This document outlines the planning phase of developing a virtual classroom system for Women's University in Africa. It assesses the potential business value through a cost-benefit analysis and return on investment calculation. Various feasibility studies are also conducted, finding that the project is technically, operationally, and economically feasible. Technical feasibility is confirmed by the availability of required technology, software, hardware, and personnel. Operational feasibility finds management and student support for the system. Economic feasibility indicates costs will be low since most materials are readily available. Work schedules are developed to estimate the project timeline.
This document provides an overview of an existing cafeteria management system and proposes developing a new automated system. It describes the existing manual system and issues like time consumption, redundancy, and lack of accurate reporting. The objectives of the new system are to minimize work complexity, reduce time waste, automate ticketing with barcodes, control student access, and manage food distribution. Data will be collected through interviews and observations. The new system will be developed using Java, Bootstrap, MySQL database on a XAMPP server. It will address current problems and improve the management of cafeteria services at Haramaya University.
here is the link to our facility drawings
-----------------------------------------------------------
https://j.top4top.net/p_1231pbwk81.jpg
These entities now align themselves into cooperatives, organizations, associations, and ultimately synthesized supply chains, to remain competitive by bringing the customer into the process. The subject of facilities planning has been a popular topic for many years. In spite of its long heritage, it is one of the most popular subjects of current publications, conferences.
In this text, we employ a practical Project to facilities planning, taking advantage of the content we have in this semester. It should be noted that facilities planning, as known the facility planning starts with the selection of location. The location for our factory will be in burg El-Arab. To enables us from working efficiently without affecting any neighboring humans.
Our selected product is the C-clamp which is generally used in fixing work pieces to tables in order to apply a process on it. In this report we cover the whole project. Starting from the product and its drawings, parts, dimensions and processes applied on each part which will enables us from knowing the machines required and their numbers with of course the employees’ number.
Then we go to the annual demand and scrap estimation for each process in order to know the required amount of raw material for each part. After knowing all that now we are ready to calculate the production area required and also put a lay out for the facility. Then we go to the design phase, which contains the selection of an appropriate design for the following areas:
a. Production Area:
i. List of departments in production area (manufacturing & non-manufacturing such as offices, quality, packaging, assembly,…etc. “if exists”)
ii. State name of layout for your production area & justify your selection
iii. Schematic drawing showing flow of material from stores to warehouse (show flow of each component)
iv. Draw the production area (show name of departments and machines + flow between machines + entrance and exit)
v. Calculate the required production area (show calculations)
b. Personnel Requirement Areas:
i. Parking area (draw layout, calculate the required area)
ii. Food service area (draw layout, calculate the required area)
iii. Other areas (locker room, rest room, health service, office building… etc.) “draw layout, calculate the required area” OPTIONAL (For Extra Marks)
c. Determine the material handling equipment used, justify your selection, show where it is stationed in the facility, and what it is used to transport “specific not general information”.
Here are the use case descriptions with activity and swimlane diagrams for the "Play" use case:
Use Case Description:
This use case allows the player to start playing the game. They can either start a new game or resume a previously saved game.
Basic Flow:
1. Player selects "Play" from the main menu
2. System displays option to start new game or resume saved game
3. Player selects "New Game" or "Resume Game"
4. If new game selected, system loads level 1
5. If resume selected, system loads last saved game state
Swimlane Diagram:
Player System
| |
|--> Select "Play" |
This document provides an overview of various types of food and beverage services. It discusses table service, which involves guests entering a dining area, being seated, and placing orders with a waiter. It also covers assisted service, self service, single point service, and special service. The document describes different outlets for food and beverage services as well as operations, analysis and decision making, menu preparation, beverages, equipment, and hygiene and safety considerations. It provides a comprehensive look at the various aspects of planning and delivering food and beverage services.
Orion instruments magnetic level gauge & instrument selection guideMiller Energy, Inc.
Industrial process control employs measuring devices for determining the level of fluids in containers. This comprehensive guide to magnetic level gauges, switches, transmitters, and related products delivers an understandable and clear description of the technology and principals of operation behind magnetic level gauges and instruments. The guide also assists the reader in properly specifying and selecting the best instrument configuration for an application.
ToolBook is an application development tool used to create interactive software applications. It provides features for building a navigable structure of pages, adding objects like text, images, buttons and fields, and programming behaviors through a visual actions editor or scripting language. The user interface includes palettes for adding objects, properties panels for configuring objects, and tools for laying out pages and organizing the application. Actions can be used to add interactivity like responding to user input. Resources allow importing common assets like images to be shared across objects.
This document provides details on the design of an electric wheelchair, including mechanical components, electrical systems, and control algorithms. It describes the selection of a seat, wheels, motors, batteries, and other core mechanical elements. The electrical systems include a joystick controller, microcontroller, drive circuits, and regenerative braking. Algorithms and Arduino code are presented to control motor speed and direction using pulse-width modulation signals. Thermal management and testing results are also discussed. The goal is to design a functional electric wheelchair that meets standards and user needs through optimized mechanical and electrical solutions.
This document provides an introduction and reference to Tkinter, a Python GUI toolkit. It begins with introductory examples and explanations of Tkinter classes and widgets. The remainder of the document consists of reference sections for each Tkinter widget and geometry manager, describing when to use them, common patterns, available methods and options.
This document provides an overview of an existing cafeteria management system and proposes developing a new automated system. It describes the existing manual system and issues like time consumption, redundancy, and lack of accurate reporting. The objectives of the new system are to minimize work complexity, reduce time waste, automate ticketing with barcodes, control student access, and manage food distribution. Data will be collected through interviews and observations. The new system will be developed using Java, Bootstrap, MySQL database on a XAMPP server. It will address current problems and improve the management of cafeteria services at Haramaya University.
here is the link to our facility drawings
-----------------------------------------------------------
https://j.top4top.net/p_1231pbwk81.jpg
These entities now align themselves into cooperatives, organizations, associations, and ultimately synthesized supply chains, to remain competitive by bringing the customer into the process. The subject of facilities planning has been a popular topic for many years. In spite of its long heritage, it is one of the most popular subjects of current publications, conferences.
In this text, we employ a practical Project to facilities planning, taking advantage of the content we have in this semester. It should be noted that facilities planning, as known the facility planning starts with the selection of location. The location for our factory will be in burg El-Arab. To enables us from working efficiently without affecting any neighboring humans.
Our selected product is the C-clamp which is generally used in fixing work pieces to tables in order to apply a process on it. In this report we cover the whole project. Starting from the product and its drawings, parts, dimensions and processes applied on each part which will enables us from knowing the machines required and their numbers with of course the employees’ number.
Then we go to the annual demand and scrap estimation for each process in order to know the required amount of raw material for each part. After knowing all that now we are ready to calculate the production area required and also put a lay out for the facility. Then we go to the design phase, which contains the selection of an appropriate design for the following areas:
a. Production Area:
i. List of departments in production area (manufacturing & non-manufacturing such as offices, quality, packaging, assembly,…etc. “if exists”)
ii. State name of layout for your production area & justify your selection
iii. Schematic drawing showing flow of material from stores to warehouse (show flow of each component)
iv. Draw the production area (show name of departments and machines + flow between machines + entrance and exit)
v. Calculate the required production area (show calculations)
b. Personnel Requirement Areas:
i. Parking area (draw layout, calculate the required area)
ii. Food service area (draw layout, calculate the required area)
iii. Other areas (locker room, rest room, health service, office building… etc.) “draw layout, calculate the required area” OPTIONAL (For Extra Marks)
c. Determine the material handling equipment used, justify your selection, show where it is stationed in the facility, and what it is used to transport “specific not general information”.
Here are the use case descriptions with activity and swimlane diagrams for the "Play" use case:
Use Case Description:
This use case allows the player to start playing the game. They can either start a new game or resume a previously saved game.
Basic Flow:
1. Player selects "Play" from the main menu
2. System displays option to start new game or resume saved game
3. Player selects "New Game" or "Resume Game"
4. If new game selected, system loads level 1
5. If resume selected, system loads last saved game state
Swimlane Diagram:
Player System
| |
|--> Select "Play" |
This document provides an overview of various types of food and beverage services. It discusses table service, which involves guests entering a dining area, being seated, and placing orders with a waiter. It also covers assisted service, self service, single point service, and special service. The document describes different outlets for food and beverage services as well as operations, analysis and decision making, menu preparation, beverages, equipment, and hygiene and safety considerations. It provides a comprehensive look at the various aspects of planning and delivering food and beverage services.
Orion instruments magnetic level gauge & instrument selection guideMiller Energy, Inc.
Industrial process control employs measuring devices for determining the level of fluids in containers. This comprehensive guide to magnetic level gauges, switches, transmitters, and related products delivers an understandable and clear description of the technology and principals of operation behind magnetic level gauges and instruments. The guide also assists the reader in properly specifying and selecting the best instrument configuration for an application.
ToolBook is an application development tool used to create interactive software applications. It provides features for building a navigable structure of pages, adding objects like text, images, buttons and fields, and programming behaviors through a visual actions editor or scripting language. The user interface includes palettes for adding objects, properties panels for configuring objects, and tools for laying out pages and organizing the application. Actions can be used to add interactivity like responding to user input. Resources allow importing common assets like images to be shared across objects.
