Tuesday, November 26, 2019

Short Essay Example

Short Essay Example Short Essay – Article Example Task: Short essay Philosophy is a dynamic discipline that studies almost everything that surrounds us. The discipline relies extensively on logic in making conclusions. This discipline applies logic, critical evaluation and rational in evaluating problems. Therefore, the programme designed by the faculty should aim at enhancing the ability of the students to apply logic, evaluate critically and apply rational in resolving problems. However, the programme that the lecturer is utilizing seems to concentrate on reading philosophical material. The above program will ensure that students have adequate knowledge in philosophy. Nonetheless, appropriate skills should accompany the knowledge thus; helping the students utilize the readings made. The lesson plan reveals that the tutor has apportioned excessive time for class readings. The professor can enhance the students’ skills by facilitating discussions during class. Such discussions will provide the professor with a chance to evalu ate students’ understanding of the readings. Additionally, discussions will make the students active partakers in the class readings. Reading has rendered most students as passive partakers in the class thus; limiting their understanding of the readings. Therefore, allocating discussion substantial time will enable students to apply logic, rationale and make critical evaluation of problems in philosophy. The above changes will work since it deviates from the current plan by allowing the students to exhibit their skill hence; enabling the professor to understand students’ weaknesses and make appropriate adjustments. Reducing time allocated to reading will eliminate boredom in the class. Eliminating boredom by holding discussions will boost the students’ understanding of the discipline by allowing them to participate actively in the lesson (Arthur, 38).Work citedArthur, John. Studying Philosophy. Upper Saddle River, NJ: Pearson prentice hall publishers, 2003. Prin t.

Friday, November 22, 2019

construction grammar - definition and discussion

construction grammar - definition and discussion In linguistics, construction grammar  refers to any of the various approaches to language study that emphasize the role of grammatical constructionsthat is, conventional pairings of form and meaning. Some of the different versions of construction grammar are considered below. Construction grammar is a theory of linguistic knowledge. Instead of assuming a clear-cut division of lexicon and syntax, note Hoffmann and Trousdale, Construction Grammarians consider all constructions to be part of a lexicon-syntax continuum (a construction). Examples and Observations James R. HurfordThere are several different versions of Construction Grammar, and my account . . . will describe, quite informally, what they have in common. The common idea is that a speakers knowledge of his language consists of a very large inventory of constructions, where a construction is understood to be of any size and abstractness, from a single word to some grammatical aspect of a sentence, such as its Subject-Predicate structure. Construction Grammar emphasizes that there is a lexicon-syntax continuum, contrary to traditional views in which the lexicon and the syntactic rules are held to be separate components of a grammar. The central motive of Construction Grammar theorists is to account for the extraordinary productivity of human languages, while at the same time recognizing the huge amount of idiosyncratic grammatical data that humans acquire and store. The constructionist approach to grammar offers a way out of the lumper/splitter dilemma (Goldberg 2006, p. 45). The k ey point is that storage of idiosyncratic facts is compatible with deploying these facts productively to generate novel expressions. R.L. TraskCrucially, construction grammars are not derivational. So for example, the active and passive forms of a sentence are regarded as having different conceptual structures rather than one being a transformation of the other. Since construction grammars depend on the conceptual meaning in context, they can be seen as approaches to linguistics that collapse the classical distinctions between semantics, syntax, and pragmatics. The construction is the unit of language, which cuts across these other aspects. So, for example, in They laughed him out of the room, the normally intransitive verb receives a transitive reading and the situation can be interpreted on the basis of the X cause Y to move construction rather than the sytanctic deviance alone. As a result, construction grammars are proving most useful in understanding language acquisition and are being used for second-language teaching, since it is the meaningfulness of the situation which is of primary importance, and syntax and semantics are treated holistically. William Croft and D. Alan CruseAny grammatical theory can be described as offering models of representation of the structure of an utterance, and models of organization of the relationship between utterance structures (presumably, in a speakers mind). The latter are sometimes described in terms of levels of representation, linked by derivational rules. But construction grammar is a nonderivational model (like, for instance, Head-driven Phrase Structure Grammar), and so a more general description of this aspect of grammatical theory is organization.Different versions of construction grammar will be briefly outlined . . .. We survey four variants of construction grammar found in cognitive linguisticsConstruction Grammar (in capital letters; Kay and Fillmore 1999; Kay et al. in prep.), the construction grammar of Lakoff (1987) and Goldberg (1995), Cognitive Grammar (Langacker 1987, 1991) and Radical Construction Grammar (Croft 2001)and focus on the distinctive characteristics of each th eory. . . .It should be noted that the different theories tend to focus on different issues, representing their distinctive positions vis––vis the other theories. For example, Construction Grammar explores syntactic relations and inheritance in detail; the Lakoff/Goldberg model focuses more on categorization relations between constructions; Cognitive Grammar focuses on semantic categories and relations; and Radical Construction Grammar focuses on syntactic categories and typological universals. Finally, the last three theories all endorse the usage-based model... Thomas Hoffmann and Graeme TrousdaleOne of the central concepts of linguistics is the Saussurean notion of the linguistic sign as an arbitrary and conventional pairing of form (or sound pattern/signifiant) and meaning (or mental concept/signife; cf., e.g., de Saussure [1916] 2006: 65-70). Under this view, the German sign Apfel and its Hungarian equivalent alma have the same underlying meaning apple, but different associated conventional forms . . .. Over 70 years after Saussures death, several linguists then explicitly started to explore the idea that arbitrary form-meaning pairings might not only be a useful concept for describing words or morphemes but that perhaps all levels of grammatical description involve such conventionalized form-meaning pairings. This extended notion of the Saussurean sign has become known as construction (which includes morphemes, words, idioms, and abstract phrasal patterns) and the various linguistic approaches exploring this idea were labeled Constructi on Grammar. Jan-Ola Ãâ€"stman and Mirjam Fried[One] precursor to Construction Grammar is a model that was also developed at the University of California at Berkeley in the late 1970s, within the tradition of Generative Semantics. This was the work of George Lakoff and informally known as Gestalt Grammar (Lakoff 1977). Lakoffs experiential approach to syntax was based on the view that the grammatical function of a sentence constituent holds only in relation to a particular sentence type as a whole. Specific constellations of relations such as Subject and Object thus constituted complex patterns, or gestalts. . . . Lakoffs (1977: 246-247) list of 15 characteristics of linguistic gestalts contains many of the features that have become definitional criteria of constructions in Construction Grammar, including, for example, the formulation that Gestalts are at once holistic and analyzable. They have parts, but the wholes are not reducible to the parts.

