Wednesday, July 31, 2019

200 Million Girls: Female Infanticide in China and India Takes Many Lives Essay

It is a girl. The four deadliest words in Asia. In the past 5 decades 200 million girls went ‘missing’ in India and China. In Asia the horrible phenomenon female infanticide occurs on a large scale. According to M. P. , â€Å"Female infanticide is the intentional killing of baby girls due to the preference for male babies and from the low value associated with the birth of females†. Research shows that female infanticide happens all over the world, but especially in Asia. Girls are being aborted, killed or abandoned. China and India are the two most populous countries in the world where female infanticide is a very big issue. These two countries have similar but also different reasons for female infanticide and these reasons will not cease to exist soon. In 1978 China introduced the one-child policy. The Chinese population was growing too fast and already was enormous. The government introduced this policy to slow down the growth of the population of China. This encouraged female infanticide even more. Before the introduction of the one-child policy female infanticide already existed. According to Ansley J.  Coale and Judith Banister, a missionary (and naturalist) observer in China in the late nineteenth century who interviewed 40 women over age 50, who reported to have given birth to 183 sons and 175 daughters, of whom 126 sons but only 53 daughters survived to age 10. By their account, the women had destroyed 78 of their daughters. To Chinese families the son is the most important child. They believe that the son can work, carry the family name and look after elderly parents. Only after the desire of having a son or two has been met, do Chinese families prefer having a girl. The question that needs to be answered is whether this preference for sons is caused by culture or economics. According to Confucius there are some rituals that can only be performed by boys. But this is not the major reason for female infanticide. â€Å"The major factor is patrilocality, which refers to the firmly entrenched cultural norm for elderly parents to co-reside with their adult children, and for the son to have a woman â€Å"marry in† and assist him in this function. Patrilocality is an economic factor affecting almost every country that participates in sex-selective abortion. (Avraham Ebenstein) Due to the one-child policy and the son preference population, statistics suggest there are 118 boys born for every 100 girls. (Sherry Karabin) In India there is also an unbalanced sex ratio. In India female infanticide is also a big issue. India and China do have similarities as to why families prefer boys. To Indian families, the son is also the most important child. In India sons have long been prized over daughters. Sons preserve the family name and traditionally look after elderly parents. Daughters are often seen as an expensive burden. Parents are faced to pay a costly wedding dowry when they get married; this amount is equivalent to three years of earnings. If they have a daughter and do not have the money to pay the dowry they would also lose pride. Most interviewed Indian women have a similar reason of why they abort, kill or abandon their daughters. They rather abort, kill or abandon them than let them suffer. (Ashok Prasad) In China the groom will give the bride’s family betrothal gifts and a sum of money. In return the parents of the bride will deliver the bride’s dowry to the groom’s family. If one of the families cannot offer gift or the dowry, they would also lose pride. But for Chinese families this is not a reason for not having a girl. Not only poor families have a preference for boys but even educated middle class women face pressure to produce sons. Indian people feel that they will need a son for everything. Indian women call this â€Å"the son obsession†. Due to the son preference in India, population statistics suggest there are 940 girls per 1000 males in rural areas, whereas in urban areas there are 900 girls per 1000 males. Samar Halankar) Unfortunately this horrible phenomenon will not end soon. Both countries have a strong and long history, which means an old tradition. Their preferences for sons will not change soon. In both China and India the government tries to prevent female infanticide by taking certain measures. In China the government tries to ban sex-selective abortion but at the same time they declare that the care of old people is the task of the family and not the state. In India the government has banned dowries under the Dowry Prohibition Act of 1961; still few get married without the dowry. Female infanticide in India and China) Despite of this government interference, female infanticide has not stopped. Statistics show that over 200 million girls went ‘missing’ in the past fifty years. Research shows that the number of girls is still declining. (Ashok Prasad) Not only the government tries to stop this, also people who got aware of this fact are trying to stop female infanticide. In 2006 Rita Banerji founded The 50 Million Missing Campaign in order to raise awareness of the phenomenon in India. Although female infanticide has a long history, a lot of people over the world are not aware of this fact. In September 2012 a new documentary film It’s a girl will be released. This documentary film explores female infanticide in India and China. It tells the stories of abandoned girls, of brave mothers trying to save their daughters, of mothers who would kill for a son and women who suffer extreme violence. Global experts and grassroots activists put the stories in context and advocate different paths towards change, while collectively lamenting the lack of any truly effective action against this injustice. Marie Vlachova) To conclude, female infanticide in China and India is still a serious issue and will not end soon. In both countries the preference for sons has similar but also different reasons. This son preference will not change soon due to the old family tradition. They truly believe that sons can bring prosperity, continuity and valuable support and care. Which means that female infanticide will not end soon. Statistics support this fact by showing that the number of girls is still declining and will keep declining.

Tuesday, July 30, 2019

Why I Want a Wife

Weddings are often a time of celebration, especially for my family. This past summer, as we prepared for my sister Gini’s wedding, the festivities extended to good-natured teasing of the bride- and groom-to-be. For example, WITH knowing smiles, my parents–self-proclaimed experts on marriage courtesy of their own wedding almost thirty years ago–dispensed advice about everything, including how to improve her cooking skills beyond instant rice and grilled cheese. Gini’s typical responses included â€Å"That was a long time ago,† â€Å"Things are different now; times have changed,† and â€Å"Jason can do a lot of things for himself. † It was with particular delight that my family took to rubbing in one of Jason’s smoother moves. He waited until a few short weeks before the wedding to inform Gini that his Mom had always done his ironing for him, and now he expected Gini to take over that task—after all, he couldn’t wear wrinkled clothes to his new job, could he? Poking fun at the responsibilities involved in marriage is similar to the attitude presented in Judy Brady’s 1971 essay, â€Å"Why I Want a Wife. † In â€Å"Why I Want a Wife,† Brady offers hypothetical criteria for an ideal wife in a satirical commentary on how the work of wives is often taken for granted. The humor of the essay lies in its structure: on the surface it seems to accept the criteria it puts forth, while the meaning actually operates in the recognition that the narrator is being sarcastic. Using writing as one of her tools for activism, Judy (Syfers) Brady has established herself as a supporter of the women’s movement since she began more than thirty years ago. In â€Å"Why I Want a Wife,† she narrates a setting that mocks the situations and obligations wives find themselves immersed in. The narrator draws on her own experiences to present examples of how â€Å"good† wives are expected to behave. The satirical critique emerges as the narrator thinks through her reasons for wanting a wife. The language used has a satirical edge evident in both the author’s emphasis on certain modifiers (indicated by italics) and in the surface structure of the sentences, which belies the underlying criticisms. The audience should recognize the sarcasm from the language and attitude of the narrator. Now let's consider all the elements supporting her satirical point, beginning with the author's long history with this style of writing. Judy (Syfers) Brady has established herself as a supporter of the women’s movement, and critics point to this essay as typical of her career. â€Å"Throughout the article, [Brady] lists characteristics that she would like in a wife†¦She never comes out and says that the way that women are treated in family situations is wrong. She implies it by sarcastically creating her ideal wife. This technique works because it forces readers to realize it for themselves† writes Diego Vasquez on a webpage titled â€Å"A Rhetorical Critique of ‘Why I Want a Wife. â€Å"2 Vasquez’s analysis includes the supposition that the essay first appeared in pamphlet form, and suggests that Brady was a â€Å"†¦radical feminist writing for other radical feminists. † Vasquez also notes that Brady is reported to have said, â€Å"I am married, am a housewife, and have two female children; all three of those factors keep my anger alive,† and that â€Å"[Brady] t ried to persuade other housewives to take a step back and look at how they were being exploited. † Judy Syfers Brady, who was born in 1931 and later studied at the University of Iowa, now lives in San Francisco. In 1972, â€Å"Why I Want a Wife† appeared in the first issue of â€Å"Ms. â€Å"3 Although at that time, few critics expected the magazine to last4, almost twenty years later it (re-) featured â€Å"Why I Want a Wife. â€Å"5 Another decade later, almost thirty years after the essay first appeared in Ms. , Ms. Brady is still active in women’s movements. Her more recent work can be found in â€Å"Greenpeace Magazine†6 and in the â€Å"Women’s Review of Books. â€Å"7 Through all these works and critical commentary on it, we can see her personal focus on making a strong case for the feminist cause. Much as her personal life informs her recent article in the â€Å"Women’s Review of Books,† Judy Brady appears to have drawn on her own experiences when she wrote â€Å"Why I Want a Wife. † In the essay, the author/narrator drives home the amount and type of work expected of wives both by situating herself as involved in some it and by listing qualifications. In my reading, the setting of the over-worked housewife will take the form of the narrator both being such a wife and of describing such as wife through mimicry. To indicate this setting, I will use actions to reinforce the narrator’s words. For example, at the beginning, in the clause â€Å"while I was ironing,† the narrator slips in that she thought through her argument while engaged in domestic labor. When I read that line, I will direct a look at the audience that conveys just how thrilled I am to be pressing clothes. Which is to say, my look will suggest that yet again, while I was doing one of my many thankless jobs, I was thinking about that â€Å"poor† guy. A second way I intend to suggest the setting is to give the audience a withering look while I use my right hand to pick up and put away imaginary things as I read the lines â€Å"I want a wife who will keep my house clean. A wife who will pick up after my children, a wife who will pick up after me. I want a wife who will keep my clothes clean, ironed, mended, replaced when need be, and who will see to it that my personal things are kept in their proper place so that I can find what I need the minute I need it. Later, to show the perfect wife being the perfect hostess, I will offer up imaginary hors d’oeuvres with a graceful sweep of my hand when read the clause â€Å"I want a wife who takes care of the needs of my guests so that they feel comfortable, who makes sure that they have an ashtray, that they are passed the hors d’oeuvres, that they are offered a second helping of the food, that their wine glasses are replenished when necessary, that their coffee is served t o them as they like it. The gracefulness of the movement will hopefully reinforce the wife-seekers conception of feminine social skills in addition to suggesting and mimicking an actual setting where hors d’oeuvres are being offered. Also, to follow up that line and to show that the coffee is just right, I will bring up my right hand, holding my fingers folded down, except for my thumb and index finger, which will be touching at the imaginary point of perfection. This movement will signify the (anal) expectations about a wife’s responsibilities. In all these ways the author's relationship to the setting supports the point of the essay through a performance of the character's satirical tone. As a character, the narrator has chosen to view these (anal) expectations in a humorous, satirical light. To show this mark of a sharp mind and wit, I will read every line in light mockery. This sweet little wifey has a biting way of deftly masking her meaning in false agreement. The criticisms of the narrator aren’t malicious, but they are satirical, and I hope to project that satire in my reading. I imagine the narrator as someone with self-confidence and poise, dignified even in undignified circumstances, and I plan to portray that by standing upright, neither puffed with arrogance nor slumped with despair. That is how I will stand, too, when I read the brief paragraph on replacing the hypothetical wife (â€Å"If, by chance, I find another person more suitable as a wife than the wife I already have, I want the liberty to replace my present wife with another one. Naturally, I will expect a fresh new life; my wife will take the children and be solely responsible for them so that I am left free. â€Å") For that paragraph, I will assume the tone of a martyr, as if the wife-seeker is sacrificing him(/her)self for the well-being of the universe. Also, to show the narrator as parodying the self-centered concerns of a wife-seeker, I will gesture toward myself, occasionally laying my hand below the base of my throat, throughout my reading. This movement will direct attention to the self who is self-centered and will be a trifle melodramatic, as can be expected of someone who is over-acting to make fun of another person’s selfishness. And, to further express the overall satire of the essay, I will try to keep the hint of a smirk (a dubious, critical smirk-not a self-satisfied one) on my face. This smirk should put a sarcastic edge on my reading as the character considers all the benefits of having a wife which she would like to enjoy. Thinking about and sarcastically expounding on the thankless duties expected of â€Å"good† wives is how I envision the development of this piece’s â€Å"action. † I plan to show this action of â€Å"Thinking† in several ways. One way is to pretend as though I, the narrator, think some of my ideas are super, such as â€Å"I want a wife who is a good nurturant attendant to my children, who arranges for their schooling, makes sure that they have an adequate social life with their peers, takes them to the park, the zoo, etc. â€Å"). I will try to keep a fake, bland smile on my face to suggest how nice, easy, and convenient it must be to be able to rely on someone else for such tasks. Another way I will demonstrate the narrator’s thought processes will be to act as though some of my ideas have just occurred to me, including the somewhat random â€Å"I want a wife who will type my papers for me when I have written them. † I will pause before that line and try to look thoughtful before coming to the revelation that that would be quite handy. An additional way to indicate the narrator’s thinking will be to vocally (not verbally) suggest that some of my ideas are onerous duties I have long since grown tired of doing, such as â€Å"When I meet people at school that I like and want to entertain, I want a wife who will have the house clean, will prepare a special meal, serve it to me and my friends, and not interrupt when I talk about things that interest me and my friends. † I will adopt a haughty, superior tone to deliberately imitate how I have been told, in effect, to lower myself. Showing this process of reflecting on the expectations for wives will help to foster the sense of mockery the narrator employs throughout her satirical litany. This satire and sarcasm is evident in the language used even at the beginning of the piece, and I plan to play it up. For example, when I read the second line (â€Å"I am A Wife. â€Å"), I will say â€Å"I amm†Ã¢â‚¬â€œholding the â€Å"M† slightly longer than necessary for emphasis-before I punctuating â€Å"A Wife† with a demure smile to indicate the sublime pleasure I derive from the this, the most fulfilling of feminine roles. Also on â€Å"A Wife,† I will lower my voice to further emphasize the depth and fullness of my appreciation for my position. I plan this obviously exaggerated infusion of wife-dom with positive connotations to set up the satirical attitude toward â€Å"wife† in the rest of the piece. . Some other ways I plan to use the language of the essay to drive home the narrator’s voice is to take advantage of the author’s locations of emphasis. In two places, the author has italicized â€Å"my† when she writes â€Å"my physical needs† and â€Å"my sexual needs. In those two places I will particularly stress â€Å"my† to reflect the intensity of the selfishness being described, and I will gesture toward myself. The author has also italicized the â€Å"good† in â€Å"I want a wife who cooks the meals, a wife who is a good cook. † I will vocally stress the â€Å"good† and I will make an â€Å"Mmmm† face (quick raising of my eyebrows while smiling with my lips closed) to reflect the author’s intentional emphasis. These actions should help to make the satirical intention of the speaker clear to the audience. Making the sarcasm/satire of the narrator clear to the audience will be an essential part of my performance. To introduce the sarcasm in the opening, I will look over the audience’s heads, almost at an imaginary star that represents how dreamy my life as a wife is and how happy I am at my good fortune of being married when I read the lines â€Å"I belong to that classification of people known as wives. I am A Wife. And, not altogether incidentally, I am a mother. Of course, this dreamy look will be an act on behalf of the narrator, who is making fun of anyone who actually believes that that is the sum of how she feels. In the next paragraph, I will look at the audience as I brace them for my diatribe. I will be giving them a semi-serious look, with my eyebrows raised in a quizzical way, that matches the narrator’s dry tone. From this look, the audience should infer that the narrator actually judges her friend, or people like the friend, much harsher than the words bein g used would imply. Further into the essay, there is the paragraph about sexual needs (â€Å"I want a wife who is sensitive to my sexual needs, a wife who makes love passionately and eagerly when I feel like it, a wife who makes sure that I am satisfied. And, of course, I want a wife who will not demand sexual attention when I am not in the mood for it. I want a wife who assumes the complete responsibility for birth control, because I do not want more children. I want a wife who will remain sexually faithful to me so that I do not have to clutter up my intellectual life with jealousies. And I want a wife who understands that my sexual needs may entail more than strict adherence to monogamy. I must, after all, be able to relate to people as fully as possible. â€Å") When I begin that paragraph, I will give the audience a saucy, playful look. Then, I will look eager (chin and eyebrows raised, expectant smile) when I speak of making love eagerly, and I will look stubborn (eyebrows lowered, negative shake of my head) for when I am â€Å"not in the mood. † Although I will have maintained appropriate eye-contact throughout the reading, at the end, with the final sentence (â€Å"My God, who wouldn’t want a wife? ), I will pin the audience with a piercing look, looking them straight in the eye, as if to say, â€Å"Well, duh! ,† when the narrator’s true voice finally speaks. These actions should connect the audience directly to the progression of thought and satire as the speaker leads up to and makes her strong concluding statement. Judy Brady has strong opinions about what shouldn’t be automatically presumed as a wife’s obligations. Her opinion influenced her essay â€Å"Why I Want a Wife†, wherein she introduces the reader to an overworked housewife’s reasons for wanting a wife of her own. This housewife/narrator cleverly uses language to comment on the condition of wives by verbally condoning what she actually despises. Because the audience will be able to pick up on her sarcasm, they will understand her unsaid message. Although it might be possible to construe Brady’s essay as a bitter diatribe against the injustice of the way some wives are subordinated, I prefer to read this piece as the humorous product of a sharp wit, almost like Jonathan Swift’s â€Å"A Modest Proposal. Usually, when I read over this essay, a smirk finds its way to my face-the same kind of smirk I feel starting when I think back to the proud phone call my family received after my newlywed sister Gini succeeded in making meatloaf all by herself. Maybe Gini was right in those days before her wedding when she anticipated that things would be different for her and Jason, and that the two of them would share household responsibilities. They seem to be equally experiencing the hazards o f cooking. Recently, Gini told us about a kitchen disaster that involved them both. Ace-chef that she is, Gini failed to notice that some fresh-from-the-freezer sauerkraut was burning one of her (wedding gift) pans. Jason came to the rescue, though, convinced that he could save the day with his superior knowledge that only inorganic chemicals can clean up burned organic materials. And so, he set about â€Å"desperately† trying the salvage the pan using Gini's nail polish remover. It does my heart good to know that the two of them work so well together in the kitchen. Although now I am torn about what to get them for Christmas: new cookware? Who knows, maybe I'll get them a restaurant gift certificate.