This document provides details on the design of an electric wheelchair, including mechanical components, electrical systems, and control algorithms. It describes the selection of a seat, wheels, motors, batteries, and other core mechanical elements. The electrical systems include a joystick controller, microcontroller, drive circuits, and regenerative braking. Algorithms and Arduino code are presented to control motor speed and direction using pulse-width modulation signals. Thermal management and testing results are also discussed. The goal is to design a functional electric wheelchair that meets standards and user needs through optimized mechanical and electrical solutions.
This document provides an introduction and reference to Tkinter, a Python GUI toolkit. It begins with introductory examples and explanations of Tkinter classes and widgets. The remainder of the document consists of reference sections for each Tkinter widget and geometry manager, describing when to use them, common patterns, available methods and options.
Muhammad Umair Zulfiqar - Agribusiness Management - Business Administration - BBA (Agri-business) double Hons - 2nd Batch (2015) at Sapphire Textile Mills Ltd.
UAF Ag # : 2015-ag-5798
Siba CMS id: 163-15-0039
The University of Agriculture Faisalabad and Sukkur IBA University
This document contains Sri Aurobindo's reflections on his own life and spiritual path in response to requests from his biographers. It is divided into nine sections.
Sri Aurobindo provides autobiographical details about his early life in England and India, his political career as a leader of Indian nationalism from 1906-1910, and his gradual turning toward spiritual pursuits. He clarifies misconceptions in press reports and discusses the beginnings of his yoga practice, distinguishing his path from other spiritual paths.
Sri Aurobindo also reflects on his role as a spiritual teacher and guide to disciples, his poetry and literary criticism, reminiscences from his life, and messages on contemporary events. The
The document appears to be a table of contents for an instruction manual on using Microsoft Word. It lists 68 sections with headings like "On the Insert tab" and "To change". The sections provide information about and instructions for various formatting and insertion tools available on the Insert tab of the Word user interface.
This document is the table of contents for a Calculus II textbook. It outlines the chapters and topics that will be covered, including integration techniques, applications of integrals, parametric equations, polar coordinates, sequences and series, vectors, and three dimensional space. The document provides a high-level overview of the essential concepts and methods that will be discussed in the Calculus II course.
Doctrine ORM for PHP is an object-relational mapper (ORM) for PHP applications. It provides transparent persistence for PHP objects and works with many databases including MySQL, PostgreSQL, and SQLite. The guide covers installing and configuring Doctrine, defining models and relationships, querying data with DQL, and additional features like validation, inheritance, behaviors and searching.
This document discusses implicit memory in Alzheimer's disease. It begins with an introduction that outlines different types of memory and common memory tests. It then reviews literature on implicit memory and Alzheimer's disease. The main sections analyze the results of a meta-analysis looking at factors that influence implicit memory priming effects in Alzheimer's patients. These factors include sample size, age differences, dementia severity, number of stimulus exposures, and orienting tasks. The document concludes by describing an experiment that tested young-old controls and age-matched Alzheimer's patients on stem-completion and cued-recall tasks to further explore implicit memory in healthy aging and Alzheimer's disease.
Man, marriage and machine – adventures in artificial adviceAsheesh Goja
‘Expert Systems’ is one of the most commercially successful application of Artificial Intelligence. This article describes how to develop an expert system based artificial advisor, using a backward reasoning algorithm.
This document proposes constructing the European Extremely Large Telescope (E-ELT) over 11 years at a cost of 1,083 million euros. The E-ELT will be a 39.3-meter segmented optical telescope located on Cerro Armazones in Chile. It will have an adaptive optics system to correct for atmospheric disturbances. The proposal includes plans for instruments, infrastructure extensions, and an operations plan to ensure the telescope is utilized for cutting-edge science upon completion. The E-ELT aims to answer fundamental questions in astrophysics such as detecting Earth-like exoplanets, testing physics in extreme environments, understanding black holes and their role in galaxy formation, and illuminating star and galaxy evolution throughout cosmic history.
This document provides an overview of the Microsoft Windows XP Registry and how it can be used and managed. It discusses the structure and organization of the registry, tools for editing and managing the registry like Registry Editor, backing up the registry, customizing Windows XP settings by modifying the registry, deploying registry-based group policies, managing registry security, finding registry settings, scripting registry changes, deploying user profiles, using Windows Installer and answer files to deploy applications, cloning disks using Sysprep, deploying Microsoft Office user settings, and working around common IT problems. The document is divided into multiple parts covering registry overview, management, deployment, and appendices. It provides technical details and step-by-step instructions for advanced registry
This document provides an introduction to biomass resources and pyrolysis. It discusses the types of biomass resources including agricultural crop residues, energy plantations, and municipal/industrial wastes. It then discusses the status of biomass energy, focusing on advancements in technologies, its use in developing Asian countries including India, and the biomass resources available in India. The document also introduces pyrolysis, describing the different types (slow, fast, flash etc.), reactor designs used for fast pyrolysis, and how pyrolysis vapors are recovered to produce bio-oil.
This document provides an overview of tools and techniques for iOS reverse engineering. It discusses prerequisites for iOS reverse engineering like jailbreaking. It also describes the process of iOS reverse engineering including system analysis and code analysis. The document outlines various tools for iOS reverse engineering on OSX and the jailbroken iOS device itself including class-dump, Theos, IDA, Cycript and LLDB. It provides examples of using these tools and reversing iOS apps and system libraries.
The user guide provides instructions for setting up and using the LG Stylo 2 phone. It describes phone parts like the touchscreen and buttons. It explains how to insert and charge the battery, install a SIM and microSD card, and complete initial setup. The guide also covers basic phone use and settings, as well as how to make calls, send messages, manage contacts and accounts, use apps and cameras, connect to Wi-Fi, and update the phone's software.
The questions of alignment, integration, inter-operation, continual improvement and service quality of information and communications technology program and projects have caused interest in using this thinking and modeling framework called enterprise architecture. The participated and structured elicitation, visualization, analysis and agreement of the enterprise models called - intention, business, information, technology and security - are basic to doing enterprise architecture. Here is an open template to aid the thinking and visualization activities in composing the enterprise architecture of an organization and government agency..
This document is a thesis exploring how modern musical technologies can be applied to enhance compositions of Chinese traditional music. It discusses international and domestic research in electronic music, defines electronic music, and analyzes the musical functions and aesthetic features of sound technology in electroacoustic composition. It then examines features of contemporary Chinese electronic music composition, and how sound technology can reflect the aesthetics of Chinese cultural elements. The thesis also includes a comprehensive analysis of a work titled "The Samsara of Seasons" that integrates modern music technologies and traditional Chinese music performance.
This document discusses women's empowerment in India. It provides context on the patriarchal structure that governs communities and hinders women's rights. While policies exist, there are gaps in implementation at the local level. Rural women face greater inequality in health, education, decision-making and economic opportunities compared to urban women. Factors like caste, class, education and age further impact women's empowerment. Government initiatives aim to promote women's rights, but face challenges of corruption and lack of resources. Overall, empowering women requires addressing discrimination and the social constructs that restrict women's access, choices and status in society.
The document describes two trails at the University of Limerick campus: the Art Trail and the Flora and Fauna Trail. It provides an overview of the trails and notes that a mobile application will be developed to guide users along the trails, identifying points of interest and providing information. The application will allow users to view the trails on maps, like and share content, and access location services to find their position on the trails.
Send money module
Receive money module
Withdraw module
Balance enquiry
2.7 Specific Problem Analysis
The specific problem analysis was done to understand the existing system and to identify
the problems in the current system. The analysis was done by observing the existing
system, interacting with the users and taking their feedback. The key problems identified
were:
- Lack of mobility
- Dependency on computer systems
- Network connectivity issues
- Resource problems like electricity
- High transaction costs
- Delay in transaction processing
- Lack of security and privacy
- Limited coverage and reach
To address these problems, the following goals were defined for the new proposed system:
Lauren A Nash Social Media Marketing Final ProjectLauren A Nash
The four-month social media marketing class was a crash course in all things social media. We learned how to market your personal brand. From Search Engine Optimization to strategy to blogging. we did it all. The final report was a comprehensive write up of all the things we completed during the semester.
We set up accounts across 13 platforms, including:
-WordPress
-LinkedIn
-Twitter
-Facebook
-Instagram
-Pinterest
-Gravatar
-Google+
-YouTube
-Gmail
-Google Alerts
“IMS” is the name given for Internship Management System. The system provides technical way of requesting internship. It’s made for students who have to take the internship period, also for those who are expected to be accepted by companies for internships and will continue their study in the college after completing the internship in the same time, it made for the college internship coordinator to check and to approve the requests and c omplete the process of internship by generate reports. The project explains the phases will lead to develop the system from the beginning of collecting the requirements that needs to be analyzed, designed and implemented. The purpose of doing this project is to improve in overall internship facilities to users as well as college management. This the project report
CES chandigarh is the best gate coaching institute in Chandigarh , which provides result oriented excellent coaching for Gate/IES/PSUs exams by experienced erudite faculty members. Here we share notifications for GATE 2015-2016, check out and crack your GATE/IES/PSUs exams easily.
