Topic writing essay
Easy Sat Essay Topics
Monday, August 24, 2020
Corporate governance: Business Issues and Ethics
Q1. Q1.Corporate organization is characterized the technique, for example, the systems of end definition and control, by which investors look to ensure that ââ¬Ëtheirââ¬â¢ organization is run in congruity with their motivations. From a more extensive perspective, it includes all histrions that add to the achievement of partner closes outside and inside the organization. In the limited sense, it involves the course and investors of the organization as the boss histrions.In open recorded association, corporate organization is required on the grounds that there is a head operator connection emerged by the partition of possession and control. The relationship is fragile due to being non encircled in an agreement. The adherents will break down: The investors have a few rights, for outline, vote in the regular gathering, selling their stock and actioning the chiefs for unfortunate behavior. Plus, chiefs are obligation for pull offing the assets of investors in their contributions, including arranging plans and assurance contriving. They other than have a few obligations, for example, moving for the advantages of the organization, duty of consideration and achievements because of efficacious and effectiveness activity and obligation of steadiness. In this manner, the connection among investors and supervisors ought to be close. In the situation, the executives control the organization yet investors simply control in a roundabout way their belongingss. It appears the investors are boss and course is a specialist to move in their inclusion with the limit of the organization. Truth be told, both have battle of contribution. The ground is that the viewpoints of investors are to look for overall gain and increment partition fiscal worth and notoriety of the organization. They think executives act in shareholdersââ¬â¢ best contributions. Nonetheless, chiefs hope to hold more power and higher pay, including fillip and advantage. Their activity depends on their advantage, non investors. For case, the chiefs may chop down the nature of stocks for rescuing cash so as to themselves inclusion. Some of the time, it prompts drop the companyââ¬â¢s notoriety. Henceforth, their conduct varies from shareholdersââ¬â¢ standpoints. Plus, the higher the executive pay is, the more the outgo of the organization is. In add-on, instructive dissymmetry is that investors have constrained insight and entrance into the closures and makings of executives. Chiefs know more superiorinformation of the organization than shareholdersââ¬â¢ . At the end of the day, a gathering knows some important data yet non all gatherings. Now and then, chiefs seek after self inclusion with the goal that it prompts investors misfortune and wasteful activity of the organization. In the above difficulty, corporate organization can equilibrate the associations of numerous partners in an organization, for outline, its investors, network, customers and heading. Furthermore, it gives a model to achieving the points of an organization. It has grouped models in planetary, including Asiatic hypothetical record and Anglo-American hypothetical account.There are three boss moral employments emerged by corporate organization, as followers:First of entirely, the moral issue is monetary markets and insider exchanging. Despite the fact that the reason of an ideal market is that stock financial worth mirrors all publically accessible data, indeed, it is hard known to man due to awful religion stocks. The ââ¬Ëdot-comââ¬â¢ bubble implies an organization does non do any or do less total compensation yet there is worth available. The bond depends on surmise without to the full revealing aggregate of uncertainness. Besides, a bunch of pensionaries utilize their financess t o place in numerous bonds lost a few pieces of their pay. That is to state, securities exchange does non to the full show the whole of uncertainness when stock money related worth comprises of a segment of conjecture. By the by, institutional financial specialists utilize different peopleââ¬â¢s cash to put the stocks. The situation mirrors the speculators entirely misuse othersââ¬â¢ trust. Insider exchanging is that a segment of financial specialists in the market have unrivaled insights contrasted and others. At the point when stock is sold or purchased dependent on non-open data, insider exchanging emerges at the moment. The ground is that staff and bearing of an organization must cognize early occasions which sway on its segment money related worth, insiders may take unnatural total compensation or keep away from misfortune. In some cases, staff in the organization chooses to apply their alternatives or sell their bits dependent on their inside data. At a similar clasp, the activity other than prompts injustice, misappropriation of effects, sabotaging of fiducial relationship and injury to bargainers and the market. Second, there is official pay. ââ¬ËFact catââ¬â¢ wage is a charge for the outgo of CEO and chiefs, for example, advisory group and fillip. The total of compensation is exorbitantly solid. The activity is that there is a genuine difference between their wages and open introduction. Thus, it is of import about the inclusion of investors and chiefs. In tonss of states, the developing of their wages overwhelms shareholdersââ¬â¢ returns. On the off chance that their pay is higher, it amendss shareholdersââ¬â¢ worth and builds the companyââ¬â¢s load even settlement. The ground is that higher compensation paid prompts the lower overall gain property to investors. In this manner, an incredible exchange of official compensation comprises of part and bit alternatives to aline investors and managersââ¬â¢ association today. In the event that the compensation is identified with execution related pay, administrators would try to expand divide financial worth and shareholdersâ⬠⢠returns. It prompts higher wages and fillips for the administrators. At last, the ethic work is about amalgamations and acquisitions. The first point of amalgamations and acquisitions is to acquir an or more moved from an owner to another owner since it will expand riches on the organization. Leaving the in addition to can chop down uneffective course and greater expenses. Here and