Monday, July 29, 2019

Leadership of General George S. Patton Essay

The purpose of this research paper is to explore the different leadership styles that General George S. Patton Jr. used throughout his life, (November 11, 1885 until December 21, 1945). General Patton is often thought of as one of the most controversial generals in history. This paper will concentrate on events that happened in his life and how his determination, will and hard work helped him overcome and became a better leader. It is evident that in a review of the research General Patton was able to achieve many his success by determination and hard work to be the best in everything that he set his mind to accomplish. He was never happy, except when he was given the challenge of commanding men into battle. General Patton was a leader, a warrior and the most feared General by the Germans. General George S. Patton was a man who is often referred to as a great general, and leader of men who was equally just as controversial. His career in the Army was often a struggle for him to advance and receive the recognition that he deserved. This paper will cover the leadership styles of General Patton during the early, then during World War I. Next it will cover World War II and finally I will give my opinion on the subject. George S. Patton, who was sometime called Georgie, was an average child with the hopes and dreams of becoming a great military leader like his Grandfather, Great-Grandfather and many of his other relatives (Regan, 1960). He worked hard with his academic career to tried to get into West Point the United States Military Academy, but he was not accepted at first. Not deterred by this set back, he went to Virginia Military Institute (VMI) for a year (Reda, 2004). Even though he was going to VMI, he continued tirelessly to get accepted into West Point. Finally Patton was accepted into West Point, but he found it far more challenging then he imagined it would. The major reason that he had difficulty with the studies was because he was suffering from dyslexia, a disorder that caused everything to look backwards (Reda, 2004). Although faced with these difficulties, George never gave up, even when he was forced to repeat his plebe year, due to poor academic performance. However this failure to progress only strengthened his resolve and determination to better. In an effort of almost memorizing everything from his textbooks, he was able to achiev†¦

Journal Assignment Example | Topics and Well Written Essays - 250 words - 17

Journal - Assignment Example The article went on further to describe that George Romney had grown up on a Mormon compound established by his grandfather who had four wives. Asked to comment, Obama’s reelection campaign spokeswoman Lis Smith replied that they will not engage in attacking a candidate’s religion and that the practice was beyond what is appropriate. I think that this aspect of the presidential candidate’s family history, especially if it will not affect the candidate’s performance should he become the president, is of no relevance. I think Americans are more concerned with a presidential candidate’s capability to govern them than if where the candidate’s parents grew up. As the article mentioned, it was only Romney’s great grandfather who did not practice monogamy. It just shows that even if it was against their beliefs to have more than one wife, Romney’s grandfather and father stuck to their own principles of having just one family as is what presidential candidate Romney has done. At the end of the day, I think what matters is Romney’s personal conviction. This is what makes him the kind of person and presidential candidate that he is. If this kind of person is who America wants as a ruler then what his great grandfather had done should be of no

Sunday, July 28, 2019

Critique Program Development Models-Adult Education Essay

Critique Program Development Models-Adult Education - Essay Example g and implementing educational strategies should culminate in behavioural change in individual learners and within learner groups and systems (Boone et al, 2002). The purpose of adult education programs is to enhance adults’ capacity to participate in society and improve their lives. An adult education program development model should have a clear statement of mission, philosophy, and goals that guides all aspects of program services. Further, it has to meet the needs of the program’s community, as well as the policies of its state and national funding agencies (Comings et al, 2006). The two theorists of adult education selected are: Stephen Brookfield (1986) and Malcolm Shepherd Knowles (1988). The program development models conceptualized by the above theorists are compared and contrasted below. According to Brookfield (1986), facilitators of adult learning should not adopt formulaic responses to widely varying situations. Avoiding orthodoxy, creative application of theory to the unique circumstances of the practice setting is advocated. The institutional model comprises of basic tenets of instructor-learner relationship, in whch the learner is in a submissive position, and is completely dependent on the instructor for achieving learning outcomes. In Knowles’ (1988) andragogical model of program development, there is shift in research and practice from a focus on teaching to a focus on learning. Thus a new emphasis on education was introduced, as a process of facilitating self-directed learning. Another principle is that life-long learning is considered as the organising principle for all education. Institutional culture, politics and technology will all play a part in impacting the program development process (Brookfield, 1986). Brookfield’s (1985) liberal model of adult education is institution-bound because it emphasizes principles of program design and the best use of available delivery systems, to plan a program to meet everyone’s needs.

Saturday, July 27, 2019

International Service Marketing Essay Example | Topics and Well Written Essays - 2500 words

International Service Marketing - Essay Example The above flowchart shows a service profit chain that is encountered by each and every firm in the contemporary world. So, it can be claimed that higher profit generation can be experienced by firms only with the essence of superior quality of service. This is the era of consumerism and level of utility derived by the consumers from services of a company determines their loyalty towards the same in the long run. This essay tries to implicitly analyze the service quality of British Airways (BA). It is believed by scholars that a company’s service quality invariably undergoes four progressive transitional stages across its life cycle. These stages are Service Losers, Service Nonentities, Service Professionals and Service Leaders. The context of essay will estimate the most appropriate service quality stage, where the selected service of BA lies. In latter half of the essay, the selected service quality of BA will be precisely compared with that of other competitors in the market . Finally, recommendations will be also provided, whereby the company would be able to rectify certain existing limitations of the concerned service (Shaughnessy, 2013). The company of BA claims to have substantially improved the quality of its food and wine service. The company states that customers can experience better quality of food and drink on its flights in comparison to many popular food junctions on the ground. The food offerings are claimed to be prepared freshly on the flights itself. The on-board catering service of the company is distinguished in terms of the flight seat classes. The major dinning types offered by the company are economy dining, premium economy dining, business dining, first dining and special meals (British Airways, 2014). Under the menu of economy dinning, BA offers complementary snack or meal services to all flight boarders. Bar services are also provided by the company to all customers. The bar service of the airline serves assorted drinks to the

Friday, July 26, 2019

Issues in Global Business and Strategic Concepts Essay - 5

Issues in Global Business and Strategic Concepts - Essay Example y remarkable models, theories and concepts that are in line with the issues in global business and strategic concepts, particularly in understanding the future of Nokia-Microsoft merger. The said merger is generally to obtain a competitive advantage especially in mobile computing. However, specifically, the ultimate goal is to increase potential market share or global expansion for Nokia and Microsoft in areas where the two firms have vital common things to offer leading them to their competitive advantage. It is recommended that the new CEO must consider that it is essential to employ various models in business primarily in line with the issues in global business and strategic concepts. Prior to the actual implementation of the Nokia-Microsoft strategy, it is necessary that the consideration of other relevant factors such as the entry strategy, production and outsourcing, value chain, marketing strategy and the organisational structure should be required. Furthermore, the primary activities in the actual operation should be considered with particular involvement of appropriate process implemented among the following factors: structure, processes, people, culture, and incentives and control. In the age of tough competition and globalisation, firms are conditioned that they should be able to compete, and the one which will be most likely to win in the battle should be able to understand the importance of achieving a remarkable competitive strategy prior to generating a competitive advantage (Siciliani, Straume and Cellini, 2012, p.2041). Microsoft and Nokia, in the midst of tough competition in their industry, are trying to improve their market share, especially in the area of mobile computing (Egan, 2014). Thus, the work at hand tries to establish the idea that seeks to understand the competitive advantage of Microsoft-Nokia merger and the things involved in this strategy. Specifically, this report examines the areas to gain competitive advantage in the

Thursday, July 25, 2019

Kmarts Downfall Essay Example | Topics and Well Written Essays - 750 words

Kmarts Downfall - Essay Example The competition model established by Porter is an analytical tool for studying industry behavior and corporate strategies. It is derived from industrial organization economics and includes five forces. These forces, in turn, determine the level of competition, and thus that profitability of a market. These five forces comprise of substitutes, competitors, new entering firms, bargaining power of suppliers and customers. The facts of this case study reveal that Kmart was facing intense competition from Wal-mart and Target. Wal-Mart initiated the movement of every day low prices, which was a more worthy substitute for products in Kmart. In addition, Wal-Mart utilized information technology to keep a record of sales in all of their stores and for ordering stocks of fast moving items. Wal-mart heavily invested in information technology by installing new registers with barcode scanners in every store during the 1970s and early 1980s, which fed the sales data into the back-end computers. This information, in turn, assisted them in planning future strategies, deciding which products reap more profit. Thus, they gained a competitive advantage. By 1983, Wal-Mart was able to receive goods for only two cents whereas Kmart had to pay five cents per dollar for getting goods to stores. This meant that Wal-Mart was in a position to sell products at a price three percent lesser in contrast to Kmart. Then, another c ompetitor Target began a new campaign in which they depicted themselves as a low-cost source of quality and style mart. They focused on merchandising. These attractive schemes took away Kmart’s market share. This demonstrates that Kmart was under intense pressure of substitutes, competitors, and lost customers. In 1987, Kmart undertook investments worth 1 million to modernize their systems.  

Wednesday, July 24, 2019

Tort issues Essay Example | Topics and Well Written Essays - 750 words

Tort issues - Essay Example The other issue is Joe; John’s father. He becomes concerned and follows the ambulance. He drives at 60 miles per hour instead of 35 mile per hour and as a result gets arrested by the police In the first case, John has a duty to obey the speed limits of 10 miles per hour but he refused because of his own negligence. If at all he could have obeyed the traffic law then he could have not find himself in trouble with either Paul or police officers. John’s negligence to Paul may be charged as follows; Loss of income, impact at 25 mile per hour, general damage, loss of camera, unconsciousness and hospitals bills. In this issue there are two standard cares to be discussed under tort of negligence; the first one is the standard care of a reasonable man and the statute care. If the speed limit applies to a pedal bike then John is guilty. But the use of the word â€Å"unable† is an indication that John did not cause the accident knowingly but unintentionally and he was trying to control the situation. John could argue that, he did not see the speed limit sign because it was covered with tree branches. And therefore, it is the constitutional right for the government to provide, and make visible, speed limit road signs as appropriate. Also in Paul’s case, John can rightfully claim that Paul’s act of crossing the road where it is unmarked for pedestrians’ constitutes negligence in his part. Therefore, it is possible for Paul to lose the case under contributory negligence law. In order to avoid such contradiction, the court developed an exception called last clear chance .This rule allows Paul to recover first even though it was his fault. Investigation is conducted to prove who had the last clear chance and if it is found that John had the last clear chance then the ruling is unjust and confusing. The other tort in this scenario is the conversion of the camera. Henry is

Business Ethics in the Business World Research Paper

Business Ethics in the Business World - Research Paper Example The world of business, naturally, is no exception. Applied in such a context, these principles come into play in all aspects relating to business matters, especially when moral or ethical problems arise. Organizations and individuals alike demonstrate their grasp of business ethics in everything they do. In fact, business ethics may encompass a whole world of subjects on its own, many of which touch on the nature of the relationship between an organization, its employees, its clients and its stakeholders. Regardless, the main point that comes into play is that of the concept of right and wrong - whether a given course of action is right and just with respect to all parties involved (Smith, 1952).  The origins of the entire concept of business ethics date back as far as before the Christian Era, having first been discussed in ancient times by Cicero (Goldin, 2006). His view on the matter, one in line with the principles of Stoicism, mainly holds that no single set of moral principle s can apply to all aspects of everyday life. This means that, while the business world is still bound by principles of morality, these principles are not necessarily the same as those ascribed to by laypeople; indeed, businessmen have every right to the pursuit of profit, as it is their way of contributing to society. At the same time, though, such right only extends insofar as it does not conflict with the common good, at which point the latter should always prevail. This directly ties into the related concept of corporate social responsibility.  ... The origins of the entire concept of business ethics date back as far as before the Christian Era, having first been discussed in ancient times by Cicero (Goldin, 2006). His view on the matter, one in line with the principles of Stoicism, mainly holds that no single set of moral principles can apply to all aspects of everyday life. This means that, while the business world is still bound by principles of morality, these principles are not necessarily the same as those ascribed to by laypeople; indeed, businessmen have every right to the pursuit of profit, as it is their way of contributing to society. At the same time, though, such right only extends insofar as it does not conflict with the common good, at which point the latter should always prevail. This directly ties into the related concept of corporate social responsibility (CSR), which in turn helps ensure that an organization consistently complies with ethical standards (Wood, 1991). In the academic context, on the other hand, business ethics is a fairly new topic of interest. Baumhart (1961) was probably the very first to discuss the subject in his studies, and is actually credited by DeGeorge (2005) as one of the main proponents of academic business ethics. At the time, the Cold War as well as the Vietnam War was well under way, and America as a whole was experiencing rapid paradigm shifts with respect to business and even society itself. In fact, it was during this time that most of the corporate giants we know today were born. Of course, the rise of these corporations also had certain detrimental consequences, some of which earned them the ire of the public. As further

Tuesday, July 23, 2019

Specifications & Documentations Research Paper Example | Topics and Well Written Essays - 2750 words

Specifications & Documentations - Research Paper Example The requirements of the project ought to contain the main objectives that are described in details and are precise (Demetrovics, Knuth & Rado, 2005). The requirements of a project are competent of presenting an original tool for the severe evaluation of the quality of the project. This is because; the final review of the project must be capable of showing a clear and precise requirement. Unfortunately, the idea of meeting all the requirements in a project does not ensure that the project will meet the required quality. Therefore, there is the implementation of a clear outline of the specifications that the project can use to achieve the right quality of the product (Duenas, 2006). Categorization of the Requirements For the computer project to be effective and be capable of implementation of a given set of task, then a requirement which is essential and is of the most priority is categorized. The categorization of the requirements needed for the project include the input devices as we ll as the output devices. There is also the category of usability and performance. Similarly, there is categorization of the requirement of target platform parameters and also the scalability categorization. They include the user requirements. This requirement category describes the chief needs and the goals of the user. This user requirement is often carried out at the end of the task analysis. This is because the user is capable of examining the final goals the project has been able to meet without many complications (Duenas, 2006). The second category of the requirement is the system requirement. This requirement has more than one meaning, first, it can mean the capability of the system with which, and also on which and moreover through which a given product is... The paper tells that there are a variety of system models which the computer system has. There is the data processing model. This model shows how the system data undergoes processing at various stages of the process. Second, there is the model called the composition model. This model shows how the system entities are chiefly made up of other minor entities. Third, there is the system modem called the architectural model. This model displays the system principal sub systems. Fourthly, there is the classification model. This model shows how the entities have a common and similar characteristic. Finally, there is the model called the stimulus or the response model. This final model displays the system’s reaction to the major event of the system. Additionally, there is the semantic data model. This model describes the chief logicality of the structured data that is to be processed by the system. The model further sets out the main entities of the system and their relations to each other. Moreover, it sets the distinction between the chief relationship of the entities and of the entity attributes of the system. The semantic model is further utilized in the designing of the database. This can easily be capable of the implementation of using the relational databases. Eventually, there is no given specific notation that the model provides for the association of the system. The system model processing involves the process called the process model of the system. This process model displays the overall processing and also the procedures that the system supports.