Muhammad Umair Zulfiqar - Agribusiness Management - Business Administration - BBA (Agri-business) double Hons - 2nd Batch (2015) at Sapphire Textile Mills Ltd.
UAF Ag # : 2015-ag-5798
Siba CMS id: 163-15-0039
The University of Agriculture Faisalabad and Sukkur IBA University
This document contains Sri Aurobindo's reflections on his own life and spiritual path in response to requests from his biographers. It is divided into nine sections.
Sri Aurobindo provides autobiographical details about his early life in England and India, his political career as a leader of Indian nationalism from 1906-1910, and his gradual turning toward spiritual pursuits. He clarifies misconceptions in press reports and discusses the beginnings of his yoga practice, distinguishing his path from other spiritual paths.
Sri Aurobindo also reflects on his role as a spiritual teacher and guide to disciples, his poetry and literary criticism, reminiscences from his life, and messages on contemporary events. The
The document appears to be a table of contents for an instruction manual on using Microsoft Word. It lists 68 sections with headings like "On the Insert tab" and "To change". The sections provide information about and instructions for various formatting and insertion tools available on the Insert tab of the Word user interface.
This document is the table of contents for a Calculus II textbook. It outlines the chapters and topics that will be covered, including integration techniques, applications of integrals, parametric equations, polar coordinates, sequences and series, vectors, and three dimensional space. The document provides a high-level overview of the essential concepts and methods that will be discussed in the Calculus II course.
Doctrine ORM for PHP is an object-relational mapper (ORM) for PHP applications. It provides transparent persistence for PHP objects and works with many databases including MySQL, PostgreSQL, and SQLite. The guide covers installing and configuring Doctrine, defining models and relationships, querying data with DQL, and additional features like validation, inheritance, behaviors and searching.
This document discusses implicit memory in Alzheimer's disease. It begins with an introduction that outlines different types of memory and common memory tests. It then reviews literature on implicit memory and Alzheimer's disease. The main sections analyze the results of a meta-analysis looking at factors that influence implicit memory priming effects in Alzheimer's patients. These factors include sample size, age differences, dementia severity, number of stimulus exposures, and orienting tasks. The document concludes by describing an experiment that tested young-old controls and age-matched Alzheimer's patients on stem-completion and cued-recall tasks to further explore implicit memory in healthy aging and Alzheimer's disease.
Man, marriage and machine – adventures in artificial adviceAsheesh Goja
‘Expert Systems’ is one of the most commercially successful application of Artificial Intelligence. This article describes how to develop an expert system based artificial advisor, using a backward reasoning algorithm.
This document proposes constructing the European Extremely Large Telescope (E-ELT) over 11 years at a cost of 1,083 million euros. The E-ELT will be a 39.3-meter segmented optical telescope located on Cerro Armazones in Chile. It will have an adaptive optics system to correct for atmospheric disturbances. The proposal includes plans for instruments, infrastructure extensions, and an operations plan to ensure the telescope is utilized for cutting-edge science upon completion. The E-ELT aims to answer fundamental questions in astrophysics such as detecting Earth-like exoplanets, testing physics in extreme environments, understanding black holes and their role in galaxy formation, and illuminating star and galaxy evolution throughout cosmic history.
This document provides an overview of the Microsoft Windows XP Registry and how it can be used and managed. It discusses the structure and organization of the registry, tools for editing and managing the registry like Registry Editor, backing up the registry, customizing Windows XP settings by modifying the registry, deploying registry-based group policies, managing registry security, finding registry settings, scripting registry changes, deploying user profiles, using Windows Installer and answer files to deploy applications, cloning disks using Sysprep, deploying Microsoft Office user settings, and working around common IT problems. The document is divided into multiple parts covering registry overview, management, deployment, and appendices. It provides technical details and step-by-step instructions for advanced registry
This document provides an introduction to biomass resources and pyrolysis. It discusses the types of biomass resources including agricultural crop residues, energy plantations, and municipal/industrial wastes. It then discusses the status of biomass energy, focusing on advancements in technologies, its use in developing Asian countries including India, and the biomass resources available in India. The document also introduces pyrolysis, describing the different types (slow, fast, flash etc.), reactor designs used for fast pyrolysis, and how pyrolysis vapors are recovered to produce bio-oil.
This document provides an overview of tools and techniques for iOS reverse engineering. It discusses prerequisites for iOS reverse engineering like jailbreaking. It also describes the process of iOS reverse engineering including system analysis and code analysis. The document outlines various tools for iOS reverse engineering on OSX and the jailbroken iOS device itself including class-dump, Theos, IDA, Cycript and LLDB. It provides examples of using these tools and reversing iOS apps and system libraries.
The user guide provides instructions for setting up and using the LG Stylo 2 phone. It describes phone parts like the touchscreen and buttons. It explains how to insert and charge the battery, install a SIM and microSD card, and complete initial setup. The guide also covers basic phone use and settings, as well as how to make calls, send messages, manage contacts and accounts, use apps and cameras, connect to Wi-Fi, and update the phone's software.
The questions of alignment, integration, inter-operation, continual improvement and service quality of information and communications technology program and projects have caused interest in using this thinking and modeling framework called enterprise architecture. The participated and structured elicitation, visualization, analysis and agreement of the enterprise models called - intention, business, information, technology and security - are basic to doing enterprise architecture. Here is an open template to aid the thinking and visualization activities in composing the enterprise architecture of an organization and government agency..
This document is a thesis exploring how modern musical technologies can be applied to enhance compositions of Chinese traditional music. It discusses international and domestic research in electronic music, defines electronic music, and analyzes the musical functions and aesthetic features of sound technology in electroacoustic composition. It then examines features of contemporary Chinese electronic music composition, and how sound technology can reflect the aesthetics of Chinese cultural elements. The thesis also includes a comprehensive analysis of a work titled "The Samsara of Seasons" that integrates modern music technologies and traditional Chinese music performance.
This document discusses women's empowerment in India. It provides context on the patriarchal structure that governs communities and hinders women's rights. While policies exist, there are gaps in implementation at the local level. Rural women face greater inequality in health, education, decision-making and economic opportunities compared to urban women. Factors like caste, class, education and age further impact women's empowerment. Government initiatives aim to promote women's rights, but face challenges of corruption and lack of resources. Overall, empowering women requires addressing discrimination and the social constructs that restrict women's access, choices and status in society.
The document describes two trails at the University of Limerick campus: the Art Trail and the Flora and Fauna Trail. It provides an overview of the trails and notes that a mobile application will be developed to guide users along the trails, identifying points of interest and providing information. The application will allow users to view the trails on maps, like and share content, and access location services to find their position on the trails.
Send money module
Receive money module
Withdraw module
Balance enquiry
2.7 Specific Problem Analysis
The specific problem analysis was done to understand the existing system and to identify
the problems in the current system. The analysis was done by observing the existing
system, interacting with the users and taking their feedback. The key problems identified
were:
- Lack of mobility
- Dependency on computer systems
- Network connectivity issues
- Resource problems like electricity
- High transaction costs
- Delay in transaction processing
- Lack of security and privacy
- Limited coverage and reach
To address these problems, the following goals were defined for the new proposed system:
Lauren A Nash Social Media Marketing Final ProjectLauren A Nash
The four-month social media marketing class was a crash course in all things social media. We learned how to market your personal brand. From Search Engine Optimization to strategy to blogging. we did it all. The final report was a comprehensive write up of all the things we completed during the semester.
We set up accounts across 13 platforms, including:
-WordPress
-LinkedIn
-Twitter
-Facebook
-Instagram
-Pinterest
-Gravatar
-Google+
-YouTube
-Gmail
-Google Alerts
“IMS” is the name given for Internship Management System. The system provides technical way of requesting internship. It’s made for students who have to take the internship period, also for those who are expected to be accepted by companies for internships and will continue their study in the college after completing the internship in the same time, it made for the college internship coordinator to check and to approve the requests and c omplete the process of internship by generate reports. The project explains the phases will lead to develop the system from the beginning of collecting the requirements that needs to be analyzed, designed and implemented. The purpose of doing this project is to improve in overall internship facilities to users as well as college management. This the project report
CES chandigarh is the best gate coaching institute in Chandigarh , which provides result oriented excellent coaching for Gate/IES/PSUs exams by experienced erudite faculty members. Here we share notifications for GATE 2015-2016, check out and crack your GATE/IES/PSUs exams easily.
1. The document provides information about GATE 2015, including eligibility requirements, exam structure, syllabus details, important dates, and application process.
2. To be eligible for GATE 2015, candidates must have completed or be in their final year of a bachelor's degree in engineering/technology or a master's degree in science, with the year of graduation/expected graduation no later than 2015.
3. GATE 2015 will be conducted through online computer-based testing over five weekends in January and February 2015. The exam will contain both multiple-choice and numerical answer type questions. Results will be announced on March 12, 2015.
The document provides information about the Graduate Aptitude Test in Engineering (GATE) 2015 examination. Some key details include:
- GATE is a national level exam that tests candidates' understanding of undergraduate subjects in engineering, technology, architecture, and postgraduate subjects in science.