Thursday, November 21, 2019

Political cultures of texas Research Paper Example | Topics and Well Written Essays - 1250 words

Political cultures of texas - Research Paper Example This culture establishes the outer boundary of all the possibilities within the political dominion. According to ‘Texas Politics, today’ (Maxwell et al., pp. 20-39), the political culture of Texas consists of three sub-cultures: traditional, individualistic, and moralistic. The individualistic culture stresses minimum government intervention that should be limited to safeguarding individual rights while other social and political relationships should be upon private sector. One the other hand, moralistic political culture urges government intervention in social and economic matters for the well-being of the people and general welfare. Traditional subculture, however, has a different viewpoint. It states that since the political power lies in the hands of the dominating or elite group therefore role of the government should be limited to maintaining the social order and tradition. The traditional subculture dominates in East Texas while other subcultures dominate in the r est of Texas. The political culture and philosophy is elaborated under three philosophical streams: classical liberalism, social conservation, and populism. Firstly, Classical liberalism’ focus is to place political value on political measures which helps an individual to exercise full liberty until and unless others are not limited by it. It often forms opposition to the use of the government to attain social goals. They press for the market forces or private motives to provide the best outcome. Moreover, historically Texas also supported religious acceptance for civil liberties for both individualism and entrepreneurship. One of the classic examples of reputation in Texas is H. Ross Perot (political candidate and rich businessperson). Other examples also include Willie Nelson and several Texans who disobeyed social values, rejected the acceptance of race and gender like Barbara Jordan (Maxwell et al., pp. 23-25). Social conservatism came out of classical conservatism viewed liberalism with distrust and appreciated traditional hierarchical social relations. This has rooted in feudal English and European thinking. Moreover, in contemporary forms, the idea of government intervention to reinforce social relations is very well substantiated by the social conservatives. They value traditional practices such as religious beliefs and respect traditional authorities, which can include business or religious leaders. While on the other hand, socially conservatism continues to influence within Democratic Party since decades although their ideology is under the ideas of Republican Party. Populism, the third category, is concerned with well being of ordinary people and has both political and social dimensions. Popular will is the quality of doing what is right and avoiding what is wrong in political position. The idea of Populism supports government politically in managing society and the economy. Populism depends on the style and rhetorical appeal to its audience rather than on the content of the policies of the political candidates. Populism can also take socially conservative forms in its support to the political leader. Thus, populism has different positions to support, which depend on the context. Moreover, it ignores the traditional views

Tuesday, November 19, 2019

Report on Religious Field Research Essay Example | Topics and Well Written Essays - 1000 words - 2

Report on Religious Field Research - Essay Example Conversely, conferring to Islam, ‘jihads’ are of different types and they are also non-violent. ‘Jihad’ is also ‘Jihad bilnafs’, one’s tussle with one’s self is among the most essential kinds. Jihad bilnafs includes regularly striving to manage and deal with our animal desires. Safeguarding Muslim women from the ‘oppression’ of Islamic conduct is considered one of the pet assembling exclamations of the folks who reflect Islam to be a force of evil. Similar to several other offenses incorrectly accredited to the name of Islam instead to the specific people who initiate them, biased handling of women is also measured to be the ‘Islamic way’ of treating female folk. Keeping to the side the spiteful publicity, the cause behindhand this error is perhaps the detail that Islamic educations about the part, everyday jobs, rank, position and conduct of females are referred to in accordance to the practices and beliefs of the western world. If nothing else, Islam freed the women in Arabia by openhandedly granting them human rights which were disregarded for most of the era that time in most nations. Numerous Christians come to believe that Jesus and also other prophets are not thought of as Prophets or God’s messengers by the people of Islamic faith. A hasty analysis of Qur’an or other Islamic works of prose display that Muslims reminisce all of the Messengers talked about in the Judaic and Christian Books with utmost esteem and respect. Theindicationof Jesus has been in Qur’an in numerous spaces. Religious narrow-mindedness is tall on the list of charges counter to Muslims and Islam. Numerous non-Muslims trust that Islam is not tolerating towards different religions and beliefs and that it instructions to its followers is to slay wholly the non-Muslims. Associating the activities of a minority of corrupt people with the wisdoms of Islam in regard