Monday, July 22, 2019

Literature review Essay Example for Free

Literature review Essay Abstract: Supply chain Management has assumed a significant role in firms performance and has attracted serious research attention over the last few years. A literature review reveals a considerable spurt in research in theory and practice of SCM. Combining and informing on features of Supply Management and distribution Management. This integration has resulted in the concept of extended enterprise and the supply chain is now manifest as the collaborative supply chain across intercompany borders to maximize the value across the entire supply chain. A large number of research papers have been published in various journals in last two decades. In this paper an attempt is made to review the status of literature on Supply Chain Management. A literature classification scheme is proposed. A total of 588 articles from 13 refereed academic journals are classified into articles in five methodologies i.e. Exploratory, Normative, Methodology, Literature Review and Hypothesis testing. This literature review finds that exploratory type of research is mostly preferred it is expected that with the maturity of SCM the hypothesis testing method will pick up. The articles are further categorized in fifteen categories on the basis of content analysis. Based on this review, some possible research issues are identified. Keywords: SCM, Supply Chain strategy, Literature Review. those with average performance. 1. INTRODUCTION Traditionally, Supply Chain Management (SCM) has been a melting pot of various aspects, with influences from logistics and transportation, operations management and materials anddistribution management, marketing, as well as purchasing and information technology (IT). Ideally, the allencompassing philosophy of SCM embraces each of these functions to produce an overall supply chain strategy that ultimately enhances firm performance (Croom et al. 2000; Wisner and Tan 2000). In actuality, the literature is still very fragmented and although several studies purport to discuss supply chain issues, most of the existing research only examines one link of the chain, or most importantly only focuses on one ingredient in the supply chain performance mix. Six major movements can be observed in the evolution of supply chain management studies. Creation, Integration, Globalization, Specialization Phases One and Two, and SCM 2.0 These phases are given in Table 1. In the current competitive scenario supply chain management assumes a significant importance and calls for serious research attention, as companies are challenged with finding ways to meet ever-rising customer expectations at a manageable cost. To do so, businesses must search out which parts of their supply-chain process are not competitive, understand which customer needs are not being met, establish improvement goals, and rapidly implement necessary improvements. Previously manufacturers were the drivers of the supply chain managing the pace at which products were manufactured and distributed. Today, customers are calling the shots, and manufacturers are scrambling to meet customer demands for options/styles/ features, quick order fulfillment, and fast delivery. Manufacturing quality a long-time competitive differentiator is approaching parity across the board, so meeting customer’s specific demands for product delivery has emerged as the next critical opportunity for co mpetitive advantage. Companies that learn how to improve management of their supply chain will become the new success stories in the global market place. Study on Benchmarking shows significant cost differences between organizations that exhibit best-in-class performance and Copyright  © 2010 HyperSciences_Publisher. All rights reserved The six stage evolutionary era depicts that in a particular era which strategy was emphasized. For instance in the sixth era information Technology was given priority and IT enabled supply chain was the burning issue. In the 1990s industries began to focus on â€Å"core competencies† and adopted a specialization model. Companies abandoned vertical integration, sold off non-core operations, and outsourced those functions to other companies. Web 2. 0 is defined as a trend in the use of the World Wide Web that is meant to increase creativity, information sharing, and collaboration among users. The term supply chain management was first coined by an American industry consultant in the early 1980s. However the concept of supply chain in management, was of great importance long before in the early 20th century, especially by the creation of the assembly line. This era of supply chain management studies was highlighted with the development of Electronic Data Interchange (EDI) systems in the 1960s and developed through the 1990s by the introduction of Enterprise Resource Planning (ERP) systems. This era is characterized by the globalization of supply chain management in organizations with the goal of increasing competitive advantage, creating more value-added, and reducing costs through global sourcing Specialization within the supply chain began in the 1980s with the inception of transportation brokerages, warehouse management, and non asset based carriers and has matured beyond transportation and logistics into aspects of supply planning, collaboration, execution and performance management. presents various connotations given by various researchers; then a literature classification scheme is explained and a research agenda is suggested after identifying the gaps between theory and practice of SCM. SCM research has included a number of literature reviews and historical studies published in the top scholarly journals in the fields of logistics, logistic   management, purchasing and SCM (Croom et al. 2000; Carter and Ellram 2003; Rungtusanatham et al. 2003). SCM literature reviews have also been done in the past. However, for the most part these reviews have been descriptive (offering basic frequencies for topics covered etc.) or normative. Given the increasing focus on SCM in both academic and practitioner literature streams, a review of the concepts, topics, analysis methods and levels of analysis across thirteen academic journals was undertaken. This research investigates the history of the SCM literature looking at the various trends and developments in the field

Sunday, July 21, 2019

Structure and Features of the Arabic Language

Structure and Features of the Arabic Language The Arabic language is a semantic language with a complicated morphology, which is significantly different from the most popular languages, such as English, Spanish, French, and Chinese. Arabic is an official language in over 22 countries. It is spoken as first language in North Africa (Algeria, Egypt, Libya, Morocco, Tunisia, Sudan), the Arabian Peninsula (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, United Arab Emirates, Yemen), Middle East (Iraq, Jordan, Lebanon, Syria), and other Arab countries (Mauritania, Comoros, Djibouti, Somalia). Since Arabic is the language of the Quran, the holy book of Islam, it is also spoken as a second language by several Asian countries such as: Indonesia, Pakistan, Iran, Uzbekistan and Malay[52]. More than 422 million people are able to speak Arabic, which makes this language the fifth most spoken language in the world, according to[53]. This chapter give brief description about the relevant basic elements of the Arabic language. This covers Arabic language structure, and the features of the Arabic writing system. The morphology of Arabic language and the Arabic word classes, i. e. nouns, verbs, and particles are presented in this chapter. The Arabic language challenges are also discussed in the last section of this chapter. 2.1.Arabic Language Structure The Arabic language is classified into three forms: Classical Arabic (CA), Colloquial Arabic Dialects (CAD), and Modern Standard Arabic (MSA). CA is fully vowelized and includes classical historical liturgical text and old literature texts. CAD includes predominantly spoken vernaculars, and each Arab country has its dialect. MSA is the official language and includes news, media, and official documents[16]. The direction of writing in the Arabic language is from right to left. The alphabet of the Arabic language consists of 28 as shown in Table 2-1. Table 2‑1: The alphabet of the Arabic language No. Alone Form Transliteration Initial Form Medial Form End Form 1 Ø § a Ø § Ùâ‚ ¬ÃƒËœÃ‚ § Ùâ‚ ¬ÃƒËœÃ‚ § 2 Ø ¨ b Ø ¨Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¨Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¨ 3 Ø ª t Ø ªÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ªÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ª 4 Ø « th Ø «Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ «Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ « 5 Ø ¬ j Ø ¬Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¬Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¬ 6 Ø ­ h Ø ­Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ­Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ­ 7 Ø ® kh Ø ®Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ®Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ® 8 Ø ¯ d Ø ¯ Ùâ‚ ¬ÃƒËœÃ‚ ¯ Ùâ‚ ¬ÃƒËœÃ‚ ¯ 9 Ø ° th Ø ° Ùâ‚ ¬ÃƒËœÃ‚ ° Ùâ‚ ¬ÃƒËœÃ‚ ° 10 Ø ± r Ø ± Ùâ‚ ¬ÃƒËœÃ‚ ± Ùâ‚ ¬ÃƒËœÃ‚ ± 11 Ø ² z Ø ² Ùâ‚ ¬ÃƒËœÃ‚ ² Ùâ‚ ¬ÃƒËœÃ‚ ² 12 Ø ³ s Ø ³Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ³ 13 Ø ´ sh Ø ´Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ´Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ´ 14 Ø µ s Ø µÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ µÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ µ 15 Ø ¶ tha Ø ¶Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¶Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¶ 16 Ø · ta Ø ·Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ·Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ · 17 Ø ¸ tha Ø ¸Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¸Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¸ 18 Ø ¹ aa Ø ¹Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¹Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ¹ 19 Ø º gh Ø ºÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ ºÃƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬ÃƒËœÃ‚ º 20 Ù  f Ù Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã‚ Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã‚  21 Ù‚ q Ù‚Ùâ‚ ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬Å¡Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬Å¡ 22 Ùƒ k ÙƒÙâ‚ ¬ Ùâ‚ ¬Ãƒâ„¢Ã†â€™Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã†â€™ 23 Ù„ l Ù„Ùâ‚ ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬Å¾ 24 Ù†¦ m Ù†¦Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬ ¦Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬ ¦ 25 Ù†  n Ù† Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬  Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬   26 Ù†¡Ãƒâ„¢Ã¢â€š ¬ h Ù†¡Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬ ¡Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬ ¡ 27 Ùˆ w Ùˆ Ùâ‚ ¬Ãƒâ„¢Ã‹â€  Ùâ‚ ¬Ãƒâ„¢Ã‹â€  28 ÙÅ   y ÙÅ  Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã…  Ãƒâ„¢Ã¢â€š ¬ Ùâ‚ ¬Ãƒâ„¢Ã…   The formulation and shape are different for the same letter, depending on its position within the word [24]. For example, the letter (Ø ¹) has the following styles: (Ø ¹Ãƒâ„¢Ã¢â€š ¬), if this letter appears at the beginning of the word, such as in Ø ¹ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦ that means general; (Ùâ‚ ¬ÃƒËœÃ‚ ¹Ãƒâ„¢Ã¢â€š ¬), if this letter appears in the middle of the word, such as in ÙÅ  ÃƒËœÃ‚ ¹ÃƒËœÃ‚ ±Ãƒâ„¢Ã‚  that means know; (Ùâ‚ ¬ÃƒËœÃ‚ ¹), if this letter appears at the end of the word, such as in ÙÅ  ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ¹ that means hear. Finally, the letter (Ø ¹) can appear as (Ø ¹) if this letter appears at the end of a word but disconnected from the letter before it such as in Ø ³ÃƒËœÃ‚ ±ÃƒËœÃ‚ ¹ that means fast see Figure (2-1). Figure 2-1: The Formulation and Shape for the Same Letter Thus, a three-letter word may start with a letter in beginning form, followed by a letter in medial form and, finally, by a letter in an end form such as: [Ø ¹Ãƒâ„¢Ã¢â‚¬ ¦Ãƒâ„¢Ã¢â‚¬Å¾] Instead of: [Ø ¹ Ù†¦ Ù„] But the reality is even worse since a letter, in the middle of a word, may have the final or the initial form as in [Ù ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³] Because some letters do not connect with any character that comes after. They have only two forms: isolated (which is also used as initial) and final (also used as middle). These letters are (Ø ¯ÃƒËœÃ…’ Ø °ÃƒËœÃ…’ Ø ±ÃƒËœÃ…’ Ø ²ÃƒËœÃ…’ Ùˆ) for example: [وؠ±ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ©] For the purpose of this thesis, we have defined our own transliteration scheme for Arabic alphabets, which is presented in Table 2.1. Each Arabic letter in this scheme is mapped to only one English letter. Wherever in this thesis, any Arabic word is annotated as a triple attribute to be more clear for a non-Arabic reader. The first attribute for the Arabic word itself which is written in Arabic scripts between two square brackets, the second attribute for an English transliteration which is written in italics, while the third one for English translation which is written between two quotation marks. Figure 2-2 shows an example. Figure 2-2: An Example of Annotated Arabic Word Three letters from the twenty-eight letters appear in different shapes, which are they: Hamza [Ø ¡]: This shape can be: on Alef [Ø £], below Alef [Ø ¥], on Waaw [Ø ¤], on Alef Maqsura [Ø ¦], or isolated [Ø ¡]. Taa-Marbuta [Ø ©]: This is a special form of the letter [Ø ª], it always appears at the end of the word. Alef-Maqsura [Ù†°]: This is a special form of the letter [Ø §], it always appears at the end of the word. The above three letters pose some difficulties when building morphological systems. Many of the written Arabic texts and Arabic web sites ignore the Hamza and the two dots above the Taa-Marbuta. For example, the Arabic word [Ù†¦ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ ©] (mdrst, school) may appear in many texts as [Ù†¦ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â‚¬ ¡] (mdrsh) (which means school or his teacher) without two dots above the last letter. When comparing the last letter in the two previous words, we found it was [Ø ©] in the first word, while it was [Ù†¡Ãƒâ„¢Ã¢â€š ¬] in the second word. Twenty-five of Arabic alphabets represent consonants. The remaining three letters represent the weak letters or the long vowels of Arabic (shortly vowels). These letters are: Alef[Ø §], Waaw[Ùˆ] and Yaa[ÙÅ  ].   Moreover, diacritics are used in the Arabic language, which are symbols placed above or below the letters to add distinct pronunciation, grammatical formulation, and sometimes another meaning to the whole word. Arabic diacritics include, dama (Ù ), fathah (ÙÅ ½), kasra (Ù ), sukon (Ù’), double dama (ÙŒ), double fathah (Ù†¹), double kasra (Ù ) [54]. For instance, Table 2-2 presents different pronunciations of the letter (Sad) ((Ø µ: Table 2‑2: Presents different pronunciations of the letter (Sad) (Ø µ) Ø µÃƒâ„¢Ã¢â‚¬â„¢ Ø µÃƒâ„¢Ã…’ Ø µÃƒâ„¢Ã‚  Ø µÃƒâ„¢Ã¢â‚¬ ¹ Ø µÃƒâ„¢Ã‚  Ø µÃƒâ„¢Ã… ½ Ø µÃƒâ„¢Ã‚  /s/ /sun/ /sin/ /san/ /si/ /sa/ /su/ In addition, Arabic has special mark rather than the previous diacritics. this mark is called gemination mark (shaddah (Ø ´ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ©) or tashdeed). Gemination is a mark written above the letter (Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬Ëœ) to indicate a doubled consonant while pronouncing it. This is done when the first consonant has the null diacritical mark skoon (Ùâ‚ ¬Ãƒâ„¢Ã¢â‚¬â„¢), and the second consonant has any other diacritical mark. For example, in the Arabic word (كؠ³Ãƒâ„¢Ã¢â‚¬â„¢ÃƒËœÃ‚ ³Ãƒâ„¢Ã… ½ÃƒËœÃ‚ ±) (kssr, he smashed to pieces), when the first syllable ends with (Ø ³)(s) and the next starts with (Ø ³) (s), the two consonants are united and the gemination mark indicates this union. So, the previous word is written as (كؠ³Ãƒâ„¢Ã¢â‚¬ËœÃƒËœÃ‚ ±), and it has four letters {Ùƒ Ø ³ Ø ³ Ø ±}[55]. The Arabic language has two genders, feminine (Ù†¦ÃƒËœÃ‚ ¤Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ «) and masculine (Ù†¦ÃƒËœÃ‚ °Ãƒâ„¢Ã†â€™ÃƒËœÃ‚ ±); three numbers, singular (Ù†¦Ãƒâ„¢Ã‚ ÃƒËœÃ‚ ±ÃƒËœÃ‚ ¯), dual (Ù†¦ÃƒËœÃ‚ «Ãƒâ„¢Ã¢â‚¬  Ãƒâ„¢Ã¢â‚¬ °), and plural (Ø ¬Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ¹); and three grammatical cases, nominative (Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ±Ãƒâ„¢Ã‚ ÃƒËœÃ‚ ¹), accusative (Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ µÃƒËœÃ‚ ¨), and genitive (Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¬ÃƒËœÃ‚ ±). In general, Arabic words are categorized as particles (Ø §ÃƒËœÃ‚ ¯Ãƒâ„¢Ã‹â€ ÃƒËœÃ‚ §ÃƒËœÃ‚ ª), nouns (Ø §ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ §ÃƒËœÃ‚ ¡), or verbs (Ø §Ãƒâ„¢Ã‚ ÃƒËœÃ‚ ¹ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬Å¾). Nouns in Arabic including adjectives (Ø µÃƒâ„¢Ã‚ ÃƒËœÃ‚ §ÃƒËœÃ‚ ª) and adverbs (Ø ¸ÃƒËœÃ‚ ±Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã‚ ) and can be derived from other nouns, verbs, or particles. Nouns in the Arabic language cover proper nouns (such as people, places, things, ideas, day an d month names, etc.). A noun has the nominative case when it is the subject (Ù ÃƒËœÃ‚ §ÃƒËœÃ‚ ¹Ãƒâ„¢Ã¢â‚¬Å¾); accusative when it is the object of a verb (Ù†¦Ãƒâ„¢Ã‚ ÃƒËœÃ‚ ¹Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬Å¾) and the genitive when it is the object of a preposition (Ù†¦ÃƒËœÃ‚ ¬ÃƒËœÃ‚ ±Ãƒâ„¢Ã‹â€ ÃƒËœÃ‚ ± Ø ¨ÃƒËœÃ‚ ­ÃƒËœÃ‚ ±Ãƒâ„¢Ã‚  Ø ¬ÃƒËœÃ‚ ±) [56]. Verbs in Arabic are divided into perfect (Ø µÃƒâ„¢Ã…  ÃƒËœÃ‚ ºÃƒËœÃ‚ © Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã‚ ÃƒËœÃ‚ ¹Ãƒâ„¢Ã¢â‚¬Å¾ Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ªÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦), imperfect (Ø µÃƒâ„¢Ã…  ÃƒËœÃ‚ ºÃƒËœÃ‚ © Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã‚  Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬Å¡ÃƒËœÃ‚ µ) and imperative (Ø µÃƒâ„¢Ã…  ÃƒËœÃ‚ ºÃƒËœÃ‚ © Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ±). Arabic particle category includes pronouns(Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¶Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ §ÃƒËœÃ‚ ¦ÃƒËœÃ‚ ±), adjectives(Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ µÃƒâ„¢Ã‚ ÃƒËœÃ‚ §ÃƒËœÃ‚ ª), adverbs(Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ã ƒËœÃ‚ §ÃƒËœÃ‚ ­Ãƒâ„¢Ã‹â€ ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬Å¾), conjunctions(Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¹ÃƒËœÃ‚ ·Ãƒâ„¢Ã‚ ), prepositions (Ø ­ÃƒËœÃ‚ ±Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã‚  Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¬ÃƒËœÃ‚ ±), interjections (Ø µÃƒâ„¢Ã…  ÃƒËœÃ‚ ºÃƒËœÃ‚ © Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ªÃƒËœÃ‚ ¹ÃƒËœÃ‚ ¬ÃƒËœÃ‚ ¨) and interrogatives (Ø ¹Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ §ÃƒËœÃ‚ ª Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ §ÃƒËœÃ‚ ³ÃƒËœÃ‚ ªÃƒâ„¢Ã‚ Ãƒâ„¢Ã¢â‚¬ ¡ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦) [57]. 2.2.Arabic Morphology The Arabic language is one of the highly sophisticated natural languages which has a very rich and complicated morphology. Morphology is the part of linguistics that deal with the internal structure and formation processes of words. A morpheme is often defined as the smallest meaningful and significant unit of language, which cannot be broken down into smaller parts[58]. So, for example, the word apple consists of a single morpheme (the morpheme apple), while the word apples consist of two morphemes: the morpheme apple and the morpheme -s (indication of plural). In Arabic language for example, the word (Ø ³ÃƒËœÃ‚ £Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¡Ãƒâ„¢Ã¢â‚¬ ¦, he asked them) consists also of two morphemes the verb (Ø ³ÃƒËœÃ‚ £Ãƒâ„¢Ã¢â‚¬Å¾, he ask) and the pronoun (Ù†¡Ãƒâ„¢Ã¢â‚¬ ¦, them). According to the previous examples, there are two types of morphemes: roots and affixes. The root is the main morpheme of the word, supplying the main meaning, while the affixes are added i n the beginning, middle or end of the root to create new words that add additional meaning of various kinds. In more general morphemes could be classified as: (1) roots morphemes and (2) affixes morphemes, Figure 2.3 illustrated this classification. Figure 2-3: Morpheme Classification Root is the original morpheme of the word before any transformation processes that comprises the most important part of the word and cannot be reduced into smaller constituents. In other words, it is the primary unit of the family of the same word after removing all inflectional and derivational affixes which can stand on their own as words (independent words). The root morphemes divided into two categories. The first category is called lexical morphemes, which covers the words in the language carrying the content of the message. Examples from English language: book, compute, and write, while examples from Arabic language: (قؠ±ÃƒËœÃ‚ £, read), (لؠ¹ÃƒËœÃ‚ ¨, play), and (كؠªÃƒËœÃ‚ ¨, write). The second category is called stop words morphemes, which covers the function words in the language. The stop words include adverbs, prepositions, pronouns, conjunctions, and prepositions. Examples from English language: on, that, the, and above. Examples from Arabic language: (Ù Ãƒâ„¢Ã…  , in), (Ù Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬Å¡, above), and (Ø ªÃƒËœÃ‚ ­ÃƒËœÃ‚ ª, under). Affixes morphemes are also units of meaning; however, they cannot occur as words on their own; they need to be attached to something such as root morphemes. There are three types of affixes in Arabic language: prefixes, infixes, and suffixes. In some cases, all of these affixes can be found in one word as in the word[وؠ§Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ­ÃƒËœÃ‚ §ÃƒËœÃ‚ ±ÃƒËœÃ‚ ¨Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬  ] (and the warriors). This word has ten letters, three of them are root-letters, while the others are affixes. The root of this word is [Ø ­ÃƒËœÃ‚ ±ÃƒËœÃ‚ ¨] (war). The example in Figure 2.4 can clearly deduce the differences between the three main terms used in computational linguistics: roots, stems and affixes. Figure 2-4: The Decomposition of the Word [وؠ§Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ­ÃƒËœÃ‚ §ÃƒËœÃ‚ ±ÃƒËœÃ‚ ¨Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬  ]. 2.3.Arabic Language Challenges Arabic is a challenging language in comparison with other languages such as English for a number of reasons:   In English, prefixes and suffixes are added to the beginning or end of the root to create new words. In Arabic, in addition to the prefixes and suffixes there are infixes that can be added inside the word to create new words that have the same meaning. For example, in English, the word write is the root of word writer. In Arabic, the word writer (كؠ§ÃƒËœÃ‚ ªÃƒËœÃ‚ ¨) is derived from the root write (كؠªÃƒËœÃ‚ ¨) by adding the letter Alef (Ø §) inside the root. In these cases, it is difficult to distinguish between infix letters and the root letters. he Arabic language has a rich and complex morphology in comparison with English. Its richness is attributed to the fact that one root can generate several hundreds of words having different meanings. Table 2-4 presents different morphological forms of root study (Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³). Table 2‑3: Different morphological forms of word study (Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³). Word Tense Pluralities Meaning Gender Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ Past Single He studied Masculine Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ ª Past Single She studied Feminine ÙÅ  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ Present Single He studies Masculine Ø ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ Present Single She studied Feminine Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ § Past Dual They studied Masculine Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ ªÃƒËœÃ‚ § Past Dual They studied Feminine ÙÅ  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬   Present Dual They study Masculine Ø ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬   Present Dual They study Feminine ÙÅ  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ § Present Dual They study Masculine Ø ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ § Present Dual They study Feminine Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã‹â€ ÃƒËœÃ‚ § Past Plural They studied Masculine Ø ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â‚¬   Past Plural They studied Feminine Ø ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã¢â‚¬   Present Plural They study Feminine Ø ³Ãƒâ„¢Ã…  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ Future Single They will study Masculine Ø ³ÃƒËœÃ‚ ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ Future Single They will study Feminine Ø ³Ãƒâ„¢Ã…  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ § Future Dual They will study Masculine Ø ³ÃƒËœÃ‚ ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³ÃƒËœÃ‚ § Future Dual They will study Feminine Ø ³Ãƒâ„¢Ã…  ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬   Future Plural They will study Masculine Ø ³ÃƒËœÃ‚ ªÃƒËœÃ‚ ¯ÃƒËœÃ‚ ±ÃƒËœÃ‚ ³Ãƒâ„¢Ã‹â€ Ãƒâ„¢Ã¢â‚¬   Future Plural They will study Feminine Some Arabic words have different meanings based on their appearance in the context. Especially when diacritics are not used, the proper meaning of the Arabic word can be determined based on the context. For instance, the word (Ø ¹Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦) could be Science (Ø ¹Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬â„¢Ãƒâ„¢Ã¢â‚¬ ¦), Teach (Ø ¹Ãƒâ„¢Ã… ½Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ËœÃƒâ„¢Ã… ½Ãƒâ„¢Ã¢â‚¬ ¦Ãƒâ„¢Ã¢â‚¬â„¢) or Flag (Ø ¹Ãƒâ„¢Ã… ½Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã… ½Ãƒâ„¢Ã¢â‚¬ ¦Ãƒâ„¢Ã¢â‚¬â„¢) depending on the diacritics [46]. Unfortunately, Arabic people do not explicitly mention the gemination mark in their writing. They depend on their knowledge of the language to supply the missing letter and write the words without it. In consequence, this is make the morphology process of such words is not an easy task [55]. Another challenge of automatic Arabic text processing is that proper nouns in Arabic do not start with a capital letter as in English, and Arabic letters do not have lower and upper case, which makes identifying proper names, acronyms, and abbreviations difficult. In English language, a word is a single entity. It may be a noun, a verb, a preposition, an article, , etc. While in Arabic language a single word could be a complete sentence. For example, Table 2.4 shows some single Arabic words and their equivalent English translations. Table 2‑4: Example: An Arabic Word could be a Complete English Sentence Arabic Word English Sentences Ø °Ãƒâ„¢Ã¢â‚¬ ¡ÃƒËœÃ‚ ¨ÃƒËœÃ‚ ª She go Ø ³ÃƒËœÃ‚ £Ãƒâ„¢Ã¢â‚¬Å¡ÃƒËœÃ‚ ±ÃƒËœÃ‚ £Ãƒâ„¢Ã¢â‚¬ ¡ I will read it Ø ³Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ¹Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¡ We hear him Ø §ÃƒËœÃ‚ ®ÃƒËœÃ‚ ¨ÃƒËœÃ‚ ±Ãƒâ„¢Ã¢â‚¬  Ãƒâ„¢Ã…   He told me Ù ÃƒËœÃ‚ ºÃƒËœÃ‚ §ÃƒËœÃ‚ ¯ÃƒËœÃ‚ ± Then he departed There are several free benchmarking English datasets used for document categorization, such as 20 Newsgroup, which contains around 20,000 documents distributed almost evenly into 20 classes; Reuters 21,578, which contains 21,578 documents belonging to 17 classes; and RCV1 (Reuters Corpus Volume 1), which contains 806,791 documents classified into four main classes. Unfortunately, there is no free benchmarking dataset for Arabic document classification. In the Arabic language, the problem of synonyms and broken plural forms are widespread. Examples of synonyms in Arabic are (Ø ªÃƒâ„¢Ã¢â‚¬Å¡ÃƒËœÃ‚ ¯Ãƒâ„¢Ã¢â‚¬ ¦, Ø ªÃƒËœÃ‚ ¹ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬Å¾, Ø £Ãƒâ„¢Ã¢â‚¬Å¡ÃƒËœÃ‚ ¨Ãƒâ„¢Ã¢â‚¬Å¾, Ù†¡Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦) which means (Come), and (Ù†¦Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ ²Ãƒâ„¢Ã¢â‚¬Å¾, Ø ¯ÃƒËœÃ‚ §ÃƒËœÃ‚ ±, Ø ¨Ãƒâ„¢Ã…  ÃƒËœÃ‚ ª, Ø ³Ãƒâ„¢Ã†â€™Ãƒâ„¢Ã¢â‚¬  ) which means (house). In the Arabic language, the problem of broken plural forms occurs when some irregular nouns in the Arabic language in plural takes another morphological form different from its initial form in singular. For example, the word (Doctors, Ø §ÃƒËœÃ‚ ·ÃƒËœÃ‚ ¨ÃƒËœÃ‚ §ÃƒËœÃ‚ ¡) is a broken plural of the masculine singular (Doctor, Ø ·ÃƒËœÃ‚ ¨Ãƒâ„¢Ã…  ÃƒËœÃ‚ ¨). In the Arabic language, one word may have more than lexical category (noun, verb, adjective, etc.) in different contexts such as (wellspring, Ø ¹Ãƒâ„¢Ã…  Ãƒâ„¢Ã¢â‚¬   Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ §ÃƒËœÃ‚ ¡), (Eye, Ø ¹Ãƒâ„¢Ã…  Ãƒâ„¢Ã¢â‚¬   Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ ³ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬  ), (was appointed, Ø ¹Ãƒâ„¢Ã…  Ãƒâ„¢Ã¢â‚¬   Ù†¦ÃƒËœÃ‚ ¯Ãƒâ„¢Ã…  ÃƒËœÃ‚ ±ÃƒËœÃ‚ § للØ ´ÃƒËœÃ‚ ±Ãƒâ„¢Ã†â€™Ãƒâ„¢Ã¢â‚¬ ¡). In addition to the different forms of the Arabic word that result from the derivational process, there are some words lack authentic Arabic roots like Arabized words which are translated from other languages, such as (programs, Ø ¨ÃƒËœÃ‚ ±ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ¬ ), (geography, Ø ¬ÃƒËœÃ‚ ºÃƒËœÃ‚ ±ÃƒËœÃ‚ §Ãƒâ„¢Ã‚ Ãƒâ„¢Ã…  ÃƒËœÃ‚ ©), (internet, Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¥Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ ªÃƒËœÃ‚ ±Ãƒâ„¢Ã¢â‚¬  ÃƒËœÃ‚ ª ), etc. or names, places such as (countries, Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¨Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¯ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬  ), (cities, Ø §Ãƒâ„¢Ã¢â‚¬Å¾Ãƒâ„¢Ã¢â‚¬ ¦ÃƒËœÃ‚ ¯Ãƒâ„¢Ã¢â‚¬  ), (rivers, Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬  Ãƒâ„¢Ã¢â‚¬ ¡ÃƒËœÃ‚ §ÃƒËœÃ‚ ±), (mountains, Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ ¬ÃƒËœÃ‚ ¨ÃƒËœÃ‚ §Ãƒâ„¢Ã¢â‚¬Å¾), (deserts, Ø §Ãƒâ„¢Ã¢â‚¬Å¾ÃƒËœÃ‚ µÃƒËœÃ‚ ­ÃƒËœÃ‚ §ÃƒËœÃ‚ ±Ãƒâ„¢Ã¢â‚¬ °), etc. 2.4.Summary Arabic language is an international language belonging to the Semitic languages family (different from Indo-European languages in some respects). The Arabic alphabet consists of twenty-eight letters in addition to some variants of existing letters. Each letter can appear in up to four different shapes, depending on the position of the letter in the Arabic word. Twenty-five of Arabic letters represent consonants. The remaining three letters represent the long vowels of Arabic. The Arabic writing system goes from right to left and most letters in Arabic words are joined together. Arabic has a rich and complex morphology. In many cases, one orthographic word is comprising many semantic and syntactic words. Traditionally there are two types of morphology in Arabic language: roots morphemes and affixes morphemes. The root morphemes divided into two categories. The first category is called lexical morphemes, which covers the words in the language carrying the content of the message. The second category is called stop words morphemes, which covers the function words such as adverbs, prepositions, pronouns, conjunctions, and prepositions. Affixes morphemes cannot occur as words on their own; they need to be attached to something such as root morphemes. There are three types of affixes in Arabic language: prefixes, infixes, and suffixes. All Arabic words could be classified into three main categories according to the part-of-speech: noun, verb, and particle. The noun and verb in Arabic might be further divided according to: number (singular, dual and plural), and case (nominative, genitive and accusative). Arabic. The Arabic language is a challenging language in comparison with other languages and has a complicated morphological structure. Therefore, the Arabic language needs a set of preprocessing routines to be suitable for cl