- The exam will be conducted online through computer-based testing on weekends between January 31st and February 14th, 2015.
- Candidates must apply online between September 1st and October 1st, 2014 and download admit cards from December 17th, 2014.
- The exam will contain both multiple choice and numerical answer type questions. Scoring and syllabus details are provided for each subject.
This document provides help for using the General Survey software. It covers topics like managing jobs, keying in data, performing COGO functions, measuring points, stakeout, instrument controls, coordinate systems, file transfer, and settings. The document provides explanations, procedures, and screen shots to help users navigate the software and utilize its features.
The document provides installation and setup instructions for the EZ-Steer 500 assisted steering system. It describes installing the motor, controller, GPS antenna and making connections. It also covers calibrating the system using the EZ-Steer Calibration Wizard to enter vehicle settings and calibrate settings. Finally, it discusses using the system and provides troubleshooting tips.
This research study examines the impact of organization justice on reducing conflicts between employees and improving job outcomes. It reviews literature on organizational justice, develops hypotheses about the relationships between justice, conflict, and job performance, and outlines the research methodology used including surveys of employees and statistical analysis. The goal is to provide practical implications for reducing conflicts in organizations and enhancing job satisfaction and outcomes through fair organizational policies and procedures.
This document provides information about the Graduate Aptitude Test in Engineering (GATE) 2015 examination, including eligibility requirements, exam structure and format, syllabi for different subjects, and post-exam processes like scoring and results. Key details include:
- GATE is an all-India exam that tests undergraduate subjects in engineering/technology/architecture and postgraduate subjects in science.
- The 2015 exam will be held in multiple cities across India on dates in February 2015. It consists of general aptitude questions plus subject-specific questions.
- Eligible candidates include final year students or alumni of bachelor's/master's programs in relevant fields. Twenty-nine subject papers will be offered.
- Application involves
This document analyzes data from 63 students to compare marks and CAT percentiles across different categories. It contains 3 tables that analyze: 1) Marks in high school, intermediate and graduation, finding graduation marks to be most consistent. 2) CAT percentiles by subject background, finding Arts & Humanities most consistent. 3) CAT percentiles by gender, finding females to be more consistent. The analysis uses measures like mean, median, mode, standard deviation and coefficient of variance to compare consistency across categories.
This document provides an overview of a project to design and build an electric drive system to replace the gas engine in a golf cart. It discusses market research on electric vehicle transmission patents. Concepts for the drive system include either fully enclosing all components or having separate enclosures. The selected final concept design is then detailed, including stress analyses and fabrication plans for prototypes. Subsystems like the electric motor mount, traction drive, transmission, axles, and data monitoring are specified. The project aims to develop a more efficient and quiet electric drive that fits standard golf carts and matches performance of gas engines.
Emergency Planning
Independent Study 235.b
December 2011
FEMA
TABLE OF CONTENTS
Emergency Planning Page i
Page
Course Overview ......................................................................................................................... 1
Unit 1: Course Introduction
Introduction ................................................................................................................................ 1.1
How To Take This Course ......................................................................................................... 1.1
Case Study: Why Plan? ............................................................................................................ 1.4
Course Goals ............................................................................................................................. 1.6
Goal Setting ............................................................................................................................... 1.6
Activity: Personal Learning Goals ............................................................................................. 1.7
Unit Summary ............................................................................................................................ 1.8
For More Information ................................................................................................................. 1.8
Unit 2: The Planning Process
Introduction and Unit Overview .................................................................................................. 2.1
Mandates: Incident Management and Coordination Systems .................................................. 2.1
The Emergency Planning Process ............................................................................................. 2.5
Who Should Be Involved? .......................................................................................................... 2.6
How To Get the Team Together .............................................................................................. 2.10
How Should the Team Operate? ............................................................................................. 2.11
Activity: Organizational Roles and Individual Skills ................................................................. 2.14
Unit Summary .......................................................................................................................... 2.15
Knowledge Check .................................................................................................................... 2.16
Unit 3: Threat Analysis
Introduction and Unit Overview .................................................................................................. 3.1
The Threat Analysis Process ..................................................................................................... 3.1
Step 1: Identifying Threats .................... ...
Emergency planning independent study 235.b ronak56
This document provides an overview and table of contents for an emergency planning course through FEMA's Independent Study Program. The course aims to train emergency management personnel in developing an effective emergency planning system and covers fundamentals of the emergency planning process including conducting threat analyses, developing basic plans and annexes, and implementing instructions. The table of contents outlines the seven units that make up the course, which cover topics like the planning process, threat analysis methodology, components of basic plans and annexes, and how to develop implementing instructions.
This document provides an abstract and table of contents for a report that includes an introduction, body, and conclusion section with citations. The introduction and body sections discuss the content of the report, while the conclusion summarizes the findings and the bibliography lists 5 cited sources, including websites for Misk Foundation and UNESCO that discuss partnerships between the two organizations for knowledge societies and youth social impact forums.
This document provides an overview of ALBPM Studio 6.0, including information on migrating projects from previous versions, the main components of the process designer like projects, processes, activities and transitions, and configuration options. It covers the user interface, preferences, project structure, process instances, variables, and audit event generation.
The Tellurium Automated Testing Framework (Tellurium) is a UI module-based automated testing framework for web applications and it is robust, expressive, flexible, and reusable. This is Tellurium 0.6.0 User Guide.
This document discusses electronic commerce (e-commerce). It begins with an introduction and statement of the problem and objectives. The main discussion covers definitions of electronic trading, e-business, and e-commerce, the history and development of e-commerce, categories of e-commerce, benefits of e-commerce, market opportunity analysis, and business models. It concludes with a summary of key points.
This document discusses database concepts and data warehousing. It begins with introductions to databases, database management, and database modeling. Relationship models and architectures are described. Data warehousing concepts are then introduced, including definitions of data warehousing, related terms, the history of data warehousing, benefits, design, concepts, architectures, and the relationship between data warehousing and decision support systems.
The document is a user manual for the Gemini Astronomical Positioning System, a computerized mount controller. It describes the physical components, operational features like setup options, control functions for tasks like alignment and movement, and databases for locating celestial objects. The manual provides instructions to help users efficiently operate the Gemini for visual observation and imaging sessions.
Similar to Virtual Classroom System for Women`s University in Africa (20)
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
5. 5 | P a g e
1.1 Introduction
The word virtual means a simulation of the real thing. A virtual classroom is a simulation of a real
world, traditional classroom. A virtual classroom gives students the ability to attend lectures
regardless of their geographical location with the aim of providing a learning experience that is
similar to that of a traditional classroom. When students go to college, they have a schedule for
lectures to attend, students must arrive on time, when the student gets into the lecture room, they
find a lecturer and other students, a whiteboard and a projector. In the same manner, a Virtual
Classroom has a time schedule which, to some extent can be flexible enough to fit into a student`s
schedule, the student is able to ask questions during the lecture on the chat forum, watch what the
lecturer is doing, ‘write’ tests and upload assignments on to the system. There are also breakaway
‘rooms’ where the students will be able to have small group discussions.
1.2 Background to Study
The purpose of the Virtual Classroom System is to bring together students and lecturers regardless
of distance, mobility impairments or the lack of a venue to carry out lectures. This system aims to
change the process of learning from the traditional top-down approach where students are mostly
passive during the lecture or will fail to attend a lecture either because of family commitments or
because they stay too far from the college for them to attend the lecture. The Virtual Classroom
will meet the needs of an exponentially growing population of students who cannot attend a
traditional classroom or who prefer not to attend at all because of reasons such as social status or
age. The learner is able to attend every lecture at their own time as all the lectures are recorded
into the system, are available for downloading and can be viewed from a smartphone.
All a student needs to participate in an online classroom is a computer or a smartphone, the internet
and the will to succeed in a contemporary classroom setting. One of the most amazing features of
online classrooms is that lessons conducted are not bound by time or location which allows for
accessibility to assignments and instructions from the lecturer at any time. Assignments are also
handed in online, marked, marks awarded and the assignment is given back to the student leaving
no room for missing assignments or missing coursework mark.
1.3 The Problem
i. Building Expenses: With the current money shortage in the country, building the
necessary infrastructure will take twice as much time to complete as compared with when
the country’s economic climate was favorable. At the same time lectures cannot be stopped
simply because there is no money to build infrastructure.
ii. Cost of hiring more lecturers: This cost is not only incurred by the university but even
the lecturers having to travel to Manresa for a morning lecture, Mount Pleasant for an
6. 6 | P a g e
afternoon lecture and to tel-one for an evening lecture. Lecturer gets to the evening lecture
fatigued and his will decrease their efficiency in delivering the lectures well.
iii. Mobility impaired people are disadvantaged: since the university does not have its own
campus as yet, there is no infrastructure catering for the disabled.
iv. Venue Clashes: Because of the limited infrastructure, most weekend classes are held at
tel-one and tel-one has a number of colleges using its facility.
v. Ineffective workgroups: An increase in students means people from differing
backgrounds come together and some might not want to be in groups because of various
reasons, the system will help eliminate that
1.4 Aim
The Virtual Classroom System aims to complement the efforts of teachers by integrating
technology into their classrooms and linking students from various geographical positions
regardless of any mobility impairments with their lecturers and with other students via the internet
in an educationally productive manner and provide them an enjoyable environment to study
without the hassle of travelling from one place to the other
1.5 Objectives
i. To give students access to lectures and any other activity involved in a classroom regardless
of location or physical disability or ability
ii. To provide all the necessities found in a physical classroom without the time and financial
constraints
iii. To give both students and lecturers access to coursework at any time
1.6 Solution to Approach
The software development process requires the involvement of different people with varying roles
and the case of the Virtual Classroom project; lecturers, students and university administration
staff will be involved in the development process. These people are not necessarily found in one
geographical space but can be found in various locations. There is large number of resources that
will be injected into the development process of this project and will require careful planning so
that no resources goes to waste.