Saturday, November 16, 2019

Global Change Essay Example for Free

Global Change Essay The concept of civil society was reinvented in the late 1980s in response to the rapid market development and the end of the Cold War. The collapse of the Soviet Union marked the rapid development of global market due to higher international security. Market development gradually leads to the development of civil society for two reasons: Firstly, the middle class helps to fight more freedom from the government as they want to gain more and more control of themselves. This situation, allows spaces for civil society to develop. Some donors search for NGOs to implement their civic or economic related interests and visions. 1 Secondly, the retreat of the â€Å"welfare† states in western countries further triggers the emergence of civil society as people want to address the problem themselves instead of solely depending on the invisible hand of the free market. Hong Kong, which is recognized as a newly industrialized economy (NIE) has adopted the minimal-interventionist principle in economic development for a long Low tax rate and free market policies are the priorities of the Hong Kong government. Civil society is said to be very important in the implementation of democracy as civil society is a representation of diverse interests of the people. In the planning system of Hong Kong, though the government was willing to involve more public participation in the process with the increasing force of democratization between 1990 and 1997, the role of civil society in planning policy formulation and implementation was not yet clear. According to the experiences of some UK cities, partnership between civil society and the local governments can facilitate sustainable development. It is yet to know whether such kind of partnership is possible in Hong Kong or not. So the aim of this paper is to find out the challenges and opportunities of mobilizing partnership between the government and civil society. Aims of the study This paper aims to explore the challenges and opportunities in fostering partnership between civil society and the government in the planning system of Hong Kong. This paper is based on the central argument that civil society organizations (â€Å"CSOs†) should play significant role in the planning system to explore the challenges and opportunities. It is argued that CSOs are important for promoting more effective idea in the policy planning in terms of reflecting the needs of the locals as well as the moral values neglected by both market and the government. It is believed that the challenges and opportunities are not that straightforward to be understood as they should involve a lot of other factors. These factors are to be examined in order to provide a clearer picture for the analysis. Structure of the paper This study is composed of six sections:- Session I begins with an introduction. It states the purpose of this paper and the content structure. Section II is the theoretical framework established for understanding the theoretical meaning of civil society and the importance of partnership between the government and the CSOs. Section III is the background about development of citizenship in Hong Kong. It is found that the civil society in Hong Kong is becoming mature. Section IV discusses on the six major factors contributing to the challenges in the relationship between the government and the civil society. Section V seeks to study real-life cases to further strengthen the argument that CSOs should play significant role in the planning system. Section VI, the final section of this paper. It summarizes all the key issues discussed in this paper and highlights the importance of the role of CSOs in planning system.   Defining â€Å"Civil Society† The definitions and meaning of civil society in different mainstream theories are explored and outlined in Appendix 1. The interpretation of civil society by Aristotle is now widely recognized as autonomy, not under direct state control. It emphasized on the formation of government based on voluntary willingness of people and universal election in order to guarantee sovereignty of citizens (for Locke) and the freedom of civil society (for Rousseau). The existing political system in Hong Kong is different as the HKSAR government is not directly elected by the citizens. Hong Kong people can only elect some of the legislative councilors, who act as delegates to deal with legislative issues; and district councilors, who are serving as advisors of the government. The sovereignty is just partly in the hand of Hong Kong people. In fact, the situation of Hong Kong is closer to the idea of Hegel that civil society and family together form the state. Civil society is actually functioning as a partly autonomy body under the government of Hong Kong. However, civil society should perform a more active role in the system in order to balance the power of the state and the market for the benefit of the public. So Friedmanns definition of civil society will be applied to support the empowerment of civil society. Civil society, as an association of individual interests, should grow up to balance the power of the state. His definition also separates the concept of market from civil society, which is applicable in the situation of Hong Kong. Friedmann(1998) states that civil society must be seen as standing in â€Å"opposition† to the corporate economy. The relationship of civil society and the market should not be neglected when we understand the relationship of the government and the civil society. 2 To sum up, the combination of Friedmanns and Hegel’s definition of civil society is applied in this paper. Civil society is defined as a sphere without direct state control, but is not totally separated from the state. The participation in civil society is based on voluntary willingness and it is actually an association of various individual interests. It is different from the concepts of corporate economy and family, but they are related to some extent. Civil society may not necessarily oppose to the corporate economy, but they may interplay to produce good results. Civil society should be empowered to balance the power of the government and market.

Thursday, November 14, 2019

The Machines of Death Are Dying Essay -- Argumentative Persuasive Essa

The Machines of Death Are Dying Capital punishment is, by definition, punishing a crime with death. The death penalty has been used periodically throughout American history since 1608, when the first recorded death sentence was imposed. According to "Executions in the U.S.: The Espy File," by M. Walt Espy and John Ortiz Smylka, there was a gradual incline in the number of executions from that time and throughout the seventeenth, eighteenth, and nineteenth centuries, peaking at 200 executions per year in the mid-1930s. There was a subsequent decline in imposition, followed by a moratorium, which ended in 1976 (1). The moratorium was initiated in the 1972 case Furman v. Georgia, when the Supreme Court declared that the death penalty had been applied arbitrarily and used unfairly against the poor and African American. Capital punishment was called, "excessive, unnecessary, offensive to contemporary values" by Supreme Court Justice Thurgood Marshall (3). The death penalty was reinstated in 1976 when guided discretion statutes in Georgia, Texas, and Florida were deemed constitutional by the Supreme Court. The Court also deemed the death penalty constitutional under the Eighth Amendment, which states, "Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishment inflicted." The question, then, is whether or not capital punishment can really be cleared of the identification as being cruel and unusual. The basis of the American judicial system has long been said to be the need to find fair forms of retribution for crimes. The worst of those crimes is generally considered to be the intentional mur... ...dollars since the moratorium ended in 1976 (1). The death penalty is one instance in which the costs definitely outweigh the benefits. As it stands, the death penalty should no longer be used in America because it is riddled with imperfections in so many ways. Capital punishment does not serve as an effective incapacitator or deterrent to criminal behavior. It is an inhumane and costly procedure that dehumanizes American culture. As a nation that practices this flawed form of discipline we are isolated from our Western culture counterparts, and the fact that we continue this practice reduces America's credibility as a global leader. In order to place the American judicial system - and culture as a whole - where it belongs on all levels, the system of capital punishment must be abolished.