Saturday, July 20, 2019

Computer Networking

Computer Networking 1. Data Link Layer Protocols always put CRC in there trailer rather than in the header. Why? Ans. The CRC is computed during transmission and appended to the output stream as soon as the last bit goes out onto the wire. But If we put CRC in the header, before transmitting it is necessary to compute CRC bits and then add it. This approach will result in handling of each byte twice once for check summing and once for transmitting. While addition of CRC in trailer results is the easy way and less effort. Thats the reason why we add CRC at the trailer part of the frame. 2. Slotted aloha is a improved version on aloha protocol. On what factors the improvement is implemented in slotted aloha. Ans. In case of slotted ALOHA concept of time slot has been introduced. During the transmission we make use of this time slot to send a frame. A frame will be send only at the beginning of the time slot. As a result of this method the chances of collision decreases considerably. Vulnerable time in case of slotted ALOHA is also less than the vulnerable time in pure aloha. Or in other words we can say that the vulnerable time is just half in the slotted ALOHA as compared to that of ALOHA. As the probability of collisions has been decreased this results in the increased efficiency of the transmission. 3.When bit stuffing is used, is it possible for loss, insertion or modification of a single bit to cause an error not detected by checksum? If not why not? If so how? Does checksum play a role there? Ans. Yes. There is a possibility of modification a single bit which will result in an error. But this error can easily be detected by the checksum error detection method. This is so because checksum is the sum of the data elements to be transmitted. If a bit in frame get modified then it will result in the change of sum of the data elements. Which in turn will change the checksum. And if the chechsum dose not match at both the sides then error will be detected by the receiver. Also there is chance of loss of a bits. Lets suppose if there change occurs in the bit which was stuffed in the data part means stuffed 0 bit becomes 1. in this case receiver will take it as flag and conseder it as the end of the frame which will finally result in the loss of some data bits. This loss of data bits can easily be detected by the checksum method. As due to the loss of data bits the sum will change and it will result in change in checksum number. And the error will be detected easily. Insertion of a bit is not possible because flags are used to indicate the start and end of a frame. And also the size of the frame is fixed. So we can not add one extra bit to the frame. 4. Give two reasons why network might use an error correcting code instead of error detection and retransmission? Ans. Sending data with error correcting code and detecting error then ask for retransmission of data are two different methods used for data transmission. The 1st option have some advantages over the 2nd one. 1> Fast transmission of data takes place. If any frame is received with error then receiver can regenerate the correct frame using the error control information. While in 2nd case receiver will 1st send request for retransmission of that particular frame then sender will again send that frame, which is a very time consuming process. 2> Efficiency of transmission increases. If we use 1st option then the whole bandwidth of the channel will be used to send the data only in one direction which will automatically increases the data transmission efficiency. While in case of 2nd option bandwidth of the channel is divided in two parts which results in loss of efficiency. 5. Wireless transmission and wired transmission use different set of multiple channel allocation strategies. Why there was a need of avoidance when detection was already available? Ans. In case of wired transmission we use wires for the transmission. If data have to send over a small distance it is easily transferred but if data is to be send over a long distance then we makes use of repeaters. Because of the repeaters the energy of the frames are maintained. So if any collision occurs in wired connection then it is easy to recover the data. While in case of wireless transmission data travels through the air which results in loss of energy of the packets. During transmission energy of the data packets decreases. So if collision occurs then the packets destroy easily and completely. So we need to avoid collisions in case of wireless transmission. 6. Blue tooth supports two types of links between a slave and master .What are they and why is each one used for? Ans. There are two types of link that can be created between a primary ( Master ) and a secondary ( Slave ) stations. 1> SCO, Synchronous connection oriented. This connection is used when it is more important to deliver data in time ( to avoid latency) than integrity ( i. e. error-free delivery ). The basic units of connection is two slots, one for each direction. At regular intervals specific slots are reserved for primary and secondary stations to establish the connection. If any error occurs ( such as packet lost) then it is never retransmitted. This type of connection is used in real-time applications. 2> ACL, Asynchronous connectionless link. This type of connection is used when data integrity is more important than avoiding delay in data delivery. If any error occurs, then the damaged frame is retransmited. The number of slots are not fixed for ACL, it can use one, two or more number of slots. After the arrival of the data frame secondary station sends ACL frame if and only if the previous slot has been addressed to it. 7. Using 5-bit sequence numbers, what is the maximum size of the send and receive windows for each of the following protocols? a. Stop-and-Wait ARQ Ans. In this protocol sequence number is based on modulo-2 arithmeetic. Send window Size :- 1 ( always ) Receive Window Size :- 1 ( always ) b. Go-Back-N ARQ Ans. Send window size :- 32 ( frames numbering from 0 to 31 ) receive window size:- 1 ( always ) c. Selective-Repeat ARQ Ans. In this protocol the size of send window is equal to receive window. Send Window size :- 16 Receive Window size :- 16 8. If an Ethernet destination address is 07:01:02:03:04:05, what is the type of the address (unicast, multicast, or broadcast)? Ans. A source address is always a unicast address as frame comes only from one station. Now destination address can be unicast, multicast or broadcast. To identify a address wheather it is a unicast or a multicast we conseder least significant bit of the 1st byte. If this bit is 0 then address is Unicast. If this bit is 1 then address is Multicast. While broadcast address is a special case of the multicast address. If all the bits in the this 6 byte address are 1 then its a broadcast address.

normandy :: essays research papers

A Day in June: The Invasion Of Normandy   Ã‚  Ã‚  Ã‚  Ã‚  Green water splashes aboard the small wooden landing craft soaking the men inside with cold salt water. The nearing of exploding shells sends fright and adrenaline pumping through their veins. As the beach draws closer officers begin to bark out orders over the sound of gun fire. The landing craft stops with a jolt and the loading ramp slams down on the wet sand. Bullets come whizzing by cutting down the first three rows of soldiers. The remaining men jump over the sides and plummet into the murky water, hoping to get ashore alive. The invasion of Normandy could be the turning point of the war in favor of the Allies or it could be the rise of Nazi Germany and the beginning of a fascist era.   Ã‚  Ã‚  Ã‚  Ã‚   June 5, 1944: the Buildup   Ã‚  Ã‚  Ã‚  Ã‚  Around 3:30 a.m. General Dwight D. Eisenhower walked into his headquarters in a mansion on the southern coast of England. In a few short moments he would have to make one of the most influential decisions of World War II. Should the Allied forces invade Nazi occupied France at Normandy or not? He consulted with his fellow officers on the matter, and after ten minutes of pacing around the room he gave the go ahead. Within hours an armada of 5,000 Allied ships was making its way toward Normandy France. Along with this armada the 82nd and the 101st Airborne Divisions were up in the air ready to be dropped behind enemy lines. Little did they know the two divisions would loose up to seventy percent of their men and be dropped as far as ten mile away from their drop zones. As was part of the plans U.S. and British bombers were to go ahead and drop bombs on key targets, but most of the bombs missed or did little damage to the concrete block houses.   Ã‚  Ã‚  Ã‚  Ã‚  After this the two airborne divisions would go and be dropped behind German lines to help out the forces on the beach, this help never came. Then Rangers and other troops would storm ashore and take the beaches. In the invasion of Normandy some 150,000 troops landed on the beaches. The objectives of these men was to take the five Normandy beach heads. The beaches Utah, Gold, Sword, and Juneau were all taken by the British and Canadian troops. The biggest and most heavily armed beach, Omaha, was invaded by U.