there, the amalgamations and acquisitions might be ineffective. It prompts blow cash, asset and clasp. It is important that the point would be misshaped by chiefs since executives may arraign associations that vary from investors inclusions and it exist battle of contribution. On one side, administrators seek after distinction and notoriety. On the opposite side, investors look for net gain and bit money related worth. Threatening overthrows, which are one of amalgamations, happen when a financial specialist or a gathering of speculators need to buy a significant load of an organization against the longing of its board. The investors of the organization need to sell however the rest of do non want to sell. In an organization, there is diverse supposition on the occasion. Simply if investors are happy to sell their bits, the threatening overthrows would quickly meddle the staying shareholdersââ¬â¢ belongingss. At a similar clasp, it other than emerge different occupations. For delineation, they give aureate parachute, a group of cash. Or then again, executives in mystery send greenmail to the antagonistic overthrows since they mean to keep up their place after amalgamations. Aside from that, the organization may reconstitute and cut back and it will begin progressively moral issue, for example, terminating staff. But the over three moral employments, corporate organization would do other moral occupations. Q2.Suppliers and buyers ever cause various employments. One of them is the maltreatment of intensity which is inconsistent condition of affairss between the two gatherings and would affect industry productivity. All things considered, the intensity of buyers and suppliers depends on asset dependance hypothesis. The hypothesis relies upon the evaluation on the partyââ¬â¢s assets. The force is influenced by two components, as followers:Resource scarceness is the evaluation to which the gatherings have or do not have the stocks. That is, it is the degree of the goodsââ¬â¢ alarm. For case, the supplier has satisfactory assets, and buyers are less significance and dependance on the supplier with the goal that the supplier uses control over the buyers, or delicacy versa. Asset open help partnership is how much the gatherings require or do non require the exchange. At the end of the day, it is the degree of the goodsââ¬â¢ utility for the gathering. For outline, the supplierââ¬â¢s assets are utile and the buyer dependance on the supplier, as a result, the supplier uses control over the buyers, or feebleness versa. Bartering poweris the capacity of a gathering ( A ) in a situation to practice impact over another gathering in an exchange request to achieve an exchange which is advantage to A. Fitting to the above components, there is a straightforward summarize. At the point when a supplierââ¬â¢s assets are adequate and non of import to buyer, or the buyerââ¬â¢s assets are scant and basic to the supplier, the buyer may hold more bartering power than the supplierââ¬â¢s. On the other hand, if the supplierââ¬â¢s asset has less alarm and is of import to the buyer, the supplier has trading control over the buyer. At the point when a gathering practices control over anotherââ¬â¢s one, the force might be manhandled or utilized legitimately. Consequently, the force ought to be utilized reasonably. In present moment, suppliers acquire advantage and net gain favorable circumstances on the off chance that they gain applying additional force. In long haul, all things considered, the combined situation has disservices in light of the fact that the buyers find different suppliers who lose the customers. Also, potential buyers may fall in with different buyers to expand power per unit territory on the supplier, or suppliers make centers to face the amazing buyers. Along these lines, they may modify the situation. They can reason selling money related worth, confined conditions thus on.There are two of import factors that influence the method of globalization. They drive globalization in worry, as followers:Cost advantagesParties seek after the lower cost for item
Saturday, August 22, 2020
Confidentiality and Privacy Controls for Digital Signatures
Question: Examine about theConfidentiality and Privacy Controls for Digital Signatures. Answer: Presentation This part incorporates the two significant angles: Keeping up classification of association. Mystery of individual data. Privacy For protecting the privacy following moves are to be made: Data Identification and characterization Information recognizable proof is the initial step after that arrangement is done which is the duty of proprietors of data according to COBIT 5 and not security faculties. Encryption-It is the best technique for ensuring data. It is the way toward changing over the content into figure content; the other way around case is called as Decryption. Access controls demanded on data Authentication and approval are starting control access and along these lines are not adequate to ensure the equivalent and therefore extra controls are exacted. Data rights the executives and Data misfortune counteraction devices are utilized. Workers preparing Training is given to representatives to securing customer information and looking after secrecy. Protection Any unapproved hole of data may prompt vast misfortune for which protection controls are executed. Encryption is a successful control for guaranteeing protection in which data is encoded both at the hour of sending and putting away. It spares association from misfortune just as fiscal impact because of misfortune. Protection Concerns: Spam It is a spontaneous email which contains hostile or publicizing content. It influences the effectiveness as well as results into infections, malware, worms and other spyware programs. Controls, for example, CAN-SPAM Act (2003) were presented. Under these law punishments of both common and criminal is forced on infringement of law. It incorporates the accompanying arrangements Show of sender character in the header ought to be unmistakably introduced. Subject ought to obviously group the message as notice or sales. Primary substance ought to contain rundown of beneficiaries with a working connection for Opt-out solicitations for which association will put the duty. It is a moral practice to have substantial location. Associations are encouraged