Tuesday, November 12, 2019

Analysis and Design of Software Architecture Essay

Outline 1 2 3 4 5 6 7 8 Development Process Requirements Quality Attributes Runtime QA Non-runtime QA Requirements Analysis: Example Architectural Analysis & Design Architectural Views Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 2 / 78 Development Process Methodology Diï ¬â‚¬erent software development processes have software architecture as a part of the process Rational uniï ¬ ed process Spiral development method Agile development method Evolutionary rapid development Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 3 / 78 Development Process Place of SA in SDP Figure: Source: Software Architecture Primer by Reekie, McAdam Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 4 / 78 Development Process Methodology After the initial requirements analysis but before software design The ï ¬ rst architecture is also a communication basis with the customer Inputs for the development of the architecture: 1 2 Requirements Context (technical, organizational, business, †¦) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 5 / 78 Requirements Analysis At the beginning there is always a customer who wants a speciï ¬ c software system Customer â€Å"wishes† are always informal Interviews, some documents, some Excel tables, †¦ We need to analyze such informal records and structure it Requirements engineering is a huge ï ¬ eld but we just illustrate here one possibility Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 6 / 78 Requirements Analysis The results of the requirements analysis: 1 2 Functional requirements Non-functional requirements (a) Runtime qualities (b) Non-runtime qualities 3 Contextual requirements Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 7 / 78 Requirements Functional requirements A technical expression of what a system will do Arise from stakeholder needs Structured language: software requirements speciï ¬ cation Use cases: structured description of user interactions with the system Formal models: e.g. state-charts Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 8 / 78 Requirements Non-functional requirements Other needs than directly functional or business-related Generally expressed in the form of quality-attributes Runtime quality attributes Non-runtime quality attributes Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 9 / 78 Requirements Contextual requirements What technology is available? Expertise of the development team Previous experience of users/customers Technical, business, market, legal, ethical, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 10 / 78 Quality Attributes Need to address QAs Without any need for performance, scalability, †¦ any implementation of functionality is acceptable However, we always need to take into account the broader context E.g. hardware, technological, organizational, business, †¦ The functionality must be there but without proper addressing of QA it is worth nothing Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 11 / 78 Quality Attributes Inï ¬â€šuence on QAs Typically, a single component can not address a QA completely Any QA is inï ¬â€šuenced by multiple components and their interactions E.g. a UI component has a high degree of usability: however, usability of the system is compromised if a data management component has poor performance in accessing the data → users need to wait long → poor usability Components and their interactions → software architecture QAs are directly inï ¬â€šuenced by software architecture Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 12 / 78 Runtime QA PURS PURS (performance, usability, reliability, security) Performance: time performance, memory, disk, or network utilization Usability: human factors, easy to learn, easy to use, †¦ Reliability: availability, safety, †¦ Security: authentication, data protection, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 13 / 78 Runtime QA Performance Time performance is most obvious Measured in the number of operations per second Also, latency: the time from receiving an input and producing an output Other measures: memory, disk, network utilization or throughput Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 14 / 78 Runtime QA Performance Diï ¬â‚¬erent measures are typically traded oï ¬â‚¬ against each other E.g. increasing throughput may increase latency Time performance might be increased with more memory True performance of the system is not only deï ¬ ned by performance of single components But also by their interactions and the overall processes in the system Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 15 / 78 Runtime QA Performance factors Choice of algorithms Database design Communication Resource management Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 16 / 78 Runtime QA Choice of algorithms Performance of algorithms is measured by their complexity (big O) E.g. linear complexity: O(n) Running time increases in direct proportion to the size of the data E.g. polynomial complexity: O(n2 ) It does not scale: double size of the data – running time increased by factor of 4 Goal: O(nlog (n)) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 17 / 78 Runtime QA Database design Performance of database queries can dominate the overall performance The design of the tables has enormous impact on the overall performance Techniques to improve it: lazy evaluation, replication, caching Some additional cost to manage replication and/or caching In-memory databases (real-time systems) Developing a new database (search engines) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 18 / 78 Runtime QA Communication Network overhead Package data according to a protocol, sending data over network Each layer means additional overhead Think how to use network: packaging binary data as XML!? Use more compact formats, e.g. JSON vs XML Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 19 / 78 Runtime QA Resources management Overloaded components need to be avoided A chain is only as strong as its weakest link! E.g. a single-threaded shared resource is in use: all other threads are blocked Very diï ¬Æ'cult to track down Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 20 / 78 Runtime QA Usability Usability is a very rich ï ¬ eld If usability is important you will need a usability expert Combination of many factors: responsiveness, graphical design, user expectations, conï ¬ dence Measuring with time taken to complete task, error rate, time to response, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 21 / 78 Runtime QA Responsiveness and data availability An example of relations between QAs Usability requires that the system responds to user actions within a certain period of time If it is a complex system this need translates into performance along the path of the user action Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 22 / 78 Runtime QA Responsiveness and data availability Figure: Usability vs. Performance Source: Software Architecture Primer by Reekie, McAdam Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 23 / 78 Runtime QA Discussion on relations between QAs This diagram shows that we need to pay attention to tuning communication between B and Y Performance of the communication channel is a consequence of a usability requirement Do we need to support security of the communication channel? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 24 / 78 Runtime QA Discussion on relations between QAs This diagram shows that we need to pay attention to tuning communication between B and Y Performance of the communication channel is a consequence of a usability requirement Do we need to support security of the communication channel? We support QAs always only as a response to user needs Never because it is needed anyway! Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 24 / 78 Runtime QA Discussion on relations between QAs If we support security even if it is not needed Very often QAs exercise opposing forces on the system Security requires a lot of checking: performance will suï ¬â‚¬er → usability will suï ¬â‚¬er A minimalistic approach: develop only what is required! Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 25 / 78 Runtime QA Reliability In traditional engineering disciplines reliability measures the failure rate of the system Failure rate speciï ¬ ed by mean time to failure MTTF A related measure: mean time between failures MTBF MTTR is mean time to repair A is availability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 26 / 78 Runtime QA Reliability MTBF = MTTF + MTTR A= A= MTTF MTBF MTTF MTTF +MTTR E.g. expected availability of Web systems: Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 27 / 78 Runtime QA Reliability MTBF = MTTF + MTTR A= A= MTTF MTBF MTTF MTTF +MTTR E.g. expected availability of Web systems: 1 (always up-and-running) =⇒ MTTF → ∞ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 27 / 78 Runtime QA Reliability Increasing reliability involves testing However, impossible to prove that a system is correct, i.e. without bugs Acceptability of errors depends on the  nature of a system Personal desktop use: bugs are typically tolerated Enterprise level: medium reliability level High-reliable systems: bugs can be fatal Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 28 / 78 Runtime QA Security Increasingly important aspect of systems is security Because systems are exposed to threats Especially networked systems As with other QAs security is a set of related responses to user needs Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 29 / 78 Runtime QA Authentication Requirement for identiï ¬ cation of users with a system Users present credentials so that the system can identify them Typically username and password Other forms: certiï ¬ cates, smart cards, biometric features Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 30 / 78 Runtime QA Authorization After authentication authorization which functions and what data is available for users This information is