly and explicitly. Enhancing your business performance is a never-ending process. World-class organizations do not want satisfied customers. Developing strong, loyal relationships with customers, effectively managing these relationships, and applying the latest thinking to measuring and managing customer perceptions, are the keys to turn satisfied customers to loyal customers ( Pete Clark / Graham Tutton Oct 2007).   Based on the previous studies we try to find that what values (Corporate Social Responsibility, Price, Quality, patronage effect or Brand Identity) most to the Primarks Customers, and how can Primark add value to its product? So that more customers could be attracted and more diverse segments of the market could be targeted. Research Model The secondary data demonstrates that there are some important factors which can have influence on the perception and attitude of the consumers through the decision-making process. i.e. the price, if a higher price or a lower price can affect the attitude of consumers towards Primark; brand image; quality; pleasing to others, word of mouths; do consumers feel satisfied of the shopping environment of Primark or not; the durability of the products; style of clothing; comfort; packaging; and fabric also. Furthermore the researchers also need to identify the current situation of Primark and compare with other competitors in clothing industry. Then on the next level, the researchers would like to know if the attitude change has an impact on the shopping frequency at Primark, or to what extent they can influence the consumers buying behaviour .And also the researchers defined two factors as the moderators needed to be analyse when testing the buying behaviour of the consumers. By using this model and testing the research questions and hypothesis to solve the manager problems How can the marketers of Primark to increase the market share. At the first place, the 10 factors evaluative criteria towards Primark are the independent variables and the perception and attitude towards Primark of the consumers is the dependant variable. However, the continuous model shows that the change of attitude could become as an independent variable when the researchers going to find the relationship between the satisfaction of consumers and the frequency to shop at Primark which is defined as a dependant variable. . And moreover the two moderators (gender and age group) are also independent variables which should be tested through the researching process. Research Question and Hypothesis Based on the secondary data and the research model, there are some questions and hypothesise for the researchers, so that to clarify the relationship and influences between different variables. What are the critical factors when shopping for clothes? H1: There are certain factors that influence the decision making of shopping for clothes. What are the important factors that can affect the attitudes of the customers when shopping at Primark? H2: There are some important factors that would affect the attitudes of the customers when shopping at Primark Does brand image influence the buyers attitudes towards Primark? H3: Brand image is a key factor that has an impact on the shopping attitude towards Primark. Is there a relationship between the high quality of products and the satisfaction of the consumers? H4: There is a significant relationship between the quality of products and the positive attitude towards Primark Is there a relationship between the low price and the attitude of the customers? H5: There is a significant association between the customers preference and the low price of the products in Primark. Is there a relationship between shopping behaviour of consumers and demographic index? H6: There is an significant association between consumers shopping behaviour and demographic index. Appendix 1: Questionnaire Leeds University Business School Dear Respondent, This questionnaire is purely for educational research and we are grateful to all who participate. We will be completing our MA in Corporate Communications and Public Relations