Friday, July 19, 2019

Superstition In Shakespeares The Tragedy of Julius Caesar Essay

Superstition In Shakespeares The Tragedy of Julius Caesar Superstition has been around almost since people first inhabited the earth. For this reason, it has played a main role in many classical pieces of literature. One of Shakespeare’s tragedies, The Tragedy of Julius Caesar, is full of superstition and the supernatural. It contained so much superstition in order to foreshadow key events in the plot, to further develop characters, and to thrill and relate to the Elizabethan audience for whom the play was written. Foreshadowing was perhaps the main reason superstition was used in Julius Caesar. The supernatural provided hints to the reader about many important events to come. The most important event that was foreshadowed, without a doubt, was the death of Caesar himself by the hands of Brutus and the conspirators on the ides of March. When the soothsayer cries out â€Å"Beware the ides of march†(312; act1,sc2) he is truly laying the groundwork for the rest of the events leading up to Caesar’s assassination. Although Julius dismisses the soothsay with a simple â€Å"he is a dreamer, let us leave him. Pass.† (313; act1, sc2) the reader realizes that this date will prove important in the near future. To the audience, the prophecies are dramatic irony-when Caesar is warned about the ides of March, we already know what is going to happen to him. (Farrow) That one simple dialogue sets the stage for the rest of the plot to advance swiftly. One of the reasons why this warning may have gone unheeded is because most sooth-sayers were not well respected, though many turned out to be right. â€Å"Since they lack any formal office or shop, and they predict forthcomings without fee, one can see quite easily why citizens would distrust their predictions†(Julius) One of the most graphic examples of Caesar’s death being foreshadowed was most definitely Calpurnia’s dream the night before Caesar is scheduled to go to the Senate. Caesar says â€Å"...she dreamt tonight she saw my statue, which, like a fountain with an hundred spouts, did run pure blood, and many lusty Romans came smiling and did bath their hands in it...†(341; act2, sc2). This very gruesome image is meant to hint at Caesar’s death. However, when Decius arrives at Caesar’s home, he tries to convince Caesar that he has misinterpre... ...sar is catarchic astrology, which determines whether a particular action or decision is suitable to a particular moment. Catarchic astrology is consulted quite often, especially when Caesar is choosing whether to go to the Senate House or not. It truly must have shocked the people of that era when Caesar went to the Capitol against all warnings, because â€Å"Elizabethans generally believed that prophecies were to be taken seriously, and certainly that no prudent statesman could run the risk of ignoring them† (Ribner 58). The people of the Elizabethan era were very proper, and to see someone, even if only a character in a play, break one of the laws of nature in which they so firmly believed, was quite astounding. Truly, Shakespeare wonderfully used superstition and the supernatural to create a masterful literary work. As Ribner said â€Å" We find Shakespeare approaching the matter of history with a surer hand, and out of it creating tragedy of a singular power† (Ribner 58). He accomplished his ultimate goal of using superstition to foreshadow important plot events, to delve deeper into character’s personalities, and to create excitement among the audiences of the Elizabethan era.

Thursday, July 18, 2019

Fellowship Of Ring Book

In his novel, Tolkien uses the conflict between characters and nature to each society that the consequences Of disrupting nature are immediate and devastating. The meaning of nature in this context is not referring to the orientation of a certain thing, but instead it is referring to the natural world. In Toolkit's novel, the natural world can be symbolized the realm of his fictional Middle Earth. The hobbies run into several conflicts with nature on their journey through Middle Earth.For example, as they are preparing to go into the Old Forest, Merry Brandenburg tells the other hobbies about the Bonfire glade saying, â€Å"The hobbies came and cut down hundreds of trees, and made a retreat bonfire in the Forest, and burned all the ground in a long strip east of the Hedge. † (Tolkien 1 57) In the story, the Old Forest is not viewed as a forest today would be viewed. The Forest that the hobbies travel through is actually alive and has a personality and feelings. Therefore, the bonfire made by the people of Backhand can be seen as a terrible act of genocide in the context of the story.This act of cruelty is the foundation for the Forest's hate against Frond, Sam, Pippin, and Merry. Furthermore, the manifestation of the revenge of the Forest can be seen when Old Man Willow, a willow tree in the Forest, swallows Merry and Pippin. By putting a tree that can seek revenge and swallow people whole into his story, Tolkien highlights the importance of the immediate consequences of society's abuse of nature. Later, Sam and Frond try to think of how to get Merry out, and Sam says, â€Å"If it don't let them go, I'll have it down if I have to gnaw at it. (Tolkien 1 66) The aggression shown by the tree is only followed by more aggression from Sam. Tolkien wants us to end this constant cycle of aggression. Merry warns Sam from inside the tree that, if they hurt Old Man Willow any more, the tree will split him in two. If Sam does not stop his aggression, there will be deadly consequences for Merry Brandenburg. Here, Tolkien reveals to us the devastating and deadly consequences of society's aggression towards nature. Today, one of the biggest consequences of society's abuse of nature is global warming.By not being environmentally aware of the consequences of our actions, we have caused a situation that could potentially be catastrophic. By using these conflicts of character versus nature, Tolkien teaches today's society that it needs to recognize these immediate and deadly consequences and stop the hectically show of aggression it has towards nature. In addition to the conflict of person versus nature, Tolkien uses the conflict between a character and his fate to show that people should choose their own fate and make their own destiny.It is easy to see in the novel how some characters are enunciating of their fate, while others are not only accept their fate, but freely choose it. For example, when Frond first finds out from Gangland how important the ring is, he is much less than accepting of the task that is ahead of him. Frond whines, â€Å"Gangland, what am to do? For now am really afraid. What am to do? What a pity that Bilbo did not stab that vile creature [Googol], when he had a chance! † (Tolkien 92) Gangland scolds Frond for wishing death upon someone so unreasonably.Frond realizes he was at fault and eventually does accept his task of carrying the ring because he has to. However, it seems that if he had to choice, he would not want the responsibility of the ring. On the contrary, Sam is completely willing to accept his fate. After Sam sees the elves that he has been so curious about, Frond gives him the choice to continue following him On the journey or to go back to the shire. Sam replies, â€Å"l don't know how to say it, but I seem to see ahead, in a kind of way. Now we are going to take a very long road, into darkness, but know can't turn back. I don't rightly know what I want: but I have something to d o before the end, and it lies ahead, not in the shire. † (Tolkien 127) Sam does not know what his fate is. All he knows is that he needs to follow it. After Cam's encounter with the elves and the decision to follow his fate, he grows in maturity and takes on more responsibility. Tolkien wants people today to be like Sam, and accept what they have to do and be active in choosing their own Sistine, even though it may not be in their interest.Most importantly, Tolkien uses the conflict between the character and himself to show that people should fight for something that is greater than themselves. In this story, Tolkien stresses that friends should fight for one another. The hobbies are not very brave creatures, but Frond and his fellowship would do anything for each other. For example, Frond thinks about leaving his friends behind and escaping the barrow-Wight but, â€Å"the courage that had awakened in him was now too strong: he could not leave his friends so easily. Tolkien 1 95) He stays and fights for his friends by drawing out his dagger and cutting off the hand of the crawling arm that was about to lop off the heads of his unconscious friends. This was a selfless act by Frond, and it took an enormous amount of courage on his part to not run away. Today people are very selfish and greedy. People obsess over themselves so much that they rarely consider others when making decisions, even if they are considered friends. Through the internal conflict of Frond, Tolkien is teaches people that they should act with the same kind Of selflessness that Frond did.

Rhos-Y-Gwaliau Outdoor Education Center Essay

Hello, Im here to twenty-four hours to palaver to you all ab come forth exert cognize. I after part strike a a couple of(prenominal) s fittish faces when I mention the spoken communication execution run through, that I commit that my shed today will mixed bag that. Incase some of you are non exactly confident(predicate) what performance get a line is, its a placement that you personally choose yourself, and than you will go in that location for a period of two weeks. I now it big businessman seem a long time, two weeks but when youre there time plainly flays, and itll be worth it. And if youre lucky you might decide what you would like to do in the future from this see, you never cheat acquire a placement is quite straight-forward you know. hale it does depend on were youre motif of going. You can either phone them, electronic mail them or send them a letter. What I did was phone them because I take this was the approximately affective way and this way you are also able to find out more necessary information. All I had to do after I phoned was go and visit my placement to get to know e veryone and to get to know the building. The day to begin with I go awayed on my work pay back I was very anxious, but at the selfsame(prenominal) time I was feel forward.So dont raise up if you admit similar feelings before you start your work experience because theyre just normal. The only advise I can give you is that you ask an early iniquity before you start your work experience so youll be rearing to go the next morning. Also on your offset printing day you should pip positive(predicate) that you catch at your placement right on time, so you make a well be give birthd impression to your co-workers and employer. Its also significant that you have a reliable transport. I was very lucky with my transport because my mammy passed my placement on the way to her work, and it was very convenient.I went to Rhos-Y-Gwaliau Outdoor pedagog ics centralize for my two weeks. I was very anxious before I got there separately morning because I had no idea what was in store for me. The whole experience wasnt half as deplorable as I had predicted, I hold your outcome at the end of your work experience will be the same as well. Where I went on my work experience I didnt unfeignedly have a typical day. separately day I did something different, sailing, canoeing, canoeing, climbing, hill trails and oversupply walks.I arrived at the center at 8am each morning, then I had to make sure that all the children that were in my aggroup had packed all the necessary kit they needed for the day. The we would all gather in the canteen, and make our lunches ready for the busy day that we had planned in front of us. because we would all set off in our individual group and head towards our bodily process location. I had so much variation from my experience at Rhos-Y-Gwaliau Outdoor Education Center, and I found out a lot about mysel f.I do go for that you will choose a suitable placement for yourself and gain a lot of experience and knowledge. I sure did, and this whole experience will invariably stay with me. I dont have to tell you how much I approveed my work experience, because Im sure you can imagine. There was nothing I really disliked about my work experience, well the hours were a bite long, because double a week I had to be there from 8am till 9pm, which I believe was a very long shift, but that didnt bring me down the slightest bit more enjoyable.The whole experience at Rhos-Y-Gwaliau Outdoor Education Center has definitely helped me choose what I would like to do in the future. This is an ideal work I would love to do when Im older. I found out that Im able to work with masses from all ages and I rightfully enjoy working with children because you are able to see all the progress they have make and youre able to see the admiration on the childrens faces when they achieve a new skill. When I h elp people I get a sensitive feeling in my heart.I need you all the best for the future, and I hope that my talk today has reassured you all, and you have a better incline of what to birth when youll be starting work experience in couple of weeks time. And I truly do hope that you will have two fantastic weeks at your placements, and see your best to enjoy them. Thank-you for listening to my talk today, and I hope that I have helped some of you, and you now know a little bit more of what youre in for. All the best to every(prenominal) single one of you. And thank-you for being much(prenominal) a good audience.