captured in an authorization model Access control lists (ACL) deï ¬ ne who can access and how a resource might be accessed E.g. read access, write access, delete access, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 31 / 78 Runtime QA Authorization Drawbacks of ACLs It is resource based, e.g. a page in a CMS Often, authorization needs to address functions or tasks Also, managing of ACLs is diï ¬Æ'cult, e.g. subresources of resources Also, performance problems with checking Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 32 / 78 Runtime QA Authorization Another model: role-based access control (RBAC) Roles are used to manage many-to-many relations between users and permissions Roles are used to represent the job functions, e.g. author, teacher, student in an E-learning system Permissions are modeled as parts of roles, e.g. create page, create tests, †¦ Users are than assigned to a role and acquire automatically permissions of that role Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 33 / 78 Non-runtime QA MeTRiCS MeTRiCS (maintainability, evolvability, testability, reusability, integrability, conï ¬ gurability, scalability) Maintainability: how easy can you ï ¬ x bugs and add new features Evolvability: how easy your system copes with changes Testability: how easy can you test the system for correctness Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 34 / 78 Non-runtime QA MeTRiCS Reusability: how easy is to use software elements in other contexts, e.g. a software library Integrability: how easy you can make the separately developed components of the system work correctly together Conï ¬ gurability: how easy can a system be conï ¬ gured for diï ¬â‚¬erent installations and target groups Scalability: how easy the system copes with a higher performance demand Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 35 / 78 Non-runtime QA Maintainability This QA considers the whole lifecycle of a system What happens during system operation? Property that allows a system to be modiï ¬ ed after deployment wirh ease E.g. extensible, modiï ¬ ed behavior, ï ¬ xing errors Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 36 / 78 Non-runtime QA Maintainability At the design and implementation level Code comments Object-oriented principles and design rules Consistent programming styles Documentation Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 37 / 78 Non-runtime QA Maintainability Maintainability is very important because any software system will change over time Experience shows that such changes tend to degrade the system over time Software systems are subject to entropy The cumulative eï ¬â‚¬ect of changes degrades the quality of the system Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 38 / 78 Non-runtime QA Maintainability The systems tend to become messy systems Regardless of how a nice plan you had at beginning Design for change – recollect OO design rules Abstract messy parts of the system so that they can be exchanged Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 39 / 78 Non-runtime QA Maintainability Don’t be afraid to refactor and rewrite and redesign Each software vendor does this with major versions Create throw-away prototypes Think out-of-box and innovate Don’t always follow a hype – very often nothing new in hypes E.g. Web services Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 40 / 78 Non-runtime QA Testability Means to improve testability Test cases: if something fails there is a bug Separation of the testing framework and the system, i.e. testing with scripts from outside Logging Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 41 / 78 Non-runtime QA Conï ¬ gurability Ability of a system to vary its operational parameters without re-compiling or re-installing E.g. selecting appropriate database drivers, conï ¬ guring network parameters, †¦ Typically, realized by a set of conï ¬ guration ï ¬ les E.g. Apache Web server conï ¬ guration ï ¬ le sets host name, virtual hosts, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 42 / 78 Non-runtime QA Conï ¬ gurability Conï ¬ gurability interacts with other QAs such as testability, maintainability, reliability High degree of conï ¬ gurability tends to have a negative impact on those QAs Testing of diï ¬â‚¬erent system conï ¬ guration becomes more diï ¬Æ'cult → reliability compromised Conï ¬ gurable components will be strongly parametrized → decreased maintainability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 43 / 78 Non-runtime QA Scalability Ability of a system to increase its capacity without re-compiling or re-installing E.g. serving additional Web pages means only copying these Web pages into a Web server ï ¬ le system Sometimes increasing capacity means increasing hardware, e.g. Web server clusters Managing user session on the client side, means only providing additional code-on-demand from the server Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 44 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT A simple and usable system for network analysis is needed. Networks are entities that contain not only individuals but also their connections with other individuals (see e.g. 3 for an example). The system accepts a network representations as a list of pairs of connected nodes stored in a dataset ï ¬ le. Nodes are represented as integers. An edge between two nodes is stored as a line containing two nodes delimited by a tabulator. Users might upload datasets to the systems and store them for further analysis. Each user might upload multiple datasets and can execute various analysis on those datasets. The system keeps the track of the analysis history for each user. Users may calculate degree distributions, network diameter, clustering coeï ¬Æ'cient, connectivity measures, singular values, and diï ¬â‚¬erent centrality measures. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 45 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT Users can execute various calculations on multiple datasets in parallel. The system must not be blocked if a calculation is currently under way. Rather it should be possible to start a new calculation, or view previous calculations, etc. In case of longer calculations the system needs to notify the user by e-mail when the calculation is over. The results of the calculations should be available in textual and in graphical form. All results can be also downloaded to a local computer. The system will be used by a group of students that learn the basics of network analysis. It is expect that at any times the system will be used by multiple users executing multiple calculations. Since the system is primarily an educational tool it needs to be didactically sound, i.e. simplicity and usability are very important. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 46 / 78 Requirements Analysis: Example System description 6 How to search in a small world Pajek Figure 2: HP Labs’ email communication (light grey lines) mapped onto the organizational hierarchy of HP Labs constructed out the e-mail communication. Figure: Social network(black lines). Note that communication tends to â€Å"cling† to of formal organizational chart. From: How to search a social network, Adamic, 2005. with one another. The h-distance, used to navigate the network, is computed as follows: individuals have h-distance one to their manager and to everyone they share a manager with. Distances are then recursively assigned, so that each individual has h-distance 2 to their ï ¬ rst neighbor’s neighbors, and h-distance 3 to their second Denis Helic (KMI, TU neighbor’s neighbors, etc. SA Analysis and Design Graz) Oct 19, 2011 47 / 78 Requirements Analysis: Example System description Web-based Network Analysis Tool: W-NAT The system is a Web-based system and the users should be able to operate the system by using a standard Web browser. The users need not install any additional plugins to operate the system. User perceived performance of the system should be acceptable. In addition, standard Web usability concepts need to be followed. In particular, browser back button must be working at all times and it should be possible to bookmark pages at all times. Finally, standard Web design principles should be satisï ¬ ed, meaning that pages are valid (X)HTML pages in at least HTML Transitional. The system needs to support cross browser compatibility. Further, each page and each important application state needs to have a unique and human-readable URL. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 48 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.1: UR1.2: UR1.3: UR1.4: UR1.5: Out-degree distribution In-degree distribution Cumulative out-degree distribution Cumulative in-degree distribution Hop plot Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 49 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.6: Clustering coeï ¬Æ'cient UR1.7: Distribution of weakly connected components UR1.8: Distribution of strongly connected components UR1.9: Left singular vector UR1.10: Right singular vector Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 50 / 78 Requirements Analysis: Example Functional requirements UR1: The system is a network analysis tool. The system can calculate the following measures. UR1.12: UR1.12: UR1.13: UR1.14: UR1.15: Network singular values Degree centrality Closeness centrality Betweenness centrality Eigenvector centrality Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 51 / 78 Requirements Analysis: Example Functional requirements UR2: Networks are stored in dataset ï ¬ les. UR3: The dataset ï ¬ le has the following format. NodeID1 NodeID2 UR4: Users can upload multiple datasets to the system. UR5: To perform an analysis users select a dataset and then choose a measure to calculate. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 52 / 78 Requirements Analysis: Example Functional requirements UR6: For each user and for each dataset the system manages a history of calculations. UR7: Users may initiate multiple calculations simultaneously. UR8: When a calculation is started the system is not blocked. UR9: The system notiï ¬ es users about a ï ¬ nished calculation by e-mail. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 53 / 78 Requirements Analysis: Example Functional requirements UR6: For each user and for each dataset the system manages a history of calculations. UR7: Users may initiate multiple calculations simultaneously. UR8: When a calculation is started the system is not blocked. UR9: The system notiï ¬ es users about a ï ¬ nished calculation by e-mail. When is this notiï ¬ cation needed? If the user is logged out? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 53 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. How register? E-mail? Captcha? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Functional requirements UR10: The calculation results are presented in a textual as well as in a graphic form. Which form? Format? Graphics format? UR11: Users can download the calculation results. Single results? All results? Archived, how archived? UR12: Users can register with the system. How register? E-mail? Captcha? UR13: Users can login and log out. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 54 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5: Web-based system should be available at all times. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR1: The system is simple, usable and didactically sound. Usability UR2: The system needs to support multiple users simultaneously. Performance How many users? UR3: Authentication should be supported. Security UR4: User-perceived performance must be acceptable Performance and Usability How many seconds at max users can wait? UR5: Web-based system should be available at all times. Reliability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 55 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability UR9: Multiple users. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Non-functional requirements UR6: Human-readable URLs. Evolvability, reusability, maintainability, testability, integrability UR7: Extending the system with new metrics. Evolvability, reusability, maintainability, testability, integrability, conï ¬ gurability UR8: Reliability of a Web-based system. Testability UR9: Multiple users. Scalability Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 56 / 78 Requirements Analysis: Example Contextual requirements UR1: Web browser. UR2: Valid (X)HTML, at least (X)HTML Transitional. UR3: No browser plugins are allowed. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 57 / 78 Architectural Analysis & Design Analysis We analyze the requirements and try to identify so-called key concepts Understanding of the domain Static part of the domain We also try to identify key process and activities Dynamic part of the domain Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 58 / 78 Architectural Analysis & Design Design Design is the process of creating models (recollect the deï ¬ nition of SA) Two basic types of architectural models Structure and behavior Architectural structure is a static model of a system (i.e. how the system is divided into components) Architectural behavior is a dynamic model of a system (i.e. how the components interact with each other to perform some useful work) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 59 / 78 Architectural Analysis & Design Architectural structure The division of a system into components and connectors To represent the model: box-and-lines diagrams (to see at a glance important concepts) It is important to remember that diagrams are only representations of the model Diagrams must always be accompanied by additional material such as text, data models, mathematical models, etc. The combination of diagrams and additional material is an architectural model Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 60 / 78 Architectural Analysis & Design Architectural structure What is a component? What is a connector? Components might be subsystems, separate processes, source code packages, †¦ Connectors might be network protocols, method invocations, associations, †¦ The combination of diagrams and additional material is an architectural model Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 61 / 78 Architectural Analysis & Design Architectural structure Figure: Example of an architectural structure Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 62 / 78 Architectural Analysis & Design Architectural structure In the diagram we have one user-interface and one database component But what is the criteria for deciding what is a component? Separate program modules? Separate threads or processes? Conceptual or functional division? And what about connectors? Network protocols? Callbacks? Request/response cycles? Method invocations? Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 63 / 78 Architectural Analysis & Design Architectural structure What is the level of granularity of a diagram? E.g. for a Web-based system, components are servers and browsers and connector is HTTP But, components of a server are HTTP parser, ï ¬ le I/O, cache, plug-ins, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 64 / 78 Architectural Analysis & Design Architectural structure Comparison with OO: a component is an object and a connector is a message sent between two objects Because models in OO are very well deï ¬ ned Therefore, we need additional information that accompanies diagrams To describe criteria for decomposition and provide explanations on granularity Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 65 / 78 Architectural Analysis & Design Architectural behavior Complementing structure is architectural behavior Interaction of system elements to perform some useful work Functionality vs. behavior Functionality is what the system can do and behavior is the activity sequence Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 66 / 78 Architectural Analysis & Design Architectural behavior Example: Accessing a tweets document Request is sent to the Web presentation layer That layer forwards the request to the application logic, e.g. TweetDeck TweetDeck contacts TweetViews to obtain a particular template, then retrieves the data from TweetDB wraps it into an HTML response and sends the response to TweetUI Functionality allows me to display a tweets document, behavior is the sequence of activities that makes it happen Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 67 / 78 Architectural Analysis & Design Architectural behavior Each component has a set of responsibilities Behavior is the way how these responsibilities are exercised to respond to some event An event may be an action of the user or an event from an external system A particular behavior is an event plus a response in the form of a sequence of component responsibilities Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 68 / 78 Architectural Analysis & Design Architectural behavior To represent behavioral models we use use-case map notation by Buhr A use-case map consists of a trace drawn through a structural diagram of the system The path of the trace through a structural diagram shows the sequence of activities Each crossing of a component by the trace indicates exercising of a responsibility Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 69 / 78 Architectural Analysis & Design Architectural behavior Figure: Types of traces in use-case maps Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 70 / 78 Architectural Analysis & Design Architectural behavior (a) Single trace – all responsibilities exercised sequentially (b) Two traces are consecutive: Equivalent to single trace but shows that continuation is triggered by another event (c) And-Fork: The traces after the line are potentially concurrent (run in parallel) Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 71 / 78 Architectural Analysis & Design Architectural behavior Figure: Types of traces in use-case maps Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 72 / 78 Architectural Analysis & Design Architectural behavior (a) N-Way And-Fork: the trace after the fork may be replicated an arbitrary number of times (b) Or-Fork: The trace is split and activity proceeds along one or another path (c) Seq-Fork: The traces after the line are followed in the order indicated by the arrow Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 73 / 78 Architectural Analysis & Design Architectural behavior Figure: Example of architectural behavior Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 74 / 78 Architectural Views Architectural views We can examine a system from diï ¬â‚¬erent points of view Diï ¬â‚¬erent kinds of views Conceptual: components are set of responsibilities and connectors are ï ¬â€šow of information Execution: components are execution units (processes) and connectors are messages between processes Implementation: components are libraries, source code, ï ¬ les, etc and connectors are protocols, api calls, etc. Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 75 / 78 Architectural Views Architectural views There are other models as well We will mention them but we will investigate only previous three models Data model describes the data Physical model describes servers, ï ¬ rewalls, workstations, †¦ Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 76 / 78 Architectural Views Architectural views Each view provides diï ¬â‚¬erent information about the structure of the system Each view addresses a speciï ¬ c set of concerns All views taken together is the primary means of documenting software architecture Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 77 / 78 Architectural Views Architectural views The conceptual architecture considers the structure of the system in terms of its domain-level functionality The execution architecture considers the system in terms of its runtime structure The implementation architecture considers the system in terms of its build-time structure Denis Helic (KMI, TU Graz) SA Analysis and Design Oct 19, 2011 78 / 78