It is for the above stated reasons that it is imperative to follow a well-known and universal
methodology which will generally define who will do what, when and how. The SDLC serves this
purpose. The Software Development Life Cycle is as an algorithm used when wanting to develop
a new system. There are various software design methodologies but the student has chosen this
life cycle in particular as it will allow developers to revisit previous steps if any problem such as
users changing their requirements arises. The SDLC steps to be followed are shown in the diagram
below:
7. 7 | P a g e
Problem
Identification
Feasibility
study
Analysis
Phase
Design
Implementati
on
Maintenance
8. 8 | P a g e
1.7 Novel Characteristic
The Virtual Classroom System offers a student the option of attending class at their own time and
the lecturer the option of pre-recording a lecture then post it even before it is time for the lecture.
1.8 Scope
To provide Women`s University in Africa lecturers and students with a platform to have and attend
lectures. Online tests can also be held on the system and to have private chats between a lecturer
and a student or between students. There is also an option for group chats.
1.9 Justification
The reason for creating this system is to provide an interface where the lecturer and student are
able to commune remotely. The lecture can still go on regardless of any limitations. If for example
a civil unrest like that of November 2017 occurs, lectures can still be held and attended in the
comfort and safety of people`s homes or offices.
1.10 Hardware tools
1. Smart phone with the following specifications:
i. Processor: 1.4GHz quad-core
ii. Ram: 1GB
iii. Operating system: Android 4 or a later version
iv. Storage: 16GB
For an iPhone;
v. Processor: 800 MHz dual-core
vi. RAM: 512MB
vii. Operating System: iOS 6.1.3
viii. Storage 16GB
2. A computer with the following specifications:
i. Processor/s:2.0 GHz
ii. System memory: 1 GB RAM
iii. Graphics memory: 256 MB
iv. USB ports for webcam and microphone (web cam is for the lecturer)
1.11 Software tools
1. Adobe Flash Player at version 11.x or higher
2. Operating system:
a. Windows XP, Vista or 7 and higher
b. Mac OSX 10.7 and higher
3. Browsers:
9. 9 | P a g e
a. Internet Explorer 7.0 and higher
b. Firefox 3.6 and higher
c. Safari 5.0 and higher
d. Google Chrome 3.5 and higher
1.12 Assumptions
The system will be used by students and lecturers that are computer literate
System will only work provided the phone, laptop and desktop has an internet connection
11. 11 | P a g e
2.1 Introduction
In the previous chapter the researcher sought to find out issues arising from the current system.
The location of the university campus, lack of infrastructure for the mobility impaired, personal
time limitations, issues to do with pride were an elderly student does not want to mix with the
younger students and also when a student in Victoria Falls wants to attend classes but does not
want to be a full time student. The scope of the project is limited to Women`s University. The
system is tailor made for students at WUA who need to balance families and jobs and this is seen
by the download option on the interface where the student can download the last lecture and any
assignments. This second chapter is the planning phase where we look at various feasibility studies
so we can conclude whether the system can truly be appreciated by the university, whether the
university has the technical, operational, economical and organizational capabilities to manage the
new system. The work schedule will specify how long the project will take to be completed.
2.2 Potential business value
2.1.1 Cost Benefit analysis of the project
Cost Benefit Analysis - Virtual Classroom
Project
Costs Year
0 1 2 3 4 5 6
Development costs $150
Operating costs $100 $110 $120 $130 $140 $150
Total costs $150 $100 $110 $120 $130 $140 $150
Discount factor (discount rate = 15% p.a) N/A N/A N/A N/A N/A N/A N/A
Present Value of costs $150 $100 $110 $120 $130 $140 $150
Cumulative costs $150 $200 $220 $240 $260 $280 $300
Benefits
Tangible benefits from new System $150 $160 $170 $180 $190 $200
Intangible benefits from new system $50 $55 $62 $67 $70 $71
Total benefits $200 $215 $232 $247 $260 $271
12. 12 | P a g e
Development costs are incurred only once and operating costs are assumed to increase by $10
every year as the college will be expanding and the number of faculties will be increasing. This
will mean more lecturers will be using the university`s internet connection.
2.1.2 Return on Investment
Here we are quantifying the profit or loss generated on an investment comparative to the amount
of money capitalized. In the case of Women`s University, we shall use this calculation to compare
the ROI after investing in the Virtual Classroom project.
The formula is:
ROI = (Net Profit / Cost of Investment) * 100
Cost of investment = $1,000
Profit after 2 years = $3,000
Subtract taxes and other expenses = $2, 400
Net Profit = $2,400
ROI = ($2,400 / $1,000) * 100
= 240
2.1.3 Feasibility Study
2.2.1 Technical
According to Rudy Flores a technical feasibility study is when we check if the required
technology to run the system is available or not, whether the required resources ae available
such as manpower – programmers, testers and debuggers and if the software and hardware is
available
All workstations must run on Windows 7 or later. This is because current browsers are only
compatible with windows 7 operating systems or later. The lecturer will need a camera and a
microphone to record the lecture. In the current system, the lecturer only needs to be present
in class without the need for any camera or mic with the exception of a projector during
presentations. In the new system, the lecturer or the student will upload their presentation and
play it during the lecture when it is required. The web browser should have flash player so that
that the student is able to play the videos of the lectures.
The system will be created by programmers from the university, the students and lecturers will
do the testing and the programmers will do the debugging. The software for creating the system
is readily available without any need to purchase it.
13. 13 | P a g e
2.2.2 Operational
According to the business dictionary, operational feasibility is mainly concerned with issues like
whether the system will be used if it is developed and implemented. Operational feasibility also
checks to see whether there will be resistance from users that will affect the possible application
benefits. Questions such as will management support the project and whether the users have been
involved in the making of the project as well as what will be done with the individuals that are not
tech-savvy.
After talking to management, the researcher found out that they will be excited to implement the
system as this will give off the impression that the university is modern and is moving on with
current technological trends. The students are most excited about this system as this will mean
they do not have to travel to Manresa for lectures, especially evening lectures. Students mentioned
that they will feel more encouraged to attend lectures online as they can do this from the comfort
of their homes, offices or even on a bus at their own time.
Those are not sure of their ability to use this system will need basic training and for the few that
do not own a smartphone, laptop or desktop will have to go to an internet café and download or
`attend` the lecture and go through or download the study material from the website.
Trainings will be done to all first year students so they are taught how to use the system and they
are given time to familiarize with it.
2.2.3 Economical
Sulaiman Malik defines economic feasibility as whether a business or a project is feasible cost
wise and logistically. Economists calculate economic feasibility by analyzing the costs and
revenues a business would incur by undertaking a certain project.
Looking at our virtual classroom system, the university will not incur much costs because most of
the material needed for the implementation of the system is readily available and there is no need
to find trainers for those that are not sure they will be able to use the systems as the university has
an information systems program which has lecturers that can train individuals how to use the
system
Cost Benefit Analysis
Investopedia defines a cost benefit analysis as being the process by which business decisions are
analyzed. These benefits are summed and the costs associated with taking that action are
subtracted.
2.2.4 Organizational
Anita Khezri defines Organizational feasibility as the analysis used to determine whether the
proposed system has sufficient management expertise, organizational competence and resources
to successfully launch this system. In this area the researcher mainly looked at management
prowess and resource sufficiency.
14. 14 | P a g e
The system to be implemented is nothing new as it functions almost similar to YouTube and most
people know very well how to use YouTube. The functionalities used here are common on most
websites and so management will not experience any difficulty in using this new system.
Resources needed are already in place and ones that are not yet in place such as mics and cameras
can easily be purchased or one can use the camera and mics on their laptop.
2.2.5 Schedule
Udara Seneviratne defines schedule feasibility as the likelihood of a project being completed
within its scheduled time frame.
The project was given 10 weeks to be completed and implemented. The stage that took a lot of
time was the feasibility study and waiting for people to return the questionnaires. But apart from
that, the project will be completed on time as coding and designing the software does not take
time.
2.2.6 Cultural
Cultural feasibility is defined as investigating scientific, ethical, behavioral and social issues. The
researcher checked to see if the new system will conflict with any cultural beliefs and if society
will appreciate this new form of learning as people are used to the old method of learning where
you needed to get into a physical classroom. What the researcher found out was that more than
90% of students have fully accepted this new form of learning and have stated that it is very
convenient.