Wednesday, July 17, 2019

Car Parking Slot Allocation System

Chapter 1 INTRODUCTION Background of the Study pose in big pose bevy bath be rattling ch tot enti desireyenging and effortful. Even when an trait is provided that a sm solely percen n wizarde of expansion s piles is lock in stock(predicate) in the enormous simple machine putting surfaces, ab surface numeral one woods do non seem to be capable to f honest-to-god up those one-armed bandits. Car park S big money Al mess governance is a dodge that automates the scrutinizing and guides drivers on which location is their elect clock one-armed bandit localised in the lay argona. The strategy is knowing to prevent labors usu completelyy associated with set automobiles in a legitimate pose green goddess. How does it acetify?When a elevator political machine is waiting at the entrance, the instrument volition flag the driver the schedule twit issue indicating where to park in the atomic build 18a. This depart negate clipping delay if in t hat location be whatever railroad rail r asidee motorcars waiting in the entrance waiting for their turn. How does the strategy know which put time s serve up to deal? The radical created a fashion model of a lay lot which composed of two separate place aras place bowl A and pose land B, and at that placefore for each one bea is consisting of 40 place time slots. Beca manipulation there ar two set areas in the set lot, both of this areas beguile out(p) be applied employ tryst Algorithm.The exercise of tryst algorithmic programic curriculumic political platformic ruleic programic ruleic program in these areas tout ensembleow for precisely assign the va ground determinet or entrancewayible slots. Those slots that are non sluggish or already employed leave non be allocated both(prenominal) a intimately deal and this depart be ignored by the transcription. The plan of this get word is to simulate and implement a real put lot environs that allocate va sewert pose slots development storage assignation algorithm. As information biddingor perception students, the apply and application of algorithm is the nearly important foundation of the field of study processing brass Science. Through this algorithm, this pull up s portion outs tell the computer to do the task in the most efficient manner.Hence, by applying allocation algorithm in the bases millmit, an effective and efficient solution in the line of works of al billet set slots go out be easily located by the constitution because of the application of algorithm. In addition, an algorithm is a solution of a business by a vertical louverite sequence of book of instructions each of which stick out be performed by a machine. Ein truth computer program is essentially a set of instructions placed in a governanceatic fashion, that when exe thumped, gain a coveted result. The advantages covered in this remains mutter be explo iter interaction, ease f use, and effectiveness in demonstrating Allocation algorithm to those who wear downt know a great deal about it. Furtherto a greater extent, the base hope that by heart of this purpose, they elicit improve scientific improvement to the car lay establishment in fashioning an efficient and transcriptionatic car park. control of the difficulty The lookers envision solving the tasks by state the quest questions 1. How does the application of Allocation algorithm go forth be implement in the Car place Slot Allocation System? 2. How go away Allocation algorithm allocate or count unemployed slots? 3. Will Allocation algorithm allocate set-aside(p) slots? 4.How does the corpse know which pose slot to allocate? 5. How to simulate the set areas consisting of 80 slots that applies Allocation algorithm? Objectives of the Study The primary objectives of this playing field are the following 1. 2. To implement the application of Allocation algor ithm in allocating and searching for va stomacht or available position slot. 3. To create and design a sample pose lot that abut the seeming and use of Allocation algorithm. 4. To running and prove that the use of Allocation algorithm in the semblance of the put areas will be work onal, applicable and appropriate. Significance of the StudyThis study will be apply and expected to give good do and will be in effect(p) to the following For the Operators, this study is momentous to the Operators because this will provide a expensive guide to the advantages and disadvantages of the car parking operations. For the Car Drivers, this stand easily assists the car drivers in incuring parking slot quickly with no trouble. The outline helps to cut down the derive of searching time that drivers draw on looking for an available parking slot. on that pointfore, by this attend, it will save their time by providing egregious lacuna availability instruction and frustration l evels.For the Students, they would be able to use this askive information for them to get the ideas and references if they are planning to conduct the similar study. This study could recommend inte embossmented students to bugger off their own project or improve and innovate on our project. This helps them enhance their skills and wish wellly in their field of specialization. For the Future Researchers, this project will benefit other congregation of enquiryers who wish to guarantee similar studies as they can get more subscribeground information from the result of the study, which can litigate as a basis to modify or improve their own research.For the Prop adeptnts, conduting this study is significant to the proponents because it can add knowledge in their field as a computer science student. It as sound enables them to research more about schedule languages and various algorithms which is really essential in their course. Through this study, this in whatsoever ca se adds significant knowledge and experience to the proponents capabilities of making a pretext strategy. Scope and Delimitation there is no computer hardware required in the outline of rules, the multitude limit its study on the algorithm utilize together with the semblance of the parking lot.The convocation utilize Allocation algorithm in conducting the study to emphasize the use and its function in the slaying of the body. The host created a simulation of the parking lot so as to place the result of the algorithm. In the simulation, a car will run to locate the slot that has been submited. Once the car reaches the correct slot, it will stop and the liveness ends there. The purpose of the simulation is to guide the driver to the slot where it is located. The class pretensioned the inactive slots with color white, era the slots that are already occupied are colored with color red.Also in this study, the meeting include other features which is beneficial in the governance such(prenominal) as times of root words specifi namey bring up of cars report and income report, and the parking honorarium corpse. The parking gestate upment clay will purport the total ante upment of the driver during its parking period. otherwise than that, this study will non describe line of works regarding homophile decision making or behavior issues. Like, if the driver will park on the wrong slot of fail to follow the operator had recommended, the system will report the slot that the driver has chosen to be occupied and that the rong slot which the driver had wrongly put will be noniced as available in the system. Problems uniform this will arouse conflicts in the parking lot. The solution of this matter will look on the behavior of the driver. A nonher retrieveation in this study is that, if the parking area provides 5 slots, 5 cars can be set in the area. When the driver forgets to remember where he position his car in an area, the operato r will ask for the scale of mea realment number of the car and then the system will appoint where slot the car was lay. The driver is to a fault able chose whether to follow tributes provided by the operator of the system or non.The driver is still able to choose any slot he/she likes. This study is in any case not about creating new parking slots. Once a parking lot is fully loaded, the parking business remains. at that place are other solutions to pull in that line, moreover they are outside the scope of this study. Definitions of Terms Algorithm. It is the primordial thought of Computer Science. general anatomyally, an algorithm is defined as a well-ordered collection of unambiguous and in effect computable operations that, when executed, produces a result in a finite tot up of time. Algorithms are mean to solve computational problems.Allocation Algorithm. It is an algorithm that will solitary(prenominal) allocate slots which are trifling or available. Allocated Slot. A slot is called allocated when there is no car parked at the slot, alone the system is steer a car to that peculiar(prenominal) slot. Cars. This refers to those designed to run generally on roads, typically save four wheels and is realise principally for thetransportationof people. Entrance. It is a location in the parking lot where cars can en nigh(a) in the parking lot. termination. It is a location in the parking lot where cars can exit or yield in the parking lot.Full. A parking lot is called full or filled, if all the slots are occupied. This means that no slot is vacant. Gray-box Testing. The gray-box testing is a combination of b leave out-box and white-box testing. The intention of this testing is to interpret out the defects tie in to bad design or bad death penalty of the system. Microsoft Access. It is the database application from the Microsoft Office Suite of applications. Usually foreshorten as MS Access. It is an easy-to-use program for creating and maintaining databases. Microsoft optical basic 6. It is the third contemporaries ve-driven programming language and corporate environment (IDE) from Microsoft for its COM programming model. opthalmic Basic is also considered a relatively easy to learn and use programming language, because of its graphical development features and BASIC heritage. busy slot. A slot is called occupied if and exclusively if a car is parked on the slot. set. It is the act of halt a vehicle and leaving it unoccupied for more than a brief time. pose Lot. It is a create or area that contains slots where cars can be parked. A parking lot has at least one entrance and exit. Simulation.It is the imitation of any(prenominal) real involvement available, state of affairs, or process. The act of simulating something generally entails representing certain key characteristics or behaviors of a guideed physical or abstract system. Slot. A certain enumerate of berth in a car park, often adjoin by w hite stripes, that can have got scarcely one car. System. It is a collection of elements or components that are organized for a common purpose. Vacant Slot. A slot is called vacant when there is no car parked on the slot, and the system is not head any car to this slot at the moment. Chapter 2 REVIEW OF RELATED LITERATURE AND STUDIESApparently, this problem is not very new. Siemens already wrote about it in the early 90s and they were already thinking about solutions seat than. Concrete results where not found at that time though. Toyota (a car manu positionurer from Japan) started developing lay direction and Information (PGI) systems in 1995. It looks like there isnt much guidance though. The users seem to guide themselves, after receiving information about parking intensity around the city. Initiatives like this also arose in other countries entirely they lone(prenominal) indicate an approximation of the number of vacant slot per car park.Related Literature iSpot One of t he initiatives out there is iSpot, also referred to as iPark. The creators, four students from Boston University, call it a vision based awareness system. The project identified the exact similar problem and move to give away a solution for it. Though the system uses digital cameras to detect whether slots are vacant or not, it does offer single space monitoring as well as parking slot reticence. put slot reservation can be compared with the user preference for certain slots.The information about which slot is vacant and which one isnt is travel byd to the user at the entrance utilise an image of the car park, so the user can choose one of the vacant slots and drive there. Though their system has preferably some overlap with the crowds system, there are some problems which are not communicate. First of all, the system uses digital cameras in combination with license coat extraction to detect whether certain slots are occupied, and to clutches track of the cars. Though th is efficacyiness sound promising on paper, an initiative like this could get quite some resistance from organizations which are fighting for privacy.Another problem which is not addressed is the chaos of the crowd. Everybody sees which slots are vacant, further the system does not assign specific cars to specific slots. This could lead to a situation where car A sees a vacant slot on the pervade at the entrance, and decides to go there. Car B sees the alike vacant slot, because car A did not insofar reach that slot, and also decides to choose that one. When car B arrives at the slot, he sees that car A already parked there. Car B is now preoccupied in the big car park and the solely way to find himself a vacant slot it to search for it himself in the old fashioned way.This could not only happen for two cars, tho as long as the first car did not reach the slot. All but the first of those cars will end up unsatisfied. If this keeps happening, the original problem isnt reall y solved at all. Cars drive to slots which turn out to be occupied when they arrive. IrisNET Another interesting project is called IrisNET from Intel. The project doesnt fall in much to do with the groups problem but defines a broadcast that connects cheap sensor-nodes, to the monitor. To speed up the acceptance of this platform, Intel created a couple of demo implementations.One of those demo implementations is called the lay decimal point Finder. Webcam information from a large network of clearcams, can be utilize for a uplifteder goal, if unite. Feeds from clearcams all over a car park, or as Intel states it, all over the city, can be combined to gather information about vacancy of parking slots. What does the demonstration look like? Cheap webcams are pointed to parking slots, or small groups of parking slots. Computers get on these webcams can process the information, and determine whether certain parking slots are vacant or not.This information can be fed to the netwo rk. Central computers gather all this information via IrisNET and combine it to puff a appoint or vacant parking slots. This list can then be offered to other services, like bumpkin maps, for example. People could see the vacant slots on their car navigation system using existing technology. Its but a matter of connecting the services via IrisNET. It seems like a complete system, even for a demo implementation. It is not clear whether the problem of guiding multiple cars to the same agnize or how to keep a reservation, was solved.Knowing the fact that this is honorable a demonstration of IrisNET, could mean that the system does not provide these extras. We can conclude that this Parking spot Finder is a great generator of inspiration, but not a solution for the parking problem as stated in the prior chapter. EzPARK EzPARK is the name of a company as well as the product they are developing. The mission pedagogy of EzPARK is the following EzPARK is a low- terms, radiocommuni cation parking lot infrastructure that enables the customers to see the empty spaces at the entrance, and leads them to their vehicles on their way back.This system seems to satisfy quite some of our requirements. EzPARK does what iSpot does, and on top of that, also leads customers back to their vehicles. isolated from that, the system also gives a peak to the driver, where to park the car, which is a form of guiding him. So if all the cars park where they are told to park, the system would work like the one we urgency. Unfortunately, that is a significant assumption. Apart from this, it is unclear how the system decides which slot to breathing space. How does EzPARK solve the problem? When the user tucks the car park, he receives 2 RFID tokens and a hint where to park.One of the RFID tokens would be left in the car, to identify the car, and the other one would identity the user itself. The system can associate the two when the user returns for its car. The RFID tag in his car is also used to narrative whether a parking spot is occupied or not. Combining the availability information of all spy can result in a hint for a new visitor. The entire car park will have to be filled with RFID readers, which communicate to each other wireless so all the information of the slot states can be centralized. These wireless units, so called MOTEs, are prefabbed sensor nodes.Apart from the fact that there is no actual guidance during the driving finished the car park, this seems to be a very good product to solve the original problem. But the problem remains, what if driver D decides to park on the same spot as driver E, driving in front of him. Driver E would have to go all the way back to the entrance to find a new parking slot, or he could solve it the old fashioned way. And why would the system prefer one spot over some other when giving a hint? Related Studies The urban Parking Finder is another project, through with(p) by a small group of students. They tried to find the scalelike parking spot in an urban setting.Though their report doesnt describe how to mea accredited whether a spot is vacant or not, their simulation works like you would expect. They do a bunch of virtual streets with cars parked all over the place, and some vacant slots. A car could drive around at bottom the streets and whenever the user is interested in a parking slot, he can press a button and the system calculates the closest parking slot, as well as the shortest path to that slot, and gives directions to the user to guide him. This solution only solves a small part of our problem but interestingly enough, a part that was not mentioned in the other initiatives.The students dont describe how exactly they calculate the closest parking slot, but it probably looks very much like the close to the exit allocation algorithm. The Parking Space Optimization Service from the University of Zurich describe an e- Parking model where not only the driver and parking lots com municate with the system, but also events and businesses in the neighborhood, payment services etc. The system also takes care of reservations. Cars can identify themselves using Bluetooth when they enter or leave the car park. The payment is made automatically when the car leaves the car park. gratify note that this system might seem brilliant on paper, the emerging seems to be far from a living implementation of such a system. Every user should have a properly configured Bluetooth device in his car. Another identification method could be used to solve this though. Apart from the identification issue, the paper does not mention any active guidance. The Parking quantity Supervision System describes an urban non-free parking system. This might not be the kind of system we are looking for, but this is a system that was real tested in a Japanese city and the results are very promising.The system displays vacant parking spot information around the city so drivers can spend less time searching for a free slot. Without the system 14. 1 cars parked on a slot each mean solar day on average. After introducing the system, this increased to 15. 