Saturday, November 9, 2019

Book design, visual analysis on “The Art of Looking Sideways”

The above quote was used by The Daily Telegraph to describe Alan Gerard Fletcher on his obituary. Fletcher was a well-known British graphic designer who was awarded the Prince Philip Prize for Designer of the Year, and was elected the President of the Designers and Art Directors Association in 1973 and was also elected as the International President of the Alliance Graphique Internationale from 1982 to 1985.He wrote a number of books, but his master piece, which was written on the topic of graphic designing and visual thinking and took him nearly 18 years to finish is the book under consideration known as â€Å"The Art of Looking Sideways†.In the words of the reviewers at the Library Journal, â€Å"this book will delight anyone who enjoys unexpected visual and verbal play, cultural and historical observations and insights, and staggering amounts of trivia and anecdotes† (The Art of Looking Sideways by Alan Fletcher, p.1).The book is very extra ordinary and one of its ki nd, and the author has succeeded in presenting a nearly beyond description mixture of tales, citations, illustrations, and strange realities that presents the reader with an astonishingly warped visualization of the pandemonium of modern life (Alan Fletcher, p.1).Book Design and Visual Analysisâ€Å"Graphic designers (presumably with the support of publishers) seem to have embraced the principle that size matters. First there was Life Style, Bruce Mau's cinder-block-size illustrated meditation/portfolio. And now, at more than a thousand pages and weighing in at slightly less than a large infant, we have Alan Fletcher's The Art of Looking Sideways†.The book is based on about seventy two chapters, which have titles like Culture, Improvisation, Colour, Ideas and the likes. Comprised of nearly more than a thousand, the book is a brilliant treatise on visual thinking, one that exemplifies the sense of play and the extended frame of reference of the designer.A number of designers a s well students of design usually go through the pages of this book in order to grasp ideas, while others go through the book in order to enjoy the gently challenging mind-teasers the book has to offer.Putting together the most determined of sets for his work, aligned with a background encircling art, drawing and literature from pre-history to the current day, Fletcher has put forward a persuasive case for the role that graphic designs play in the course of civilization.The book is very visual. It has more illustrations than text. According to sources, â€Å"Sideways isn't so much a book you read; rather, it's an experience you savor over time. If it were a bottle of wine, you'd want to sip it gradually, over a period of years. Gulping is completely out of the question.On every page, you'll find a juicy little nugget† (Buchsbaum, p.1). The design of the book is rather very creative. With every turn of the page there is something new present there waiting for you to go through . The Art can easily amuse and enthuse all of the people who like the interaction amid word and image, and also those who appreciate the odd and the unpredicted.The book is nothing to read, but it can rather be taken as a visual experience by the reader, where a new image, with a new twist is waiting for the reader. The front and the back cover of the book can be taken into consideration to understand what to expect inside the book, but even that might not be much help.Through the visuals, the author or lets say the designer has put forward some pieces of information, which we would in general consider useless and ignore.All of the visuals and the illustrations that have been presented by the author barely have any connection with each other. Even on opposite pages, the reader would find pictures that are completely opposite each other.For example, presented on page number 162, is a picture of a water color of flowers along with a short note about The Academia in Venice and the art that are exhibited in its galleries and right next to it on the opposite page paragraph by Philip Roth, which also has quotes from Nietzsche, Baudelaire, Wilde, Paul Auster, Napoleon Bonaparte and many others, as well as a concise description of the word â€Å"mopery† intermingled within it.Now both of these pictures have no relation what so ever amongst themselves, which shows the broad horizon of the images that the author had. The pictures can be said to be very random and are very stimulating, which would challenge the viewer into seeing and thinking from a completely different perception, which is sideways.The design of the book consists of all kinds of visual stimuli, which makes the viewer look at ordinary everyday things with a completely new perception. In the words of the author of the book, â€Å"I am intrigued by apparently useless information, such as 8% of the population is left-handed; giraffes only sleep five minutes every 24 hours; Italians kiss twice, the S wiss three times; is a zebra a white animal with black stripes or vice versa; and, are you left or right eyed?This book is everything I was never taught at school. It has no thesis, is neither a whodunit nor a how-to-do-it, and has no beginning, middle or end. It is a book for visually curious people, full of things to make you think twice† (The Creative Life, p.1).

Thursday, November 7, 2019

University of Michigan-Flint Admissions Data

University of Michigan-Flint Admissions Data University of Michigan-Flint Description: Founded in 1956, the University of Michigan-Flint is one of 15 four-year public universities in Michigan. Flint is located about an hour northwest of Detroit, and the city has a rich history in American civil rights as well as the automobile industry. Today the city continues to evolve and has become a rich location for the arts. The city is the home to The Flint Institute of the Arts, and a range of venues for art exhibition, theater and music. The University of Michigan-Flint campus sits in the heart of the city. Kettering University is withing walking distance. UM-F takes pride in its engaged learning approach to education. Since its founding, the university has followed a learning by doing model of education in which students engage in internships, undergraduate research projects, campus leadership positions, creative projects, and community service. Students can choose from over 100 areas of study, and academics are supported by a healthy 16 to 1 student / faculty ratio. Profess ional fields in business, education, and health are particularly popular. Campus life is active with several fraternities and sororities, over 20 club sports, and a wide range of other student clubs and organizations. The university does not have any varsity intercollegiate athletic teams, but UM-F students can by tickets to University of Michigan games at a discounted price.   Admissions Data (2016): University of Michigan - Flint Acceptance Rate: 65%Test Scores 25th / 75th PercentileSAT Critical Reading: 493  / 575SAT Math: 485  / 598SAT Writing: - / -What these SAT numbers meanMichigan public university SAT score comparisonACT Composite: 19  / 26ACT English: 18 / 26ACT Math: 18  / 25What these ACT numbers meanMichigan public university ACT score comparison Enrollment (2016): Total Enrollment: 8,044  (6,585 undergraduates)Gender Breakdown: 39% Male / 61% Female58% Full-time Costs (2016 - 17): Tuition and Fees: $10,344 (in-state); $20,190 (out-of-state)Books: $1,000 (why so much?)Room and Board: $8,706Other Expenses: $3,910Total Cost: $23,960  (in-state); $33,806 (out-of-state) University of Michigan-Flint Financial Aid (2015- 16): Percentage of New Students Receiving Aid: 89%Percentage of New Students Receiving Types of AidGrants: 63%Loans: 85%Average Amount of AidGrants: $7,786Loans: $6,428 Academic Programs: Most Popular Majors:  Accounting, Biology, Business Administration, Elementary Education, Health Care Administration, Nursing, Social Work Graduation and Retention Rates: First Year Student Retention (full-time students): 68%4-Year Graduation Rate: 13%6-Year Graduation Rate: 37% Data Source: National Center for Educational Statistics Interested in the University of Michigan-Flint? You May Like These Universities: Michigan State UniversityCentral Michigan UniversityUniversity of Michigan-DearbornUniversity of Michigan-Ann ArborWayne State UniversitySaginaw Valley State UniversityWestern Michigan UniversityFerris State UniversityOakland University University of Michigan-Flint Mission Statement: mission statement from  umflint.edu/chancellor/mission-vision The University of Michigan-Flint is a comprehensive urban university of diverse learners and scholars committed to advancing our local and global communities. In the University of Michigan tradition, we value excellence in teaching, learning, and scholarship; student centeredness; and engaged citizenship. Through personal attention and dedicated faculty and staff, our students become leaders and best in their fields, professions, and communities.