2.2.7 Resource
Resource feasibility is checking if the university has enough resources to manage this new system.
Other resources required are cameras and microphones which the lecturers will supply on their
own.
15. 15 | P a g e
2.1.4 Work Schedule
Phase: Introduction January February March April May
Introduction
Problem
definition
Aim
Objectives
Solution to
approach
Novel
Characteristic
Scope
Justification
Hardware
and software
tools
Phase: Planning January February March April May
System
business
value
Feasibility
Study
Work
Schedule
Gantt
Chart
Activity
network
diagram
Phase: Analysis
Phase
January February March April May
Description
of current
system
Activity
diagram of
the system
Context
diagram and
DFD
16. 16 | P a g e
Weakness of
current
system
Evaluate
alternatives
Requirements
analysis
Phase: Design January February March April May
System
Design
Architectural
design
Physical
design
Database
design
Program
design
Interface
design
Phase:
Implementation January February March April May
Introduction
Coding
System
testing
Installation
System
conversion
Phase: Maintenance January February March April May
User manual
17. 17 | P a g e
2.3 Activity network diagram
For student registering and logging in
22. 22 | P a g e
3.1 Introduction
In the previous chapter, the researcher embarked on a planning phase where we looked at the
potential business value of the system and carried out a cost benefit analysis for the project. A
feasibility study was also done where we looked at the technical, operational and economical
capabilities of the system. The feasibility study showed that it is possible for the system to be
implemented and that it will be accepted by the university members of staff and the students. A
work schedule was also done where a Gantt chart was drawn to show the project timelines. Activity
network diagrams where also constructed showing all the activities that occur within the system
and the roles the various entities pay within the system. This chapter does an in depth analysis of
how the system works, takes a look at the process analysis, data analysis, weaknesses of the current
system, evaluates alternatives and look at non-functional requirements.
3.2 Information gathering methodologies
3.1.1 Questionnaires
The researcher decided it best to use electronic questionnaires because Women`s University
students are scattered all over and the researcher attends evening classes whereas most students
attend afternoon lectures which will make distributing questionnaires and following up on
responses a tedious and time consuming task.
Structured questionnaires were used to conduct the research because this type of questionnaires is
based on closed questions which produce data that can be analyzed quantitatively for patterns and
trends.
When the researcher was structuring these questionnaires, her aim was to find out if implementing
the virtual classroom would improve the way education is delivered at Women`s University.
The following link was sent out to all students:
https://docs.google.com/forms/d/e/1FAIpQLSc3adVAEtP8jVSV9Fg-PT3k-
Yy1soodZKVr9YZYRRy9z0ZO0Q/viewform?usp=sf_link
Another was sent out to all lecturers:
https://docs.google.com/forms/d/e/1FAIpQLSeZ3O1Cx0Tm5Z51E4-
rWTfTUJubU8hjmNdEKQyZXoreD4KwHw/viewform?usp=sf_link
Sample questionnaires and responses have been printed and attached to appendix 3
23. 23 | P a g e
3.1.2 Interviews
The researcher decided it best to use unstructured interviews because this will allow the
interviewing process sound less formal and more like a conversation. This will make the
interviewee feel comfortable and they will give out a lot of information. Students were told during
their lessons to prepare for the interviews and be ready to make mention of any suggestions for the
new system. This method of information gathering proved to be more successful compared to
questionnaires because questionnaires are structured and do not give room for suggestions. Some
students were indifferent as they pointed out that they are not really affected by travelling to
Manresa neither do they mind using the new system.
3.1.3 Desk research
The researcher visited quite a number of online learning websites to find out how they carry out
their lessons and the structure with which they do it. Desk research was also to find out reviews
by students of certain online classroom in order to find out what improvements to bring to the
WUA online classroom. What the researcher found was that most students require `break away`
rooms where they can have a discussion as small groups and some lecturers mentioned that the
system should be able to set in-class tests, mark them and calculate each student`s marks after
adding the assignment marks.
This method of information gathering made the researcher see other functionalities that need to be
added to the system to make it more efficient.
https://www.talentlms.com/
3.3 Analysis of existing system
The current system has minimal use of technology. Technology is only used when sending
assignments via email and making presentations. Students have to go to Manresa and some go to
tel-one center for learning for lectures. If a student misses a lecture, they can only get notes from
their class mate but will completely miss the explanations the lecturer will have given during the
lecture and even a couple of exam tips. Another problem with getting second hand information is
that the one who wrote the notes writes according to their understanding which might make it
difficult for the other person to understand.
24. 24 | P a g e
3.4 Process analysis
As previously stated, the lecturer goes to class and carries out a lecture even if there are just 2
students. There is no way any students that have a missed a lecture will get the information they
will have missed out.
Below is a process analysis of the students` roles in the old system. As mentioned earlier, most
students learning at WUA have many other responsibilities and so every day they are faced with a
choice on whether to attend class or go attend to other pressing issues. When one attends to other
issues it automatically means they cannot attend the lecture and they have to miss out.
Working students that want to enroll at WUA and stay as far as Hwange cannot attend classes
which is the same with mobility impaired individuals. The new campus has got facilities for the
mobility impaired.
25. 25 | P a g e
3.5 Data Analysis
Looking at the diagrams above, it is clear how the current system caters for who are always
available and have time to spare. Those that want to enroll but stay far from Harare will either have
to relocate to Harare which will be an expense or they will have to enroll with UNISA which is
expensive as well or they are forced to shelve the idea of going back to school. This is especially
true for masters students.
3.6 Weaknesses of the current system
Does not cater for the mobility impaired lecturers and students as the new premises does
not have any ramps as yet.
It is not cost effective especially to students that stay as far as Chitungiwza or Kuwadzana
Poses a safety risk on those who do not own private vehicles to commute back home after
evening lectures.
A venue to have lectures is never guaranteed
There is no way for a student to attend a missed lecture
If student misses a lecture when they were supposed to hand in an assignment to the
lecturer, it becomes difficult to look for the lecturer so that they hand in their assignment.
26. 26 | P a g e
3.7 Evaluating alternatives
Outsourcing
Reasons for not outsourcing include the following:
The threat of exposing sensitive information
System will not be tailor made for the university
Loss of managerial Control
o The chief purpose of the company outsourced to is to make profit. This means they
share different values, mission, standards and passion with the university.
Hidden costs that might not have been clearly mentioned in the contract
Improving the current system
Reasons for not improving the current system are:
The need to improve service delivery by implementing current technological trends.
So that the university does not lag behind in the context of technology
To attract a younger crowd that
To encourage people to attend lectures in their numbers
Developing a new system
The system will be tailor made for WUA
No risk of divulging sensitive information to outsiders
Developing a new system will enable us to see places in the old system where we can
improve service delivery or some processes that can be eliminated.
Creating a new system will allow for improved and consistent service provision.
Having a new system in place will help the college find areas where we can integrate with
new potential business partners
3.1.4 Requirements analysis
Use case diagrams show different objects within a system as actors. This system has the following
actors and their roles:
*Admin
Formulate exam and lecture time table
Post exam results
Allocates lecture venue
*Lecturer
27. 27 | P a g e
Formulate assignments, tests and exams
Invigilate and mark exams
Grades exams
*Class-Representative
Passes instructions from lecturer to students
Finds out if designated venue is available and reports to lecturer and students
*Student
Receiving instructions from class-rep and from lecturer
Writing tests and assignments and handing in
Checking for marks and results
Diagram 2: use case of the current system
28. 28 | P a g e
Diagram 3: use case of the proposed system
3.1.5 Non-Functional Requirements
Exceptional Performance
The system must function in a uniform way despite the Operating System environment. Time taken
to upload and download files, publishing multimedia presentations and time taken to load any of
these functionalities should always be minimum.
Safety Requirements
The system does pose any form of security threat to either the university, lecturers or students.
Security Requirements
Security of data is not a big issue as the system is well validated.
Portability
The software can be used on various platforms and this made possible because PHP is the language
used when programming the system
29. 29 | P a g e
User training
The developers assume that users already have a basic knowledge of how to use similar
applications. If not then they will undergo training.
Testability.
The software needs to be able to undergo various testing and prove its usefulness.
System should be user friendly.
The user interface should be pleasant to look at
Must not be complicated to get accustomed to
System must not have too many processes
31. 31 | P a g e
4.1 Introduction
Chapter four takes an in-depth look at the system architecture. Unified Modelling Language
diagrams are used to describe exactly what happens in the system’s background. The objective of
this chapter is to make the user of the system understand how information flows through the system
by using a use case diagram which will show entities within the system as actors and their roles.
Entity Relationship diagram is used to show different entities and their attributes and how they
will relate to each other in the database.
4.2 System Design
This will be a web based application which will also have a mobile application which will provide
all the necessary information without the need of a laptop. For android studio, the database to be
used is SQLite and for the desktop version MySQL. The system will be used by students, lecturers
and the university administrator.
The system has the following modules:
User registration module
This module keeps track of all student information including the student`s ID, password, contact
information (email addresses, phone numbers and physical addresses). All this information is kept
in the student database.