to structure their own sites and not send any business email to any email address. Data fraud It is characterized as unapproved utilization of somebody individual data for culprits advantage. It might prompt budgetary wrongdoing by plundering the customers financial balance or clinical robbery by controlling the reports of the customer prompting some hazardous ailments or expense character danger in which the fraudsters document an invalid return of discount. So it is a moral and good practice to defend the customer data and give shield against such dangers. Following 10 prescribed procedures are embraced by the association The board - By allocating obligations and responsibility to a particular gathering of people to follow appropriate approaches and techniques for ensuring clients data. Notice - A notification is given to explain the sort of data gathered, reason related and utilizing the equivalent. Decision and assent Individuals are furnished with decision and agree to be taken before utilizing their data. There are two methodologies called as select in and quit. GAAP proposes to utilize select in approach. Assortment Only gathering that data which is needful. Treat is a book document which contains the undertakings which client has done nearby and it is put away in hard plate. Use and maintenance Policies ought to be detailed to guarantee that the utilization of data as expressed in protection approach and hold possibly till when it is required for business reason. Access to include erase adjust the data. Revelation to outsiders Disclosure will be made just when arrangements of association permits. Security-Use of preventive, investigator and remedial controls. Quality-By guaranteeing uprightness of data this objective can be accomplished. Checking and implementation Continuous observing is expected of the expressed approaches and authorization of strategies is required. Encryption System and its sorts Elements affecting are key length, encryption calculation and different arrangements for overseeing cryptographic keys. These are of 2 sorts: Symmetric and Asymmetric frameworks. In symmetric there is the utilization of same key for scramble and unscramble however in lopsided there are 2 keys that is open and private key. Loss of keys for both is a danger. Hashing A plain book is changed over into a short code which is called as Hash. Distinction among hash and encryption will be encryption produces figure content while it delivers just short code and scrambled information can again be decoded however code can't be changed over again to plain content. Hashing keeps up the respectability of information and is one of a kind for each capacity. Advanced Signatures It is characterized as verification of archives as a substitution of physical mark. It is a two-advance procedure wherein first hash is made and afterward the equivalent is decoded by private key and this is the means by which computerized mark is validated. Virtual Private Networks (VPNs) VPN might be characterized as an innovation used to make a safe and scrambled association over web. It is an exclusive association without bearing the expenses of rented line. It is just assessable to the individuals who have encryption and unscrambling keys.
Wednesday, July 22, 2020
How You Can Use the Sample of Synthesis Essays From High School
How You Can Use the Sample of Synthesis Essays From High SchoolIf you are struggling with the idea of writing a good sample of synthesis essay, you should understand how to pick up some information from high school. The samples of synthesis essays that will be given by the essay writers will be written by an individual who studied for four years in a four-year college. In fact, the samples of synthesis essays written by the students will be made from information they studied in their four years in school.An essay sample is the essay that is used in many schools as a model of a good essay that can be used by any student to make a successful written piece. Essay samples from high school can also be used as a guide on how to write a good essay and in this case, even how to write a sample of synthesis essay. The essays are given to the students to inspire them to write good essays. The essays are an essential part of preparing oneself for the admission process at any prestigious college. If you had not studied at all during high school, then you should be able to use the samples of synthesis essays from high school as a way to get started in writing for school. There are many aspects of the samples of synthesis essays from high school that will give you some ideas on how to write a good essay. There are common themes that all the essays are written from.One of the most common themes that are seen in all the samples of synthesis essays from high school is the social studies theme. In high school, students study different countries, cultures, religions, and more. Students also study topics like ethnicity, racial segregation, immigration, etc. All these themes are mentioned in the samples of synthesis essays from high school.Another common theme that is present in all the samples of synthesis essays from high school is the political theme. Students learn about the different kinds of political parties and how they work in order to achieve their goal. Students also study different types of elections and learn about the leaders and their opinions. It is only natural that these political views are found in the samples of synthesis essays from high school.Samples of synthesis essays from high school also show how students work on the different assignments given to them. Students take the information given to them and make an essay out of it. They also make their own statement based on the facts presented in the papers they write.When you look at the samples of synthesis essays from high school, you will see how all the common themes are present. One will find ethnic cultures and viewpoints, religious views, and national identities. Students also study things such as stereotypes, art, literature, and more.Essays samples from high school will help any high school student. The topics that are taught in these essays will allow them to be ready for any type of college admissions. These samples of synthesis essays from high school can be used to inspire stu dents to write an amazing essay.