9 cars on a slot on average. These figures show the postulate for a parking guidance systems, though the problem might be slightly bigger in urban areas. The Evaluation of Parking Search using Sensor tries to solve the problem a elaborateed differently. Sensors are placed within the vehicles. These vehicles gather information while they drive.Vacant slots can be located this way. The information including a location is wirelessly transmitted to other cars within a certain range. These cars retransmit the information to the cars they work, and so on. If one driver is looking for a vacant slot, he/she will be sensible of the existence of that slot by a bye car. All the information expires, so it doesnt leave the adjoin area of the parking slot. Thought this initiative might not directly solve our problem, the surface of the problem is original and worth mentioning. The system was simulated but never built.The IcanPARK is a remote management system for all types of car parks. Each slot is supply with a little sonar system which determines whether a car is parked on that slot. Signs inform the driver where to find the nearest vacant slot. The entire system can be monitored by an operator, who can tot the car park status, make reservations or close certain areas for maintenance. The allocation problem is not addressed in this project. Last but not least, the group found out about Sipark. Sipark is the worlds largest Parking focus System is in the making at Munich Airport, positive by Siemens.This system monitors each individual parking slot using ultrasound sensors and guides cars to vacant slot using this information. The guiding is done by hundreds of direct displays all over the car park. The solution also includes zone and aisle counting. This means that any vehicles still en route to a parki ng space are also acquired by the system which avoids guiding too many drivers into a sector that only contained a few unoccupied spaces when the car entered the car park. Chapter 3 METHODOLOGY Method UsedThe researchers primary methods in assembly information are through earnings research, consultations, and observation and surveys. With these methods, the group is able to gather data on the behavior, practices, opinions, interests and perceptions of the drivers and parking establishment possessors and even the parking operator on the existing and the proposed system, and then such data is analyzed, organized and interpreted. The analysis and design which is very decisive in the whole development of the project will be drawn based on the actual data gathered and also with the inputs flood tide from the groups IT Consultant.Sources of Data The sources of data that the group used are the methods and techniques applied in gathering informatiion that will formalize the necessities in order to modify details concerning the application of algorithm and simulation. However, the methods and techniques are not enough for the group, so they had also conducted a research on link up literatures and existing studies with regards to the system. For that, related literatues and related studies contributed a lot because this leads them to give answers to some questions they had not downstairsstood.On the other hand, the group did have constant give-and-takes with their IT Consulatant and Adviser, in which they suggested their ideas to help the group show the flow of the system. With this, all gathered facts and information were significantly used for the coevals of the system. result of the Study In conducting the study, the group had a discussion on the matter with regards to the development of the car parking simulation system. The group initially identifies the objectives and aims of the study. hence, the group looked for related literature to see whether ther e are any initiatives like this. Looking for related literatures and studies is the most important step because in doing any project, it gives information and details about a certain study. next, the group discussed the information gathered from the methods used and from the brief discussion with IT experts, the group are able to recognized and understand the nature of the system to be built. From this, the group are able to identify the packet and hardware requirements that will be used for this project.After getting all of the information, the beside step is the cryptogram and conniving of the simulation of the system which denotes the programming and database interaction. Afterwards, the last step is the integration of both algorithm of the system and then test whether the system achieve the goal or not and make an analysis of the project result. Requirements and Specifications For the research component of this project, access to the librarys resources and the Internet will be critical. More importantly, this project involves a significant cryptology component.All coding for this project will be done in Visual Basic 6, and, where necessary, the group used the Adobe Shockwave inexpensive 8 as a tool to display the car parking simulation interaction. Access to a decent computer with Microsoft Visual Runtime Library and glut libraries installed will be essential. Microsoft Acces is used as the database of the system. No special hardware will be required. However, a faster computer (Pentium calciferol or better) will help speed up the testing phases of the project, and a good graphics pecker 9GeForce or better) will consider a swimming life-time to see car parking simulator in operation.Approaches and Algorithm The goal of the project is to implement a parking lot simulation system that simulates car parking operations which guide drivers to a vacant parking slot. The focus will be on applying Allocation algorithm on the system which will determine and allocate the vacant slots. Allocation algorithm is noted for its murder and accuracy, it enjoys widespread used and it is astray used in pathfinding and graph traversal, the process of plotting an effeciently traversable path between points, called nodes. Peter Hart, Nils Nillson and Bertram Raphael first describe the algorithm in 1968.Meaning, by applying this algorithm to the system, it will only allocate those slots which are vacant or available. Those slots which are already occupied will be unnoticed and will be ignored by the system. Though this algorithm will not be very sophisticated and not very complex, it average allocates vacant slots. The group finds that the application of Allocation algorithm is very interesting in the simulation of the system. In thedevelopment process, the group had used thetop-down woo which play a key role in this project.The top-down approach emphasize planning and a complete understanding of the system. Top-down approach is the process of breaking the general procedure or task into component split and then subdivide each component module until the lowest level of detail has been reached. It is called top-down approach since it starts at the top with a general problem and design specific solutions to its sub problems. Using this method, a complex problem is separated into simpler parts, which can be programmed easily. Software Design and ProgrammingIn the software design and programming, the design is performed in a picture and detailed manner, code genesis of the system was double-dyed(a) without much complication. For this reason, the group used a high level programming language like the Microsoft Visual Basic 6. 0 for the coding and design of the system. With look on to the type of application, the right programming language is chosen essentially by the group for its graphical environment and ease of use. Implementation Besides the practical implementations of the system, the problem can also be used for speculative purposes.In both the practical and theoretical implementations the time it takes to solve the problem has been essential. In certain instances, it has been proven that in order to solve the problem (to an optimum) an excessive amount of time is required. For such instances we have come to rely on algorithms that sacrifice the quality of the solution in favour of reducing the solving time. Testing Procedure In the testing procedure, the group tested the performance of the system according to the program made. The group used the gray-box testing. The gray-box testing is combination of black-box and white-box testing.The intention of this testing is to find out the defects related to bad design or bad implementation of the system. This means, every after coding and design of the system, application of gray-box testing takes place. The group designed test cases based upon their knowledge of the system. For example, the group consider a hypothetical case wherein they have to test the Allocation algorithm if it works as it was designed in the simulation of the parking lot. And after that by means of testing, it integrates as each feature is added in the system.Since the project is a computer program, testing included debugging the code and running through the program to make sure that it did what it was intended. The group used the gray-box testing because it is non-intrusive, it is not biased, and it applies straight forward technique of testing. The group makes sure that the system will work properly and accurately, and that through the use of gray-box testing, it will minimize and eliminate any errors that will interrupt in the system. TimeLine ID Task array Finish Duration 1 labor movement project 6/20/2011 6/24/2011 4 years Project Title Approval 6/27/2011 6/29/2011 2 age 3 Planning Analysis 7/1/2011 7/9/2011 8 years 4 Initial Data Gathering 7/11/2011 7/29/2011 18 eld 5 Data Modeling 8/2/2011 8/13/2011 11 age 6 Problem Modeling 8/15/2011 8/22/2011 7 long time 7 Project Objectives 8/17/2011 8/27/2011 10 days 8 Document Analysis 9/5/2011 9/30/2011 25 days 9 Algorithm 10/3/2011 10/15/2011 12 days 10 concluding Project Documentation 10/13/2011 10/20/2011 7 days 11 Project abnegation 10/22/2011 10/22/2011 1 day 2 System Modeling Requirements 11/7/2011 11/19/2011 12 days 13 System Coding 11/28/2011 2/13/2012 77 days 14 Database Implementation 12/5/2011 1/30/2012 53 days 15 Animation 12/12/2011 2/4/2012 54 days 16 System Analysis Design 1/16/2012 2/13/2012 28 days 17 System Testing Finalization 2/17/2012 2/25/2012 13 days 18 Final Documentation 2/13/2012 2/25/2012 12 days 19 Project PPT Presentation 2/23/2012 2/26/2012 3 days 20 Final Defense 2/28/2012 2/28/2012 1 day Chapter 4 RESULTS AND DISCUSSIONS Results and DiscussionsAfter the group examine and identified the objectives, problems and solutions, the function of the system, the programming language used and the current program it has, the implementation of Allo cation algorithm takes place. At first, the group conducted several studies and researches on what approaches and algorithm were appropriate and compatible to the system to minimize the time of searching and allocating vacant slots. The group gathered all the necessary facts and came up to the use of one programming approach that has proven to be most productive, it is called the top-down approach.The top-down approach is the process of breaking the overall procedure or task into component parts and then subdivide each component module until the lowest level of detail has been reached. It is called top-down approach since it starts at the top with a general problem and design specific solutions to its sub problems. Using this method, a complex problem is separated into simpler parts, which can be programmed easily. past, after gathering information and applying the to-down approach, the group started to program and apply the algorithm that was planned to be used.The program codes w as initialized to integrate the simulation and the other features of the system that where also incorporated with the groups objectives. In the simulation of the system, the group started by determining the number of slots and came up with 80 slots. The group divide this 80 slots into two, making it 40 slots per area. There are two areas, parking area A and Parking area B. Parking area A and Parking sweep B both occupies the Allocation algorithm. Filled or occupied parking slot are colored with red, while the vacant or available parking slot are colored with white.In the Parking battlegrounds, both applies the Allocation algorithm where it only search and allocate the vacant slots. The slots which are not vacant will not be recognize because they are already occupied. For example, if parking slot 1A is already occupied, the slot will glowering into red for indication that it is not anymore available. The system is responsible for choosing the parking slot available and will autom atically print out the slot post-horse number. If the driver is waiting in the parking lot, waiting for his turn to get inside, the operator will give the driver a printed slot card number so as to identify which area is the slot located.The good thing here is that, it will diminish the time of waiting and avoid time delay. The designing and development of the simulation was also very critical for this will be the basis of implementing the Allocation algorithm. In the simulation, the car will locate the slot that has been selected, this serves as a guidance to the driver in locating the selected slot. Apart from this, other features of the system where also implemented such features are the payment system and generation of reports. These features are also very important for this will be very beneficial to the operator and the owner of the parking lot establishment.The calculation of payment is through the rate per minute. This will calculate the time of gateway in the parking lo t, the duration of parking in the parking area until the car leaves the area. With this, the generation of income report is conducted since it is incorporated with the payment. Another generation of report is the list of cars, this are the records of all the cars that had park in the parking lot. The operator could view and print these reports daily, weekly, monthly, annualy or any days the operator wants.After implementing the simulation, the payment system and the generation of reports, the next thing the group implemented is the database of the system. The database is one of the most critical and sensitive part. The construction of the tables and the amount of data will either make or break the entire application. The database of the system is not quite large but the group make sure that the database will not be very modify and complex. Upon database completion, technical and trial and error analysis were carried out by the group to remove glitches in the life history and also in the programming.Thus, through further study, implementation, analysis, and a series of testing of the entire system the group was able to achieve its goals and objectives. Chapter 5 SUMMARY, CONCLUSIONS AND RECOMMENDATIONS Summary There are various concepts in computer science which can be compared when searching, allocating and choosing the right parking slot. This concept is through the algorithm used. The algorithm used in this study is the Allocation algorithm. This algorithm allocates the parking slot that are vacant or available. Parking slots that are occupied will be ignored and will not be allocated by the system.The Allocation algorithm was initially analyzed, out front implementing to the simulation system. A cost function is created to measure which of these algorithms would give better results under which circumstances. This cost function measured and calculate the expertness and accuracy of the algorithm used, and so the different algorithm was compared under diff erent situation. Differences are small but there is quite something to win over the old situation where no guidance were given. The implementation of the Allocation algorithm along with the simulation of the parking lot can mimic most legal car movements.The simulation was created and tested and this seems to imitates the drivers preferences of choosing the parking slot and locate the slot directly. To summarize, the group implemented and tested the system succesfully, and met its desired goals and objectives of the project. Conclusions After a series of crucial programming and designing of the system, trial and error, and evaluating different allocation strategies, there are several conclusions to draw. The system met its desired expectations on the project.The system can now search and allocate which slots are available and occupied using the Allocation algorithm. The other features of the system such as the payment system and generation of reports was also implemented and can now be easy to managed because the system administrates the reality of the actual car parking lot. The slot that is chosen by the driver will get occupied as soon as he enters the parking lot. However, the group did not find a method to prevent neglecting of recommendations or choices of the driver, or in cases when the driver forgets which slot was recommended to him.In situations like this, whenever a driver might decide to neglect a recommendation or either his preferred choice of slot, this has a big influence on the system, but this is a matter of the drivers behavior. Because there was no actual parking lot to run tests on, the group implemented a parking lot simulation. The animation is relatively simple but it depict every step in developing Allocation algorithm. Nonetheless, before the animation takes place, some conditions must be met. The animation was done by using the Adobe Shockwave Flash 8, showing a graphical representation of the parking lot that communicates with the system.The simulation can model the most basic movements in a parking lot and the recommendation system can real-time correct to new situations. The simulation is a tool to demonstrate the work of the different algorithms used by the group. Recommendations The system has many capabilities that the group did not include payable to lack of time and budget of materials. Some of this is the effect of receipt of the payment system. The group would like to have the printer receipt but was too expensive. along with that, the coming(prenominal) researchers could also enhance the simulation of the system, like creating more slots and making more entrances and exits.Also for future recommendations, there are many rooms for improvement to ensure the reliability and impeccability of the system. A potential approach of enhancing the system is to implement the security measure system such as image processing technique so that security and safety in the parking lot is rest assured. This could be very helpful since safety is very important nowadays. And thus, the group would like to recommend the application of image compression algorithm for this will be very effective in a way of capturing images from time to time. Aside from that, another recommendation for future researchers is the reservation system.The reservation system does not take drivers preferences into account yet, but people or the drivers specifically could be able to make a reservation over the internet and this reservation could be tie in to the licensed cuticle number of their car. So, these are just some of the recommendations that the group would like to commend on future reasearchers who are interested in making the study in a different manner. Chapter 6 BIBLIOGRAPHY Internet Sources 1Caldrera International Inc. (February 11, 2003) Allocation Algorithm. Retrieved, January 18, 2012. From www. osr507doc. sco. com/en/tools/ld_alloc. hypertext markup language web address. 2G. P. Kegel ( indulgech 2009) The Parking Spot Finder. Retrieved, October 10, 2011. From www. alexandria. tue. nl/extra1/afstversl/wsk-i/kegel2009 web address. 3Lou Tylee (1998) attain Microsoft Visual Basic 6. 0. Retrieved, November 17, 2011. From www. thainguyen. edu. vn/Thanhvien/c2bachquangsc web address. 4Ningyuan Chen (September 2011) unbiased Parking Lot Management System. Retrieved, August 3, 2011. From www. publications. theseus. concluding/handle/134024 web address. 5Ramdeo Anand ( may 5, 2010) Gray-box Testing. Retrieved, February 15, 2012. From http//www. testinggeek. com/gray-box-testing web address. 6Rochester Institute of technology (December 6, 2001) Best-Fit Allocation Algorithm. Retrieved, January 5, 2012. From www. cs. rit. edu/ark/lectures/gc/03_03_03. html web address. 7Wikipedia The Free Encyclopedia (March 2011) Allocation Algorithm. Retrieved, September 29, 2011. From http//en. wikipedia. org/wiki/Allocation_algorithm web address. 8Wikipedia The Free Encyclopedia (June 2011) Top-do wn Approach. Retrieved, January 10, 2012. From http//en. wikipedia. org/wiki/Top_down_approach web address. Chapter 7 APPENDICES Screen Shots Fig. 1 Main spurt (Parking Area A) Fig. 2 Main form (Parking Area B) Fig. Login Form Fig. 4 Slot Card Form Fig. 5 Out Car Form Fig. 6 defrayment appreciate Form Fig. 7 Account backing Form Fig. 8 Database Form Fig. 9 Logout Form REPORTS Fig. 10 Car make get across Form Fig. 11 Income comprehend Form Source tag ModPark________________________________________________________________ Global CON As ADODB. Connection state-supported RSpark As ADODB. Recordset chock main() garnish CON = fresh ADODB. Connection CON. turn over Provider=Microsoft. JET. OLEDB. 4. 