Course registration module
This module allows the student to search for courses and here they will be able to view a short
summary of the courses. The catalog includes short descriptions of courses and possible career
opportunities.
Assignment module
This application allows students to upload written assignments to the course lecturer. It also allows
lecturer to grade assignments and publish the result to each student`s account respectively.
Chat module
This module is used for real-time chat sessions which is a very efficient way to conduct discussions
on certain topics. Every student gets a notification on their phone when a chat is ongoing.
Lectures module
This is where the lecturer conducts all real-time lectures.
Resources module
This is where the lecturer uploads all material necessary for the lecture such as assignments or
short notes.
32. 32 | P a g e
4.3Architectural Design
An architectural design diagram shows the way information flow through the system.
The diagram below shows the layers within the project
33. 33 | P a g e
The diagram below is an architectural design of how data moves from the lecturers to the students
and vice versa.
34. 34 | P a g e
4.4 Physical Design
This is a map showing all the hardware within the system and how they interact over the internet.
This diagram will also show all the network hardware to be used in the system.
35. 35 | P a g e
4.5 Database Design
A MySQL relational database will be used in this project. MySQL is an open source and free-to-
use database that facilitates effective management of databases by connecting them to the software,
in this case, the virtual classroom system. It is a stable, reliable and powerful solution which has
advanced features such as data security, on demand scalability, high performance, round the clock
uptime and complete workflow control just to mention a few.
The media files will not be stored in the database but there will be a column for links to the
specified media file.
ER Diagrams for the Virtual Classroom has the following entities;
Course
Database
Admin
Department
Lecturer
Student
Lecture
40. 40 | P a g e
5.1 Introduction
In the previous chapter, the researcher took an in depth look at the design of the system. The
researcher looked at various modes of design such as system, architectural, physical, database,
program and interface. All this was to get a deeper understanding of how this system works in
terms of how data flows through the system and how the different entities within the system
interact. System design looks at the various modules within a system. Architectural design looks
at how information flows through the system. Database design looks at how information will be
stored in the database, program design loos at the pseudo-code and interface design takes a look
at how the interface was appropriately designed to suit its purpose.
This chapter looks at how to put the design phase into action by using various modes of testing:
unit, black box, white box and module testing. In addition to that, we shall also look at user training
and the various conversion methods, the various changeover strategies pointing out which one is
most favorable for this system.
5.2 Coding
The system will be developed using Java and Android SDK. For the back-end we used Navicat
Premium on the local or remote machine and SQLite on the mobile device. Tables found in the
database are the same as the ones mentioned in the database design section of chapter 4. Primary
and foreign keys were identified and implemented.
Video used in the system are stored in the database as links where a student will click they will
play the video using the link just like how the popular video sharing site YouTube works.
Java web spring framework was used in developing this system as it is an open source and
comprehensive infrastructure that supports the development of robust Java applications relatively
easy and in no time. This framework is also ideal in creating high performing, easily testable and
reusable code.
A model view controller pattern was used to separate the different segments of the system such
that changes can be applied to one segment without affecting the other.
The model is the data of the application and the logic defining how to change and access the data.
The system view and the controller always check with the model for its current state. The view
and controller are either checking if data in the model has changed or not. Communication with
the Model and the View and Controller goes in this way:
41. 41 | P a g e
Provide with data
Provide with data Inform of any data
Changes
Inform of any data changes
Get data
Check data status
Figure 5.2.1: MVC interaction
Code of the Model for object Lecturer;
/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package model;
/**
*
* @author tariro
*/
public class BeanLecturer {
private int id, fk_title;
private String ec_number,email, last_name, first_name,other_names, gender, dob,
date_created;
/**
Model
View Controller
42. 42 | P a g e
* @return the id
*/
public int getId() {
return id;
}
/**
* @param id the id to set
*/
public void setId(int id) {
this.id = id;
}
/**
* @return the fk_title
*/
public int getFk_title() {
return fk_title;
}
/**
* @param fk_title the fk_title to set
*/
public void setFk_title(int fk_title) {
this.fk_title = fk_title;
}
/**
* @return the ec_number
43. 43 | P a g e
*/
public String getEc_number() {
return ec_number;
}
/**
* @param ec_number the ec_number to set
*/
public void setEc_number(String ec_number) {
this.ec_number = ec_number;
}
/**
* @return the last_name
*/
public String getLast_name() {
return last_name;
}
/**
* @param last_name the last_name to set
*/
public void setLast_name(String last_name) {
this.last_name = last_name;
}
/**
* @return the first_name
*/
44. 44 | P a g e
public String getFirst_name() {
return first_name;
}
/**
* @param first_name the first_name to set
*/
public void setFirst_name(String first_name) {
this.first_name = first_name;
}
/**
* @return the gender
*/
public String getGender() {
return gender;
}
/**
* @param gender the gender to set
*/
public void setGender(String gender) {
this.gender = gender;
}
/**
* @return the dob
*/
public String getDob() {
45. 45 | P a g e
return dob;
}
/**
* @param dob the dob to set
*/
public void setDob(String dob) {
this.dob = dob;
}
/**
* @return the date_created
*/
public String getDate_created() {
return date_created;
}
/**
* @param date_created the date_created to set
*/
public void setDate_created(String date_created) {
this.date_created = date_created;
}
/**
* @return the email
*/
public String getEmail() {
return email;
46. 46 | P a g e
}
/**
* @param email the email to set
*/
public void setEmail(String email) {
this.email = email;
}
/**
* @return the other_names
*/
public String getOther_names() {
return other_names;
}
/**
* @param other_names the other_names to set
*/
public void setOther_names(String other_names) {
this.other_names = other_names;
}
}
Figure 2 shows the user`s interaction with the system. This is where the Controller comes into
play. A controller waits for user input; clicking or moving the mouse and when the user presses
any key on the keyboard. The controller decodes the interaction and tells the model to update its
data and the view to change the data it is displaying.
47. 47 | P a g e
Update data
Update view
Figure 5.2.2: controller interacting with view and model
Code of the controller for object lecturer;
/*
* To change this license header, choose License Headers in Project Properties.
* To change this template file, choose Tools | Templates
* and open the template in the editor.
*/
package controllers;
import org.springframework.stereotype.Controller;
import org.springframework.web.bind.annotation.RequestMapping;
import org.springframework.web.bind.annotation.RequestMethod;
import config.IModel;
import config.IUrl;
import model.BeanLecturer;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.beans.factory.annotation.Qualifier;
import org.springframework.ui.Model;
import org.springframework.web.bind.annotation.ModelAttribute;
Model
View Controller
48. 48 | P a g e
import services.ServiceLecturer;
/**
*
* @author tariro
*/
@Controller
public class ControllerLecturer implements IUrl, IModel {
@Autowired
@Qualifier("ServiceLecturer")
private ServiceLecturer servicelecturer;
@RequestMapping(value = URL_LECTURERS, method = RequestMethod.GET)
public String showLectures(Model model) {
model.addAttribute("title", "Lecturers");
model.addAttribute("lecturer", new BeanLecturer());
model.addAttribute("lecturers", servicelecturer.getLecturers());
return MODEL_LECTURER;
}
@RequestMapping(value = URL_LECTURERS, method = RequestMethod.POST)
public String POSTshowLectures(Model model, @ModelAttribute("lecturer")
BeanLecturer l) {
boolean f = servicelecturer.addLecturer(l);
model.addAttribute("title", "Lecturers");
model.addAttribute("lecturer", new BeanLecturer());
model.addAttribute("lecturers", servicelecturer.getLecturers());
return MODEL_LECTURER;
}
49. 49 | P a g e
}
The view simply displays the data found in the model either in table form or in the form of a pie
chart. For this system, data is displayed in the form of tables. Where for instance lecturers have
been added to the system:
5.3 System Testing
This stage is done to validate and verify the system. In order to check if all the functionalities are
working according to plan, checking if the system is secure and satisfies all stated objectives.
Testing methodologies used here are Unit and Module testing.
5.3.1 Unit testing
This is when individual components of a software are tested with the aim of validating that each
unit of the software performs as it should. A unit is the smallest part of a system that can be tested
giving us a quantifiable result. A unit usually has a single or a number of inputs. Methods of unit
testing used here are Black box and white box testing
Black box testing
This is also called behavioral testing and it mainly focuses on checking the functionalities of
the system. That is the tester has got no idea on what is going on ‘behind the scenes’ all the
tester checks to see is if all the functionalities are working well. Black box testing checks to
see if there is any:
Incorrect or missing functions
Interface errors
Errors in database access
White box testing
The software developer carried out white box testing as this mode of testing is more efficient if it
is carried out by a person that knows the code and exactly what it is supposed to do. The first unit
to be tested was the login in form in which the code stated that a student when logging in should
match their student ID with their national ID:
50. 50 | P a g e
If the user enters the wrong information, the system will notify them to either enter the correct
password or to contact their administrator:
5.3.2 Module testing
51. 51 | P a g e
5.4 Installation
After all the testing is done, system implementation can then begin. The application will be
installed on android phones running on Android version 2.3 and later. The website can be accessed
via any browser running on any windows 7 machine. The new and old system will be used hand
in glove with the old system through the Phased Changeover method.