Friday, May 22, 2020
What The Group Must Know About How United Kingdom
In this report, we will discussing what the group must know about how United Kingdom (U.K.) conduct business when they travel to London, England to meet with potential retailing partners several weeks from now. The United Kingdom or also known as British is a collection of countries that are governed by Parliament, located in London. These countries forming the United Kingdom consist of England, Wales, Scotland, and Northern Ireland. There are several key differences in how business is conducted in the U.K. in comparison to how its conducted in the U.S. The social practices of the British are initially confusing for those unprepared and could potentially hinder progress in establishing good relations with the British retailers. The members assigned to the group are required to learn the formal etiquette and discern the varied ways of how British relay information. The ability to speak a foreign language is difficult for the British for the different accents and dialects found from region to region. It was only recently in the past decade that Parliament encouraged education in foreign languages. The first meeting with the retailers must be efficient and have surmountable facts to back up the proposal the company is offering. All requirements must be met by each group member by the end of the second week before departure. Introduction As employees of Ferguson s Fine Quality Furniture Company,Show MoreRelatedBritish Exit Essay1017 Words à |à 5 PagesExit It is in work for on Friday, March 2019, for the UK has voted to leave the European Union. Discussion has been on going on how the ââ¬Å"Brexitâ⬠or British exit on three major aspects; what the United Kingdom owes the European Union, what will happen to the Northern Ireland border and the select United Kingdom citizens living elsewhere in the EU, but not the United Kingdom. Though the UK has decided to the leave the UK, theyââ¬â¢re in talks of a smooth transition over the next few years. But all otherRead MoreThe uses of Firearms by civilians are very dangerous, and its history needs to be studied. Many1700 Words à |à 7 Pageskeep guns, such as the United States and the United Kingdom. I will focus on the gun culture in the United Kingdom from 1689 to 1997. Because the Unite King start allowing individual keeping guns by Bill of Rights in 1689, the 1689 Bill of Right guaranteed British subject certain rights. People consider that it was a manifestation of their right and freedom, but after some guns accidents that made citizen scare, they change their constitution in 1997. After 1997, the Unite Kingdom enacted laws remainingRead MoreEssay On Conferences And Conventions1301 Words à |à 6 Pageschurch. If you donââ¬â¢t knowââ¬âhire an attorney who can tell you what those rights are. You should not go to the law on your brother, but wolves in sheeps clothing are not your brother. Conferences and Conventions: Religious conferences have been around for a century. It started with camp meetings and Revivals. Twenty to thirty years ago a major exodus took place from mainline denominational churches, which created independent mega churches. A local assembly is considered to be a mega church ifRead MoreAssignment 301 Understanding Roles1624 Words à |à 7 Pages(ref.1.1) Roles and responsibilities are important because they would allow for order in any given organisation and also for personal and organisational objectives to be met. Actions and activities assigned to or required or expected of a person or group are referred to as Roles while the obligations to carry forward an assigned task to a successful conclusion are referred to as Responsibility. It is also the role of the person delivering the training to be able to carry out the following. IdentifyRead MoreProtestant and Catholic Troubles in Ireland1475 Words à |à 6 PagesIreland to remain within the United Kingdom, whereas The Nationalists (Catholics) wanted to be separate from the United Kingdom and rejoined with United Ireland. This skirmish between those who wished for Northern Ireland to remain a part of the United Kingdom and those who wished to see the reunification of the Island of Ireland. This conflict was underpinned by several issues such as: historical, religious, economic, political, and psychological. The small Catholic groups who lived in the ProtestantRead MoreAmbassador Of The United Kingdom1418 Words à |à 6 Pagesplaces but engaging any form of audience at the prestigious Oxford University is something that I really have to place on my curriculum vitae. I am also grateful to the US Ambassador to the United Kingdom, Ambassador Mathew Barzun and his family for the warmth they have shown me since I got to the United Kingdom and for being present a t this function. Ambassador Barzunââ¬â¢s pace-setting involvement with the internet especially at its early stage is something that I have for long been proud of as wellRead MoreThe Islamic State Of Iraq And Syria Essay794 Words à |à 4 Pagestopic will help me exploit my audience and grab their attention. Before choosing this topic, I didnââ¬â¢t know very much about it until I did some research and realized how dangerous this Islamic group really is. During my argument I will argue how ISIS has divided countries and have caused mass destruction along with bloodshed. In my paper I hope to persuade my audience from joining ISIS and what we can do to help control the on going issue in Syria and Iraq. I envision my audience being my entireRead MorePaul and the Church of Corinth Essay example971 Words à |à 4 Pagesthe city very multicultural and diverse. The city was very young not bound by any type of tradition or culture and thus there were a whole mix of individuals who came to Corinth to make a big name for themselves and become successful. A good thing to know is during 49 C.E. alot of Jews that were expelled from Rome migrated to Corinth for a new start. 