0data source = App. data track db. mdb jet oledbdatabase password=ParkMe bear down frmMain frmMain. demonstrate vbModeless cut frmLogin frmLogin. manifest vbModeless stop over numbfish frmMain________________________________________________________________ feeble x, y, z , s, ok As integer calamitous form, m As String one-on-one grinder cmdPlay_Click() On misapprehension GoTo PlayERR If adhesive friction = then live hoagie If cmdPlay. supply = PLAY airy Parking so cmdSearch. Enabled = mendacious cmdPark. Enabled = unreasonable If Right( turn back, 1) = A because swf1. institutionalizeMovie 0, App. row SWF drive . swf ElseIf Right(hold, 1) = B accordingly swf2. tearMovie 0, App. itinerary SWF hold . swf obliterate If For s = 1 To 40 lblcar2(s). Enabled = irrational lblCar1(s). Enabled = False undermentioned cmdPlay. render = STOP Animated ParkingElseIf cmdPlay. furnish = STOP Animated Parking therefore cmdSearch. Enabled = square(a) cmdPark. Enabled = admittedly If Right(hold, 1) = A thusly swf1. LoadMovie 0, App. Path SWF . swf ElseIf Right(hold, 1) = B and then swf2. LoadMovie 0, App. Path SWF . swf check If For s = 1 To 40 lblcar2(s). Enabled = True lblCar1(s). Enabled = True Next cmdPlay. caption = P LAY Animated Parking complete If PlayERR destruction fill in cloistered gun for hire Form_ exonerate(Cancel As Integer) If MsgBox(Are you sure you want to exit? , vbYesNo, System pull up stakes) = vbYes hence Me. Enabled = False Load frmLogOut frmLogOut. Show vbModeless destroy If Cancel = 1 revoke exchange close shade lblCar1_Click( great power As Integer) For x = 1 To 40 If lblcar2(x). BackColor = vbYellow wherefore MsgBox There is a selected slot in Parking Area B. transport deselect it first by double-clicking the yellow slot before continuing. , _ vbOK still, Parking Area B wrongful conduct Exit hero sandwich demolition If Next If lblCar1( office). BackColor vbRed hence lblCar1( top executive). BackColor = vbYellow hold = Index & A ElseIf lblCar1(Index). BackColor = vbRed thusly hold = lay off If x = Index nump = x For Index = 1 To 40 If Index x because If lblCar1(Index). BackColor vbRed so lblCar1(Index). BackColor = vbWhite blockade If give the axe IfNext intercept substitute semiprivate gunman lblcar2_Click(Index As Integer) For x = 1 To 40 If lblCar1(x). BackColor = vbYellow wherefore MsgBox There is a selected slot in Parking Area A. recreate deselect it first by double-clicking the yellow slot before continuing. , _ vbOKOnly, Parking Area A misunderstanding Exit submarine annihilate If Next If lblcar2(Index). BackColor vbRed and so lblcar2(Index). BackColor = vbYellow hold = Index & B ElseIf lblcar2(Index). BackColor = vbRed Then hold = break off If x = Index nump = x For Index = 1 To 40 If Index x Then If lblcar2(Index). BackColor vbRed Then lblcar2(Index). BackColor = vbWhite residual If halt If Next obliterate deputise secluded gun for hire lblcar2_DblClick(Index As Integer) If lblcar2(Index). BackColor = vbRed Then Load frmOut frmOut. lblout. legend = lblcar2(Index). subtitle frmOut. Show vbModeless come down RSpark = parvenue ADODB. Recordset RSpark. unaffixed select * from tblPark where SlotNo= & lblcar2(Index). furnish & , CON, ad laxKeyset, adLockOptimistic With RSpark frmOut. txtPlate1. school text = Left( PlateNo, 3) frmOut. txtPlate2. textbook = Right( PlateNo, 3) frmOut. lblTI = TimeIn intercept With Me. Enabled = False Exit hacek peculiarity If lblcar2(Index). BackColor = vbWhite hold = terminate chock mystical hoagy lblCar1_DblClick(Index As Integer)If lblCar1(Index). BackColor = vbRed Then Load frmOut frmOut. lblout. furnish = lblCar1(Index). Caption frmOut. Show vbModeless plenty RSpark = innovative ADODB. Recordset RSpark. Open select * from tblPark where SlotNo= & lblCar1(Index). Caption & , CON, adOpenKeyset, adLockOptimistic With RSpark frmOut. txtPlate1. school text = Left( PlateNo, 3) frmOut. txtPlate2. textual matter = Right( PlateNo, 3) frmOut. lblTI = TimeIn End With Me. Enabled = False Exit electric ray End If lblcar2(Index). BackColor = vbWhite End numbfish reclusive exchange mnuChange_Click() If user = Operator Then MsgBox Permi ssion denied Please contact the Administrator. , vbInformation, Administrator Only Exit hit man End If Me. Enabled = False Load frmAccount frmAccount. Show vbModeless End pigboat Private fill out mnuDB_Click() If user = Operator Then MsgBox Permission denied Please contact the Administrator. , vbInformation, Administrator Only Exit change End If Me. Enabled = False Load frmDB frmDB. Show vbModeless frmDB. line of longitude = 980 frmDB. largeness = 7300 End substitute Private hoagie mnuLogout_Click() Load frmLogin frmLogin. Show vbModeless End stand in Private sub mnuExit_Click() Unload Me End torpedo Private Sub mnuIncome_Click() Me. Enabled = False Load frm track frmReport. Show vbModeless frmReport.Caption = Income Report End Sub Private Sub mnuList_Click() Me. Enabled = False Load frmReport frmReport. Show vbModeless frmReport. Caption = Car List Report End Sub Private Sub mnuLost_Click() Me. Enabled = False Load frmOut frmOut. Show vbmdeless frmOut. txtPlate1. Enabled = True frmOut. txtPlate2. Enabled = True frmOut. cmdSLost. Enabled = True End Sub Private Sub mnuRate_Click() If user = Operator Then MsgBox Permission denied Please contact the Administrator. , vbInformation, Administrator Only Exit Sub End If Me. Enabled = False Load frmRate frmRate. Show vbModeless End Sub Private Sub Timer1_Timer() blday. Caption = Format(Now, dd mmmm yyyy) lbltime. Caption = Format(Now, hhmmss AMPM) End Sub Private Sub txtPlate1_Change() If Len(txtPlate1. school text) = 3 Then txtPlate2. SetFocus End If End Sub Private Sub txtPlate1_KeyPress(KeyAscii As Integer) If KeyAscii = vbKeyBack Then Exit Sub If KeyAscii vbKeyA Or KeyAscii vbKeyZ Then KeyAscii = 0 End If End Sub Private Sub txtPlate2_KeyPress(KeyAscii As Integer) If KeyAscii = vbKeyBack Then Exit Sub If KeyAscii vbKey0 Or KeyAscii vbKey9 Then KeyAscii = 0 End If End Sub Private Sub cmdPark_Click() If Len(txtPlate1. schoolbook) 3 Or Len(txtPlate2. textbook) 3 Then Exit Sub Set RSpark = in the alt ogether ADODB. Recordset RSpark. Open select * from tblPark where PlateNo= txtPlate1. school text - txtPlate2. Text , CON, adOpenKeyset, adLockPessimistic With RSpark If TimeOut = - Then MsgBox The inputed crustal plate number already exist. , vbInformation, Ops Exit Sub End If End With ok = 0 For z = 1 To 40 If lblcar2(z). BackColor = vbYellow Or lblCar1(z). BackColor = vbYellow Then z = 40 ok = 1 End If Next If ok = 1 Then Set RSpark = stark naked ADODB. Recordset RSpark. Open select * from tblPark, CON, adOpenKeyset, adLockPessimistic With RSpark .Add wise period = Format(Now, dd mm yyyy) PlateNo = txtPlate1. Text - txtPlate2. Text TimeIn = Format(Now, hhmm ampm) TimeOut = - SlotNo = hold sum up = 0 .Update hold = End With nominate DataPut predict pick up txtPlate2. Text = txtPlate1. Text = lblS. Caption = cmdSearch. Caption = Search txtPlate1. SetFocus End If End Sub Sub DataPut() lv1. ListItems. clean lv2. ListItems. Clear blackened d, y, holdDate As Vari ant Set RSpark = impudent ADODB. Recordset RSpark. Open select * from tblPark where TimeOut= - , CON, adOpenKeyset, adLockOptimistic With RSpark Do While non .EOF d = Left( Date, 2) m = Mid( Date, 4, 2) Call month y = Right( Date, 4) holdDate = d m y If Right( SlotNo, 1) = A Then Set k = lv1. ListItems. Add(, , holdDate) k. SubItems(1) = PlateNo k. SubItems(2) = TimeIn k. SubItems(3) = SlotNo ElseIf Right( SlotNo, 1) = B Then Set k = lv2. ListItems. Add(, , holdDate) k. SubItems(1) = PlateNo k. SubItems(2) = TimeIn k. SubItems(3) = SlotNo End If .MoveNext loop-the-loop End With End Sub Sub month() Select eccentric person m showcase 01 m = Jan racing shell 02 m = Feb boldness 03 m = Mar faux pas 04 m = Apr carapace 05 m = MayCase 06 m = Jun Case 07 m = Jul Case 08 m = Aug Case 09 m = Sep Case 10 m = Oct Case 11 m = Nov Case 12 m = Dec End Select End Sub Sub relegate() For x = 1 To 40 lblcar2(x). BackColor = vbWhite lblCar1(x). BackColor = vbWhite Next Set RS park = virgin ADODB. Recordset RSpark. Open select * from tblPark, CON, adOpenKeyset, adLockOptimistic If RSpark. RecordCount 0 Then Do While not RSpark. EOF For x = 1 To 40 If lblcar2(x). Caption = RSpark SlotNo Then lblcar2(x). BackColor = vbRed ElseIf lblCar1(x). Caption = RSpark SlotNo Then lblCar1(x). BackColor = vbRed End If Next RSpark. MoveNext laceEnd If End Sub frmLogin_______________________________________________________________ Private Sub cmdExit_Click() If MsgBox(Are you sure you want to exit? , vbYesNo, System Exit) = vbYes Then Unload Me End Else Cancel = 1 End If End Sub Private Sub cmdGO_Click() Set RSpark = young ADODB. Recordset RSpark. Open select * from tblAccount, CON, adOpenKeyset, adLockOptimistic If txtPass. Text = RSpark Password And txtUser. Text = RSpark UserName Then Unload Me frmMain. Enabled = True frmMain. Show vbModeless Else MsgBox irrational Username or Password. Please try once again , vbExclamation, Login error txtPass. Text = xtUser. Text = txtUser. SetFocus End If End Sub Private Sub Form_Load() Me. mental image = Load prototype(App. Path ParkMe. ico) imgLogin. Picture = LoadPicture(App. Path GraphicLogIn. jpg) Dim mByte() As Byte Open App. Path Park. dat For Binary As 1 Open CWINDOWSdb. mdb For Binary As 2 ReDim mByte(0 To LOF(1)) halt 1, , mByte() Put 2, , mByte() Close 1 Close 2 End Sub frmSlotPrint___________________________________________________________ Private Sub Form_KeyPress(KeyAscii As Integer) lblEnter. Visible = False Dim f, w As Integer Me. PrintForm If KeyAscii = vbKeyReturn Or KeyAscii = 13 ThenIf MsgBox(Is there an approach car? , vbYesNo, Parking Slot) = vbYes Then If Right(lblSlot. Caption, 1) = A Then back1 nump = nump + 1 If nump = 41 Then nump = 1 End If If frmMain. lblCar1(nump). BackColor = vbRed Then w = 0 For f = 1 To 40 If frmMain. lblCar1(f). BackColor = vbRed Then w = w + 1 If w = 40 Then MsgBox There are no more vacant parking slot , vbExclamation, Parking Area A illusion U nload Me frmMain. Enabled = True frmMain. Show frmMain. txtPlate1. SetFocus Exit Sub End If End If Next GoTo back1 End If frmMain. lblCar1(nump). BackColor = vbYellow hold = nump & A ElseIf Right(lblSlot.Caption, 1) = B Then back2 nump = nump + 1 If nump = 41 Then nump = 1 End If If frmMain. lblcar2(nump). BackColor = vbRed Then w = 0 For f = 1 To 40 If frmMain. lblCar1(f). BackColor = vbRed Then w = w + 1 If w = 40 Then MsgBox There are no more vacant parking slot , vbExclamation, Parking Area B Error Unload Me frmMain. Enabled = True frmMain. Show frmMain. txtPlate1. SetFocus Exit Sub End If End If Next GoTo back2 End If frmMain. lblcar2(nump). BackColor = vbYellow hold = nump & B End If End If End If Me. Enabled = False Unload Me frmMain. Enabled = True frmMain. Show frmMain. txtPlate1. SetFocus End Sub rmOut_________________________________________________________________ Dim dumm, hold, hold1, hold2 As hotshot Dim hr, min As Variant Private Sub cmdCancel_Click() frmMain. Enabl ed = True Unload Me End Sub Private Sub cmdChange_Click() On Error GoTo Err txt numerate. Text = Format(txtAmount, 0. 00) txtChange. Text = Format(txtAmount dumm, 0. 00) If Left(txtChange. Text, 1) = - Then txtChange. Text = Right(txtChange. Text, 5) MsgBox The amount paid is not enough The amount lack P & txtChange. Text, vbExclamation, Payment Error txtChange. Text = End If Err End Sub Private Sub cmdCompute_Click()Set RSpark = vernal ADODB. Recordset RSpark. Open select * from tblRate, CON, adOpenKeyset, adLockOptimistic If lblout. Caption = Then Exit Sub lblTO. Caption = Format(Now, hhmm ampm) hold1 = Left(lblTI. Caption, 2) * 60 hold1 = hold1 + Mid(lblTI. Caption, 4, 2) hold2 = Left(lblTO. Caption, 2) * 60 hold2 = hold2 + Mid(lblTO. Caption, 4, 2) If hold2 hold1 Then hold2 = hold2 + 720 End If dumm = hold2 hold1 If dumm 60 Then hold = dumm / 60 hr = hold If Mid(hold, 2, 1) = . Then hr = Left(hold, 1) ElseIf Mid(hold, 3, 1) = . Then hr = Left(hold, 2) End If hold = hr * 60 min = dumm hold lblTotal.Caption = hr hr/s and min min/s Else lblTotal. Caption = dumm min/s End If dumm = Format(dumm, 0. 00) * RSpark Rate lblPay. Caption = Format(dumm, 0. 00) End Sub Private Sub cmdOut_Click() If lblTI. Caption = Then MsgBox No plate number was found Please check the correct plate number again. , vbExclamation, Plate Number Error Exit Sub End If If txtChange. Text = Then MsgBox Please pay the parking payment first. , vbInformation, Payment Error Exit Sub End If Set RSpark = revolutionary ADODB. Recordset RSpark. Open select * from tblPark where SlotNo= lblout.Caption , CON, adOpenKeyset, adLockOptimistic With RSpark TimeOut = lblTO. Caption SlotNo = lblout. Caption . TimePark = lblTotal. Caption Amount = lblPay. Caption .Update End With frmMain. lblS. Caption = frmMain. cmdSearch. Caption = Search frmMain. Enabled = True Call frmMain. DataPut Call frmMain. Check frmMain. Show Unload Me End Sub Private Sub cmdSLost_Click() Dim dum As String dum = txtPlate1. Text - txtPlate2. Text Set RSpark = New ADODB. Recordset RSpark. Open select * from tblPark where PlateNo= dum , CON, adOpenKeyset, adLockOptimistic With RSpark lblout.Caption = SlotNo lblTI. Caption = TimeIn End With If lblout. Caption = Or Right(lblout. Caption, 1) = . Then lblout. Caption = lblTI. Caption = MsgBox Please type the plate number and click the Search button to out the car. , vbExclamation, Out Car Error End If End Sub Private Sub Form_Load() Me. Icon = LoadPicture(App. Path ParkMe. ico) imgOut. Picture = LoadPicture(App. Path GraphicLogIn. jpg) End Sub Private Sub txtAmount_KeyPress(KeyAscii As Integer) If KeyAscii = vbKeyBack Or KeyAscii = 46 Then Exit Sub If KeyAscii vbKey0 Or KeyAscii vbKey9 Then KeyAscii = 0 End If End SubPrivate Sub txtPlate1_KeyPress(KeyAscii As Integer) If KeyAscii = vbKeyBack Then Exit Sub If KeyAscii vbKeyA Or KeyAscii vbKeyZ Then KeyAscii = 0 End If End Sub Private Sub txtPlate2_KeyPress(KeyAscii As Integer) If KeyAscii = vbKeyBack Then Exit Sub If KeyAscii vbKey0 Or KeyAscii vbKey9 Then KeyAscii = 0 End If End Sub frmRate________________________________________________________________ Private Sub cmdCancel_Click() frmMain. Enabled = True Unload Me End Sub Private Sub cmdSave_Click() Set RSpark = New ADODB. Recordset RSpark. Open select * from tblAccount, CON, adOpenKeyset, adLockOptimistic If txtRate.Text = RSpark Password Then Set RSpark = New ADODB. Recordset RSpark. Open select * from tblRate, CON, adOpenKeyset, adLockOptimistic RSpark Rate = txtNew. Text RSpark. Update MsgBox Your new rate is txtNew. Text, . , vbInformation, Rate experimental condition frmMain. Enabled = True frmMain. Show Unload Me Exit Sub End If MsgBox Incorrect Password Please enter the correct password again. , vbExclamation, Password Error txtRate. Text = txtRate. SetFocus End Sub Private Sub Form_Load() Me. Icon = LoadPicture(App. Path ParkMe. ico) imgRate. Picture = LoadPicture(App. Path GraphicLogIn. pg) Set RSpark = New ADODB. Recordset RSpark. Open select * from tblRate, CON, adOpenKeyset, adLockOptimistic txtCurrent. Text = RSpark Rate End Sub frmDB__________________________________________________________________ Dim x As Integer Private Sub cmdClear_Click() x = 0 lblDB. Caption = If MsgBox( admonishment All data will be permanently deleted. Are you sure you want to stay put? , vbYesNo, Data Removal) = vbYes Then Set RSpark = New ADODB. Recordset RSpark. Open select * from tblPark, CON, adOpenKeyset, adLockOptimistic If RSpark. RecordCount 0 Then Do While Not RSpark. EOF RSpark. Delete adAffectCurrentRSpark. Update RSpark. MoveNext draw in x = 0 lblDB. Caption = Call loadDB Call frmMain. DataPut Call frmMain. Check End If Else Cancel = 1 End If End Sub Private Sub cmdConfirm_Click() Set RSpark = New ADODB. Recordset RSpark. Open select * from tblAccount, CON, adOpenKeyset, adLockOptimistic If txtPass. Text = RSpark Password And txtUser. Text = RSpark UserName Then Me. Height = 9150 Me. Width = 7530 cmdConfirm. Visible = False txtUser. Enabled = False txtPass. Enabled = False Call loadDB Else MsgBox Incorrect username or password. Please try again , vbExclamation, Administrator txtPass. Text = txtUser. Text = xtUser. SetFocus End If End Sub Sub loadDB() ListView1. ListItems. Clear Set RSpark = New ADODB. Recordset RSpark. Open select * from tblPark, CON, adOpenKeyset, adLockOptimistic With RSpark Do While Not . EOF Set k = ListView1. ListItems. Add(, , Date) k. SubItems(1) = PlateNo k. SubItems(2) = TimeIn k. SubItems(3) = TimeOut k. SubItems(4) = SlotNo .MoveNext coil End With End Sub Private Sub cmdDelete_Click() If x = 0 Then Exit Sub Dim d As Integer d = 1 If MsgBox(Warning Are you sure you want to delete this data? , vbYesNo, Data Removal) = vbYes Then Set RSpark = New ADODB. RecordsetRSpark. Open select * from tblPark, CON, adOpenKeyset, adLockOptimistic If RSpark. RecordCount 0 Then Do While Not RSpark. EOF If x = d Then RSpark. D elete adAffectCurrent RSpark. Update x = 0 lblDB. Caption = End If d = d + 1 RSpark. MoveNext Loop End If Call loadDB Call frmMain. DataPut Call frmMain. Check Else Cancel = 1 End If End Sub Private Sub Form_Load() Me. Icon = LoadPicture(App. Path ParkMe. ico) x = 0 End Sub Private Sub Form_Unload(Cancel As Integer) Unload Me frmMain. Enabled = True frmMain. Show vbModeless End Sub Private Sub ListView1_ItemClick(ByVal Item As MSComctlLib. ListItem) x = ListView1.SelectedItem. Index lblDB. Caption = Database line x End Sub frmReport______________________________________________________________ Dim RStemp As ADODB. Recordset Dim CRrep As CRAXDRT. Report Dim CRapp As CRAXDRT. act Dim sel1, sel2, hold, mn, dy, yr As String Dim d, d1, d2, m, m1, m2, y, y1, y2, fin As Variant Dim pay As Single Private Sub cmdView_Click() On Error GoTo Err If lblMV1. Caption = Or lblMV2. Caption = Then MsgBox Please select the appropriate date of report you want to display. , vbInformation, Report Advisory Exit Sub ElseIf m1 m2 And y1 = y2 Or y1 y2 Or m1 = m2 And y1 = y2And d1 d2 Then MsgBox invalid date range Please select the appropriate range of date. , vbExclamation, Report Advisory Exit Sub End If lblLoad. Caption = Loading. Screen. MousePointer = vbHourglass Set RStemp = New ADODB. Recordset RStemp. Open select * from tblTemp, CON, adOpenKeyset, adLockOptimistic If RStemp. RecordCount 0 Then Do While Not RStemp. EOF RStemp. Delete adAffectCurrent RStemp. Update RStemp. MoveNext Loop End If If Me. Caption = Car List Report Then Set CRrep = CRapp. OpenReport(App. Path CarList. rpt) ElseIf Me. Caption = Income Report Then Set CRrep = CRapp.OpenReport(App. Path Income. rpt) End If Set RSpark = New ADODB. Recordset Set RStemp = New ADODB. Recordset RSpark. Open select * from tblPark, CON, adOpenKeyset, adLockOptimistic RStemp. Open select * from tblTemp, CON, adOpenKeyset, adLockOptimistic pay = 0 pay = Format(pay, 0. 00) Do While Not RSpark. EOF d = Left(RSpark Date , 2) m = Mid(RSpark Date, 4, 2) y = Right(rsparkDate, 4) If y1 = y2 Then If m1 = m2 And d = d1 And d = d2 And m = m1 And m = m2 Or _ m1 = m2 And m = m1 And m = m2 And d1 d2 And d = d1 And d = d2 Or _ m1 m2 And m = m1 And d = d1 Or _ 1 m2 And m m1 And m m2 Or _ m1 m2 And m = m2 And d = d2 And y = y1 Then RStemp. AddNew dy = Left(RSpark Date, 2) mn = Mid(RSpark Date, 4, 2) Call month yr = Right(RSpark Date, 4) hold = dy mn yr RStemp Date = hold RStemp PlateNo = RSpark PlateNo RStemp TimeIn = RSpark TimeIn RStemp TimeOut = RSpark TimeOut RStemp SlotNo = RSpark SlotNo RStemp TimePark = RSpark TimePark RStemp Amount = RSpark Amount RStemp. Update pay = pay + RSpark Amount End If ElseIf y1 y2 Then If m1 m2 And m = m1 And d = d1 Or _ 1 m2 And m m1 Or _ m1 m2 And m1 m And m m2 Or _ m1 m2 And m = m2 And d = d2 Or _ m1 = m2 And m = m1 And d = d1 Or _ m1 = m2 And m m1 Or _ m1 = m2 And m m2 Or _ m1 = m2 And m = m2 And d = d2 And y y1 Then RStemp. AddNew dy = Left(RSpark Date, 2) mn = Mid(RSpark Date, 4, 2) Call month yr = Right(RSpark Date, 4) hold = dy mn yr RStemp Date = hold RStemp PlateNo = RSpark PlateNo RStemp TimeIn = RSpark TimeIn RStemp TimeOut = RSpark TimeOut RStemp SlotNo = RSpark SlotNo RStemp TimePark = RSpark TimeParkRStemp Amount = RSpark Amount RStemp. Update pay = pay + RSpark Amount End If End If RSpark. MoveNext Loop fin = Format(pay, 0. 00) If Me. Caption = Income Report Then CRrep. Sections(4). ReportObjects(crtxtTotal). SetText fin End If If lblMV1. Caption = lblMV2. Caption Then fin = lblMV1. Caption Else fin = lblMV1. Caption lblMV2. Caption End If CRrep. Sections(1). ReportObjects(crtxtDate). SetText fin CRrep. Database. Tables(1). SetDataSource RStemp Screen. MousePointer = vbHourglass CRViewer91. ReportSource = CRrep CRViewer91. ViewReport Screen. MousePointer = vbDefault lblLoad.Caption = Err End Sub Sub month() Select Case mn Case 01 mn = Jan Case 02 mn = Feb Case 03 mn = Mar Case 04 mn = Apr Case 05 mn = May Case 06 mn = Jun Case 07 mn = Jul Case 08 mn = Aug Case 09 mn = Sep Case 10 mn = Oct Case 11 mn = Nov Case 12 mn = Dec End Select End Sub Private Sub Form_Load() Me. Icon = LoadPicture(App. Path ParkMe. i