Event Start time Finish time
Installation 03/09/18 07/09/18
User orientation and
training
10/09/18 14/09/18
Table 5.4.1: new system installation
5.5 System Conversion
System conversion is a relatively easy process if the process is well documented and adequate
backup is done. There are various methods of file conversion. The right one to use is totally
dependent on the type of system to be implemented. When deciding which method to use, the
systems analyst must take into account user and organizational variables. Adequate planning and
scheduling of the conversion process and the strategic involvement of users will make the
conversion task less tedious and lessen the risk of losing important information.
5.5.1 Direct changeover
With this method, on a particular date, students and lecturers will stop using the old system. That
is they will stop travelling to Manresa for lectures and immediately attend lectures online. This
method can only be safe to use if extensive testing has been done and this information has been
communicated well to each and every student. However, direct changeover is risky in that it might
cause a disruption in lectures as people generally take time to get accustomed to the new system.
Form a change management perspective, direct changeover will not give system users enough time
to adjust to the new system which might lead a failure of the system before it has even proved its
usefulness.
5.5.2 Parallel Conversion
Parallel Conversion refers to running the old system and the new system simultaneously. When
the same results are realized over a stipulated period of time, then the old system can be dropped
and the University moves over to the new system. The greatest advantage of running both systems
52. 52 | P a g e
is that results obtained from using the old system can be checked against those obtained in the old
system. In the case of the Virtual Classroom, one quantifiable results can be checking students’
lecture attendance. The system has a module that checks a student’s attendance and quantifies it at
the end of the month to check their attendance and the lecturer can then compare with their register.
In other systems, users will have a disadvantage of doubling their workload but in the case of the
Virtual Classroom this is not a big issue because the lecturer will record a session in the same place
he is conducting his lecture.
5.5.3 Pilot Conversion
In this method, the new system is introduced to different environments. For example, with the
Virtual Classroom system, it can be implemented in Marondera to see how students there will react
and if they can adjust to using the new system. Another test site can be in Harare or in Bulawayo
where there are students of different ethnicities and social backgrounds so as to see if they
acclimatize to the system. This method will allow the systems analyst to see if the new system will
meet the needs of all students regardless of environment.
5.5.4 Phased Conversion (recommended by systems analyst)
This method replaces the old system stage by stage. It is similar to pilot testing the only difference
being that pilot method tests at one location then the new system is implemented to the whole
organizations. Phased method introduces the new system to one department at a time out of the
entire organization. In our case, the new system can be used in one program at time. For example,
the system can be introduced to Information Systems students only then if that is successful,
implementation will move on to the next degree program. This method is very user friendly as it
is easier to realize results of a smaller group than for the whole university. However using this
method will take a lot time but the benefits outweigh this single disadvantage.
5.5.5 Conversion plan (phased conversion)
Table 5.5.5.1: conversion plan
Timeline Event
Week 1 (10-14 September 2018) Introduce Information Systems second year
students to the new system and give necessary
training
Week 2 – Week 3 (17 – 28 September 2018) Students familiarizing and using the system
Week 4 (01 – 05 October 2018) Comparing results of old and new system and
solving any issues that will have arisen (bugs)
Week 5 (08 – 12 October 2018) Implementing system to the rest of the
university
53. 53 | P a g e
5.6 User training
User training will be held from the 10th to the 14th of September 2018. This will be the first week
of the last semester of the year. Students and lecturers will be fresh and eager to venture into this
new mode of learning. Also this will give the university ample time to inform IS students of the
upcoming changes to their mode of learning.
The system administrator will be the trainer. Lecturers are going to be trained separately form the
students and they will also be trained as bother the lecturer and the student this is so that they will
be able to assist the students when they encounter problems after the systems administrator has
trained them.
Lecturers will be trained on the following:
How to start and record a session
How to conduct a lecture
How to respond to questions
How to upload study material
Students will be trained on the following:
How to download a lecture
How to have a group chat
How to take a test
How to download study material
Administrator will be trained on the following:
How to manage system users
How to manage courses (adding and updating)
55. 55 | P a g e
6.1 Introduction
In chapter 5 we saw the system coming to life through the various modes of testing which also
proved the relevance of the system to the users and bringing to light any errors that might be within
the system before deployment. Chapter 5 also helped us see which conversion method will be best
for our system and the steps to installing the system. This final chapter looks at the best ways of
maintaining the Virtual Classroom system and the user manual. If a system is not well maintained,
it will prove costly to the owners, cause inconveniences and cause more harm than good to the
users of the system. In this case, a lot of students might miss out on their lectures or not take their
tests which will lead to having incomplete coursework. In this chapter we will look at the various
methods of system maintenance as it is common knowledge that the life of a system begins upon
its deployment and so maintenance is imperative
6.2 Perfective Maintenance
Perfective Maintenance refers to the change of system requirements and functionalities. As
lecturers and students become accustomed to the system they begin to see different ways of
expanding and improving the system and also adding new features to the system in order to make
the system more usable and relevant to the students and lecturers. These changes can in the long
run become future enhancements to the system. Perfective maintenance will bring about changes
that will include removing features and functionalities within the system that are not necessarily
functional and effective to the lecturers and students.
6.3 Adaptive Maintenance
Adaptive Maintenance is triggered by changes within the environment the software resides in. this
type of change can be triggered by changes happening in the world of technology and in the
education. A good system is one that changes and evolves even as the environment it is in is
changes. A good system is one that adapts to its environment without any challenges or causing
any inconveniences to the lecturers when they want to carry out a lecture or to the students when
they want to take the test, download or upload an assignment or attend a lecture. To make this
possible, the system has to be reviewed continuously with the system developers, lecturers and
students to make sure all system functionalities are in tandem with current technological trends so
as to ensure maximum system performance.
56. 56 | P a g e
6.4 Corrective Maintenance
Corrective maintenance is also referred to as bug fixing. Corrective maintenance targets errors and
faults within the Virtual Classroom system that might affect different areas of the system such as
the design, logic or the code. In most cases, these bugs or modifications to the system that are
realized by students and lecturers as users of the system and are stated in the user error reports.
When corrective maintenance is done, Regression Maintenance testing is carried out as a way of
confirming that no more errors are occurring.
6.5 Preventive Maintenance
This includes making the necessary modifications and adding updates in order to prevent future
problems the software might encounter. Problems which might not be significant at the current
moment but may cause serious problems in the future are addressed under preventive maintenance.
Preventive maintenance is focused on decreasing the deterioration and irrelevance of the Virtual
Classroom system in the long run. Streamlining, enhancing code and apprising system
documentation are some of the most important preventive maintenance methods. Preventive
maintenance ensures the unforeseen effects a software can have in the future are reduced as well
as helping the system become well established, accessible, logical and sustainable
6.6 User Manual
This user manual is designed for the students, lecturers and administrator.
6.6.1 Administrator
The role of the administrator in the system is to manage users and courses available in the virtual
classroom system. The administrator logs in using the root password:
After logging in, the administrator can then add more courses to the system. For instance, the
process of installation demands that the system be used by second year Information Students first
57. 57 | P a g e
then the rest of the university. The administrator adds all necessary modules into the system from
the menu bar of his account:
The administrator can change his password if he wills and delete a lecturer’s account in the event
that the lecturer does not work at the university anymore. When he is done he will simply log out.
The role of the administrator is also to show the course coordinator progress on various courses.
6.6.2 Lecturer
The main purpose of the lecturer is to conduct lectures and upload study material such as notes
and assignments. The lecturer’s username is their EC number and the password is their national
ID number:
58. 58 | P a g e
Below is the lecturer’s window showing where they can begin a lecture, record, upload study
material and assignments as well as downloading written assignments. The lecturer also uploads
questions into the question bank where the system will automatically set tests on specified days.
6.6.3 Student
The student’s function in the system is to attend lectures, download study material and assignments
to write and upload written assignments. The students also takes tests. In order for the student to
login they need to use their student id as their username and their national ID as their password
and everything must be in small letters. For example:
After the student has logged on, they are presented with this interface where they can select what
their next move is. Clicking on a particular button will take them to the task they want to carry out.
60. 60 | P a g e
References
S.Prasad,Virtual Classroom Network, accessed January 2018
http://www.freestudentprojects.com/studentprojectreport/projectreport/web-based-
project/virtual-classroom-network/
Mujibul Hasan Siddiqui, Virtual Classroom Learning for Higher Education: A Result of
Information Technology, accessed January 2018
http://www.irjcjournals.org/ijmssr/Feb2013/13.pdf
R. Kumar, S. Shahi, Virtual Classroom System,accessed January 2018
http://www.ijettjournal.org/volume-4/issue-4/IJETT-V4I4P344.pdf
https://www.slideshare.net/UdaraSeneviratne/scedule-feasibility
Kwak, Y.-H & lbbs, C.W (2000). Calculating project management`s return on investment. Project
Management Journal, 31(2), 38-47.
D.Patak, Software engineering: Pressman, accessed January 2018
https://mytestingexp.files.wordpress.com/2010/08/software-requirements-specification.pdf
http://softwaretestingfundamentals.com/unit-testing/
https://www.webopedia.com/TERM/W/White_Box_Testing.html