from the Leeds University Business School in September 2011. The data derived from the questionnaire will be analyzed to produce a marketing research project as part of our degree programme. The purpose of this survey is To determine the factors that consumers consider as important while shopping for clothing. The findings of the study would help to suggest an appropriate framework to Primarks clothing to increase its market share. All of your responses will be kept confidential and all of the information will be analyzed and reported as grouped data. The study will be incomplete without your response and support. We kindly request you to fill in the required information. We appreciate your time and generosity! Part I General Shopping Behavior about Clothing How often do you shop for Clothing? à ¢- ¡Weekly à ¢- ¡ Monthly à ¢- ¡ Once in two months à ¢- ¡ Once in three months à ¢- ¡ Once in six months Kindly tick the most suitable preference you would consider while buying clothing. à ¢- ¡ According to need à ¢- ¡ During the season à ¢- ¡ During the sales à ¢- ¡ Only on special days or festivals Kindly tick the most appropriate preference of your shopping destinations. à ¢- ¡ Independent Shop à ¢- ¡ Shopping Centre à ¢- ¡ Markets à ¢- ¡ Other (Please specify) ________________________ Which is the most important factor influencing your clothing shopping decision? à ¢- ¡ Newspapers / Magazines à ¢- ¡ Friends / Relatives à ¢- ¡ TV à ¢- ¡ Internet à ¢- ¡ Posters / Hoardings à ¢- ¡ Other (Please specify) _________________________ Kindly identify the importance you associate with each of the attributes while you shop for Clothing. Least important Æ’Â  Very important à ¢Ã¢â€š ¬ Brand image 1 2 3 4 5 à ¢Ã¢â€š ¬ Quality of clothing 1 2 3 4 5 à ¢Ã¢â€š ¬ Price 1 2 3 4 5 à ¢Ã¢â€š ¬ Style 1 2 3 4 5 à ¢Ã¢â€š ¬ Comfort 1 2 3 4 5 à ¢Ã¢â€š ¬ Fabric 1 2 3 4 5 à ¢Ã¢â€š ¬ Durability 1 2 3 4 5 à ¢Ã¢â€š ¬ How pleasing is it to others 1 2 3 4 5 à ¢Ã¢â€š ¬ Shopping environment 1 2 3 4 5 à ¢Ã¢â€š ¬ Comfort 1 2 3 4 5 Part II : Attitude towards Primark Have you ever shopped for clothing at Primark? à ¢- ¡ Yes à ¢- ¡ No (If no, then go to question No.9) How often do you shop for clothing at Primark? à ¢- ¡Weekly à ¢- ¡ Monthly à ¢- ¡ Once in two months à ¢- ¡ Once in three months à ¢- ¡ Once in six months What do you shop for in Primark? à ¢- ¡ Mens wear à ¢- ¡Womens wear à ¢- ¡Childrens wear à ¢- ¡Home wares Kindly identify the importance you associate with the following attributes when you shop for Primarks clothing. Least important Æ’Â  Very important à ¢Ã¢â€š ¬ Brand image 1 2 3 4 5 à ¢Ã¢â€š ¬ Quality of clothing 1 2 3 4 5 à ¢Ã¢â€š ¬ Price 1 2 3 4 5 à ¢Ã¢â€š ¬ Style 1 2 3 4 5 à ¢Ã¢â€š ¬ Comfort 1 2 3 4 5 à ¢Ã¢â€š ¬ Fabric 1 2 3 4 5 à ¢Ã¢â€š ¬ Durability 1 2 3 4 5 à ¢Ã¢â€š ¬ How pleasing is it to others 1 2 3 4 5 à ¢Ã¢â€š ¬ Shopping environment 1 2 3 4 5 à ¢Ã¢â€š ¬ Comfort 1 2 3 4 5 Kindly identify your satisfaction level with each of the follow clothing outlets. Very Dissatisfied-Æ’Â  Very Satisfied à ¢Ã¢â€š ¬ MS 1 2 3 4 5 à ¢Ã¢â€š ¬ GAP 1 2 3 4 5 à ¢Ã¢â€š ¬ ZARA 1 2 3 4 5 à ¢Ã¢â€š ¬ TK Maxx 1 2 3 4 5 à ¢Ã¢â€š ¬ HM 1 2 3 4 5 à ¢Ã¢â€š ¬ NEXT 1 2 3 4 5 à ¢Ã¢â€š ¬ Topshop / Topman 1 2 3 4 5 à ¢Ã¢â€š ¬ Bhs 1 2 3 4 5 à ¢Ã¢â€š ¬ River Island 1 2 3 4 5 à ¢Ã¢â€š ¬ Primark 1 2 3 4 5 à ¢Ã¢â€š ¬ New Look 1 2 3 4 5 à ¢Ã¢â€š ¬ Matalan 1 2 3 4 5 à ¢Ã¢â€š ¬ Peacock 1 2 3 4 5 à ¢Ã¢â€š ¬ Other (Please specify) 1 2 3 4 5 Would you like to make some suggestions that would help Primark to improve its clothing quality? - Part III: Personal Information 1. Gender à ¢- ¡ Male à ¢- ¡ Female 2. Age à ¢- ¡ Under 20 à ¢- ¡ 21-29 à ¢- ¡ 30-39 à ¢- ¡ 40+ 3. Education à ¢- ¡ Primary School à ¢- ¡ Secondary School à ¢- ¡ College à ¢- ¡ University à ¢- ¡ Post Graduate à ¢- ¡ Other 4. Occupation à ¢- ¡ Student à ¢- ¡ Service à ¢- ¡ Business à ¢- ¡ Other Professions 5. Annual Income à ¢- ¡ Under  ¿Ã‚ ¡20, 000 à ¢- ¡  ¿Ã‚ ¡20,000  ¿Ã‚ ¡29, 999 à ¢- ¡  ¿Ã‚ ¡30,000  ¿Ã‚ ¡39,999 à ¢- ¡  ¿Ã‚ ¡40,000+ 6. Marital Status à ¢- ¡ Single à ¢- ¡ Married / Cohabitant Thank you for sharing your precious time!