1 Corinthians 3:5 The whole chapter was written to reprimand the Corinthian church for their immaturity and the pride they had in their own wisdomRead MoreThe Bullies And Victims Article Focus On The Problems Of Bullying1750 Words à |à 7 PagesThe Bullies and victims article focus on the problems of bullying in the United Kingdom. Bullying is not just a problem in the United Kingdom; itââ¬â¢s a serious issue throughout the world. When analyzing the incidences that occurred with Mark, Sarah, Theresa, Simon, and Debbie, these attacks were alarming since they were vicious where some of the victims suffered an injury from being physically assaulted. The brutality of these attacks deserves punishment since the bullies used physical aggression andRead MoreThe United Kingdom And The European Union1646 Words à |à 7 PagesCaleb Smith Dr. Lee Final Paper 8 December 2016 Brexit On June 23rd of 2016, the United Kingdom (UK) voted in a referendum to leave the European Union (EU). This decision was met with both excitement and hostility. This conflict has many shades of grey, as so many different things happened all at once that need to be discussed. People from all over the world wonder about the future of the UK, whether more countries will attempt to follow in its footsteps and leave the European Union, or if the
Thursday, May 7, 2020
Conflict Between Men And Women - 918 Words
Conflict between men and women Trifles is a short story that Susan Glaspell wrote about between men and women. It s specifically targeting the way men attitudes were towards women. Trifles talks about a murder that is unsolved, a country woman suspected of killing her husband in an isolated farm. Men in this short story worry more about looking for big evidence and judging about Mrs. Wright s messy kitchen instead of looking in her stuff for evidence. The men think that in the kitchen there is nothing important. Instead they go to the barn and to the bedroom to find evidence. Meanwhile the women find a dead bird with a broken neck that could mean why she killed Mr. Wright. At the end the women decide to hide the evidence. That is because they think she had her own reasons to kill him because Mr. Wright could have killed the bird and that it was important to Mrs. Wright. In Trifles there is a conflict between the masculine attitudes towards women. Men in Trifles are judgmental when they see Mrs. Wright s messy kitchen. They think that Mrs. Wright should have cleaned up the kitchen before she left. The County Attorney thinks that a woman s place is in the kitchen and that she should have everything cleaned up. When the County Attorney is looking around the kitchen he opens the door of a closet and looks on the top shelf. Then he pulls his hand away sticky and says, Here s a nice mess (1388), criticizing Mrs. Wright s kitchen. He pulls out a roll of towelsShow MoreRelatedGender Stratification in the Workplace1147 Words à |à 5 Pageslimited opportunities for promotion (352). Researchers have shown that women in a male-dominated workplace suffer from what has been called token status. A token female employees high visibility often increases the pressure to perform at levels above their male peers, their isolation as male employees exaggerate the differences between men and women, and stereotyping which tends to limit opportunit ies for advancement. By contrast, men seem to benefit on several levels by choosing a career in a female-dominatedRead MoreConflicts And Conflict Resolution Process1671 Words à |à 7 PagesConflicts are inevitable in any human sââ¬â¢ interaction which makes their occurrence normal in the workplace. Conflict can be caused by imbalance of power and communication barriers that arise from the social structure or individual interpersonalââ¬â¢ perceptions, assumptions and expectations. The interpersonal conflict has a huge impact on the individual himself and extends to the workplace. The Human Resources (HR) role comes in light to attempt to help in the conflict resolution process. Human resourcesRead MoreSex, Gender, And Communication1233 Words à |à 5 Pagesthis course, a focus of study has been the discrepancies between how men and women communicate in a group. The article ââ¬Å"Sex, Gender, and Communication in Small Groupsâ⬠by Nina M. Reich and Julia T. Wood focuses on many of these diff erences, while also providing similarities between how both men and women communicate. To begin, Reich and Wood start by making the important distinction between sex and gender. Sex is the biological difference between the two, which includes different reproductive organsRead MoreCommunication Styles Between Men And Women Essay1528 Words à |à 7 PagesThe communication styles differences between men and women have been a strong topic of interest in the research world for centuries. These differences have led to miscommunication, conflict, and even dissatisfaction between couples throughout the world. The study analyzes this communication styles within couples, more specifically among married couples. It has questioned how differences in communication styles between this married