Tuesday, November 5, 2019

Profile of Child Predator Nathaniel Bar-Jonah

Profile of Child Predator Nathaniel Bar-Jonah Nathaniel Bar-Jonah was a convicted child predator that was serving a 130-year prison sentence after being found guilty of repeatedly molesting, torturing and attempting to murder children. He was also suspected of killing a child and then disposing of the body through cannibalistic ways that involved his unsuspecting neighbors. Childhood Years Nathaniel Bar-Jonah was born David Paul Brown on February 15, 1957, in Worcester, Massachusetts. As early as age seven, Bar-Jonah demonstrated severe signs of depraved thinking and violence. In 1964, after receiving an Ouija board for his birthday, Bar-Jonah lured a five-year-old girl into his basement and tried to strangle her, but his mother intervened after hearing the child screaming.   In 1970, 13-year-old Bar-Jonah sexually assaulted a six-year-old boy after promising to take him sledding. A few years later he planned to murder two boys in a cemetery, but the boys became suspicious and got away. At 17 years of age, Bar-Jonah pled guilty after being arrested for dressing as a policeman and beating and choking an eight-year-old boy who he ordered into his car. After the beating, the child recognized Brown who was working at a local McDonalds and he was arrested, charged and convicted. Bar-Jonah received a year of probation for the crime. Kidnapping and Attempted Murder Three years later, Bar-Jonah dressed as a policeman again and kidnapped two boys, made them undress and then began strangling them. One of the boys was able to escape and contact the police. Authorities arrested Brown and the other child was located, handcuffed inside his trunk. Bar-Jonah was charged with attempted murder and received a 20-year prison sentence. Sick Thoughts While incarcerated Bar-Jonah shared some of his fantasies of murder, dissection, and cannibalism with his psychiatrist who made the decision in 1979 to commit Bar-Jonah to the Bridgewater State Hospital for Sexual Predators. Bar-Jonah remained at the hospital until 1991, when Superior Court Judge Walter E. Steele decided that the state had failed to prove he was dangerous. Bar-Jonah left the institution with a promise from his family to the court that they would be moving to Montana. Massachusetts Sends the Problem to Montana Bar-Jonah attacked another boy three weeks after his release and was arrested on assault charges, but managed to be released without bail. A deal was made that required that Bar-Jonah join his family in Montana. He also received two years probation. Bar-Jonah kept his word and left Massachusetts. Once in Montana, Bar-Jonah met with his probation officer and disclosed some of his past crimes. A request was made to the Massachusetts probation office to send more records regarding Bar-Jonah’s history and psychiatric past, but no additional records were sent. Bar-Jonah managed to stay away from police until 1999 when he was arrested near an elementary school in Great Falls, Montana, dressed as a policeman and carrying a stun gun and pepper spray. Authorities searched his home and found thousands of pictures of boys and a list of boys names who were from Massachusetts and Great Falls. Police also uncovered encrypted writings, decoded by the FBI, that included statements such as little boy stew, little boy pot pies and lunch is served on the patio with roasted child. Authorities concluded that Bar-Jonah was responsible for the 1996 disappearance of 10-year-old Zachary Ramsay who vanished on his way to school. It was believed that he kidnapped and murdered the child then cut up his body for stews and hamburgers that he served to unsuspecting neighbors at a cookout. In July 2000, Bar-Jonah was charged with Zachary Ramsay’s murder and for kidnapping and sexually assaulting three other boys who lived above him in an apartment complex. The charges involving Ramsay were dropped after the boys mother said she did not believe Bar-Jonah killed her son. For the other charges, Bar-Jonah was sentenced to 130 years in prison for sexually assaulting one boy and torturing another by suspending him from a kitchen ceiling. In December  2004, the Montana Supreme Court turned down Bar-Jonah’s appeals and upheld the conviction and 130-year prison sentence. On April 13, 2008, Nathaniel Bar-Jonah was found dead in his prison cell. It was decided that the death was a result of his poor health (he weighed over 300 pounds) and the cause of death was listed as myocardial infarction (heart attack).

Saturday, November 2, 2019

Experiment #1 North Circumpolar Motion of Stars Lab Report

Experiment #1 North Circumpolar Motion of Stars - Lab Report Example Yes, in addition to the obvious motion that brings about change of location, they also change the orientation. The stars seem to exhibit two kinds of motions that is one from the central position and its orientation It is common knowledge that the earth moves from east, north, west and south. However, such motion is similar to the stars because they appear to move from the north toward the west, comparison of the stars location reveals that those observed in the first experiment appeared far from the west than those observed later on. Yes, stars move across the space, in fact all stars move across the space from one location to another (Craig, 1). The only difference between the motions of the stars with that of the earth is that direction depends on the individual star. As a result, there is no universal direction for the stars’ movement. Different stars move in the different direction either toward or from each other. For instance, if the stars were fixed we would expect the movement of the earth to portray the stars to simulate motion in the opposite direction. As such one would think that the stars move from the north to east and south. However given that both the earth and the stars move in the same direction, it is evident to seek stars changing position. Movement of the stars does not depend on either the seasonal motion of the earth or the daily seasons. Their motion is independent of these parameters. In fact, stars move independently in space. Motions of different stars do not take defined direction as many would expect but rather may move in any direction in the space. Craig, Brown.. The Little Dipper and the Earth’s Tilt and  Rotation, 2012. Retrieved from https://craigssenseofwonder.wordpress.com/2012/11/17/the-little-dipper-and-the-earths-tilt-and-rotation/