couples married five years or less affect marital satisfaction. ThisRead MoreAnalysis Of Rosemary Traore s The Phycology Of Prejudice 1085 Words à |à 5 Pages In Cultural Connections, An Alternative t o Conflict Resolution, by Rosemary Traore, she discusses the conflict within intergroup conflict, where it stems from and how it can be beneficial. Intergroup conflict can occur when a group of individuals from different backgrounds work and live together. These conflicts can be caused by concepts such as prejudice, stereotypes, and discrimination. In order to combat these conflicts, a diverse group of people should be formed with a diverse set of leadersRead MoreThe Conflict Theory883 Words à |à 4 PagesPaul Wise The Conflict Theory This paper will talk about what The Conflict Theory is, and who it was derived from. It will also give, and explain an example of what The Conflict Theory pertains to in modern society. The Conflict Theory focuses on the negative aspects of society as opposed to most other theories which tend to focus more on the positive aspects of society. It pays more attention to things like race, gender and social class because they are seen as grounds for the worst strugglesRead MoreGender Inequalities Of Workforce And Gender Inequality1594 Words à |à 7 Pagesbecome evident that women face far more significant barriers in the workforce than men do. A clear representation of this barrier is established by the gender pay gap, which is the difference in monetary amount received between a woman s and a man s average weekly earnings. The economy, as a social institution, is affected by gender and sex inequality. The idea of inequality in the workplace is central to explaining wage disparities and is a crucial factor that intervenes between a person s humanRead MoreDoes Gender Role Norms Affect Behavior?1698 Words à |à 7 PagesIn early childhood, children have already develope d clearly defined ideas of what constitutes appropriate behavior for men and women (Blackmore, 2003; Mahalik et al., 2005). These ideas, called ââ¬Å"gender role norms,â⬠affect the way people believe they are supposed to act, think, and even feel depending on their sex (Mahalik et al., 2005). These norms can be learned through simple observation, such as how children of different sexes act in television commercials and what behaviors are reinforced byRead MoreGender And Interpersonal Styles, Negotiation And Conflict Management1457 Words à |à 6 Pagesââ¬Å"How males and females differ: Gender differences in interpersonal styles, negotiation and conflict management.â⬠Introduction Women are relationship-oriented, emotional and cooperative whereas men are assertive, demanding and self-assured. This is the widely held gender stereotype that some people hold around us. Whether men and women in fact communicate differently or behave differently in communication, there is clearly a perception that they might. It is important to address these perceptionsRead MoreDefinition Of Existence Of Stereotypes1630 Words à |à 7 Pagesmanaging a company. Women were recognized as too emotional, weak or subordinate to be successful as managers. However, as time has passed, the perceptions of society have changed, and although women made the leap into many management positions, the stereotype that they are inferior to men still exists, making them feel the need to prove themselves. In management positions, women are challenged in different ways, present themselves in a different manner and communicate differently than men; however, despite
Wednesday, May 6, 2020
Fast Food Automated Ordering System Free Essays
Project: Fast Food Automated Ordering System Students: Vimal Mayank and Deep Saraf Faculty Advisors: Mark Austin and John Baras TABLE OF CONTENTS 1. Introduction Purpose : Define fast food automated ordering system. Topics : Problem statement; benefits of the system; purpose. We will write a custom essay sample on Fast Food Automated Ordering System or any similar topic only for you Order Now 2. Goals, Scenarios, and Use Cases Purpose : Develop use cases, scenarios and system requirements. Topics : Goals and Scenarios; initial use cases with activity diagrams. 3. Generation of Requirements from Use Cases Purpose : Generate high-level requirements from use cases. Topics : High-level requirements; synthesis and breakdown of requirements; requirements traceability. 4. Generation of Specifications Purpose : Generate low-level requirements Topics : Synthesis and Breakdown of Requirements 5. High-Level System Modeling and Analysis Purpose : Create simplified models of behavior and structure. Topics : System structure diagram; functional flow block diagram; requirement traceability matrix. 6. System-Level Design Purpose : Create the system-level design. Topics : Map chunks of behavior onto the system structure; sequence diagrams. 7. Design Structure Matrix (DSM) Purpose : Applying DSM to system decomposition and Integration Problems Topics : Activity Based Design Structure Matrix 8. Tradeoff Analysis Purpose : Create framework for trade-off analysis for selection of components in a small subsystem. Topics : Performance characteristics; decision variables; CPLEX Formulation of the problem; Result of the CPLEX runs; plot of non inferior solution in the objective space; analysis of pareto points of the system; final system design. 9. Component ââ¬â System Testing Purpose : Develop procedures of system test, verification and validation. Topics : Primary verification plan; verification traceability matrix; VSNââ¬â¢s; coverage and completeness. 10. References and Web Resources 11. Appendices Purpose : Details of the CPLEX analysis. Topics : LP file for CPLEX run; Log file of the CPLEX runs. Introduction Problem Statement This case study looks at the problem of setting up a fast food restaurant. The basic problem in the food service industry is that restaurants are not realizing efficiencies that would result from better applications of technology in their daily operations. Every fast food has counter where you can place your order and then make the payment. So every fast food needs an employee for taking the order and processing the payment. Labor rates are increasing every now and then and it is difficult to find employees in the middle of the highway, hence to solve this problem we plan to design a ââ¬Å"Self Served Fast Food System. â⬠This self-service fast food restaurant will be equipped with a user-friendly touch screen, a credit/debit card reader, and software for completing the process at the backend. For this system there will be a system administrator who will have the rights to enter the menu with their current prevailing prices. He/she can enter anytime in the system by a secured system password to change the menu contents by adding or deleting an item or changing its price. Now when the customer enters the restaurant, he will place his order with the help of the touch screen using the intuitive graphical user interface, right from the selection of language till the payment confirmation. He will select from the food options according to his choice and the system will display the payment amount he has to make once he has finished with his order. He will have the option of paying the bill by cash, debit card or a credit card. The user will slide his card and the system will check for the validity of the card and the payment will be made. A receipt will be printed containing the order number and the order will be sent in the kitchen for processing. Anticipated Benefits 1. This will minimize the number of employees at the back of the counter. 2. The system will help to reduce the cost of labor. 3. The system will be less probable to make mistake, since it? s a machine. 4. This will avoid long queues at the counter due to the speed of execution and number of optimum screens to accommodate the maximum throughput. 5. The system will be available 24 hours for 365 days, because the machine is not going to take any sick or vacation leave. Scope and Objectives The purpose of this analysis is to demonstrate the extent to which high-level systems concept and UML notation/semantics can be used to describe the functionality of this system. This study lays out a framework for a new system to be developed and brought to the market for maximum use. The following issues, which are useful in performing a detailed analysis of the system, will be addressed in this study: 1. What should the system do? 2. What are the systems requirements? 3. How does the system work? 4. Can the system work? 5. What objects should be chosen and each of the subsystems functionality? 6. How should the object/subsystem interact? 7. How to verify and validate the system? System Framework and Boundary Goals, Scenarios and Use Cases Goals and Scenarios Goal 1. The system has a user-friendly user interface. 1. Scenario 1. 1. A particular user of the system has no difficulty in reading the text on the display. 2. Scenario 1. 2. The system is navigable through intuition. 3. Scenario 1. 3. Menu choices are presented in form of buttons, which contain text as well as little pictures illustrating the choice for better understanding. Goal 2. The system supports multi lingual capabilities. 1. Scenario 2. 1. User is not a native speaker of the common spoken language in the country. 2. Scenario 2. 2. System caters to English (universally accepted language for communication) and other native languages, which are commonly spoken in the country where the system is operative. Goal 3. System takes order from the customer as per his/her choice. 1. Scenario 3. 1. User selects a combo deal (i. e. a combination of main food, drink and side dish). 2. Scenario 3. 2. User may want to make up his own order by selecting dishes. Goal 4. The system calculates and displays the final bill based on the placed order. 1. Scenario 4. 1. System calculates final bill based on the quantity of the items multiplied by their unit price topped up by the applicable taxes if any. 2. Scenario 4. 2. User is given the option to either pay for the order or revise the order. Goal 5. System handles the payment for the user-defined order. 1. Scenario 5. 1: User decides to pay cash and system asks user to enter cash in the slot. 2. Scenario 5. 2: System verifies the cash amount and gives refund if any after deducting the amount. 3. Scenario 5. : User decides to pay through credit/debit card. System informs user to swipe card through card reader. 4. Scenario 5. 4: The system verifies the card and charges the amount of the bill to the card. Asks user to sign the bill on the signing pad. 5. Scenario 5. 5. The system prints out receipt containing a token number, details of the order, bill and the payment method with a terminal message (Thank you visit again or Store address). 6. Scenario 5. 6: System communicates the o rder to the kitchen through the internal ordering system. Goal 6. System offers the choice to change the menu items to the store manager. 1. Scenario 6. 1. Store manager decides to add / delete an item from the menu. 2. Scenario 6. 2. Store manager wants to put festive offers on some items because of which there is a change in the price of some of the items. 3. Scenario 6. 3. Store manager notices that some dishes are out of stock. Consequently he updates the menu so that those items are deleted temporarily deleted from the display presented to the user. Goal 7. The system is resistant to active/rigorous handling. 1. Scenario 7. 1. The customer must be a minor or hacker who might want to get into the system to change it. It should provide security for these areas. 2. Scenario 7. . The system will be used by different users and might experience some rough hand every now and then. Identify Actors An actor is anything that interfaces with the system externally and participates in use case modeling. In our Self Served Fast Food System the actors would be: 1. Customer. This actor is the principle customer who will order food and make the pay ment. 2. Store Manager. This actor will hold the rights to change the menu and enter the system to make any changes. 3. Internal Order System. This actor will read the order given by the customer and pass it to the food preparation person. 4. Bank System. This actor serve as a backbone for doing the credit / debit card transaction. 5. Cash Collector. This actor will accept the cash from the customer and gives back the change. 6. Food Preparation Person. This person receives the order placed by the customer through internal order system. System Boundary The system boundary is defined by the elevator itself. Initial Use Case Diagram A use case describes a single goal and all the things that can happen as the user attempts to reach that goal. Although use cases are neither requirements nor functional specification, they imply requirements, objects and object interactions in the stories they tell. Use cases are textual description of the interaction between external actors and a system. Our initial use case diagram has six actors and five use cases. Figure 1. Initial Use Case Diagram for Serve Fast Food. As you can see that the Customer places the order, which is read by the internal order system, and the order is then sent to the food preparation person for execution. In the mean time the customer makes the payment. If the payment is made in cash there is a cash collector actor or there is a bank system for credit/debit card processing and keeping the balance cash amount. Baseline (Textual) Use Cases with Activity Diagrams When the flow of events is linear, a textual description of behavior is often sufficient to capture the system behavior. Activities diagram provide a visual documenting sequence of task making up a single activity. They especially are useful for activities governed by conditional logic, and flow of event running concurrently. We describe the basic system functionality with textual use cases, and employ activity diagrams for a visual representation of the corresponding sequence of task or flow of information. Use Case 1. Place Order Primary Actor: Customer Description: Customer places an order from the available choices after indicating his language preference for the session. Pre-conditions: System is connected to a power source, display is turned on and system is configured to accept the inputs. Flow of Events: 1. User selects his language preference for the session. 2. User selects from the menu. 3. User selects from the drinks me nu 4. User selects from the combo deals 5. User confirms the order Alternative Flow of Events: 6. User accidentally presses a wrong button and after realizing it he hits the backspace button. 7. User enters a wrong order and wants to go back to the main menu. Post-condition: Order has been made that goes to the kitchen for processing. Assumption: User is familiar with how to enter values through mouse and has a general idea why the inputs are being provided and what is expected out of system. Activity diagram for this use case is given as below: Figure 2. Activity Diagram for Place Order. Use Case 2. Make Payment * Primary Actors: customer, Credit/Debit system, cash collector. Description: The user is asked for the mode of payment. The payment is accepted in terms of credit/debit card or is collected by cash collector. And the customer is given a token with their order number. Pre-condition: The order has been confirmed and the total bill has been displayed on the screen to the customer. Costumer decides to go ahead with the order. Flow of Events: 1. User enters the mode of payment. (Credit/Debit/Cash) 2. User makes the payment in cash 3. Cash collector collects the money and gives back the change if required. 4. User makes the payment by credit/debit card. 5. User receives a token number and final bill. Alternative Flow of Events: 6. User selects the mode of payment. Post-condition: Customer waits for the order to be processed. Assumption: User is familiar with how the system works and what is expected out of system. Activity diagram for this use case is given as below: Figure 3. Activity Diagram for Payment Process Use Case Use Case 3. Update Menu. * Primary Actor: Store Manager. Description: The menu might change according to the inventories or add/delete items from menu and deals. The prices of each item might change for the period of time. Pre-condition: An order menu with their respective price already exists in the system in some particular format. Flow of Events: 1. The Store manager enters the system with some password. 2. The Store manager makes the required changes. 3. The Store manager saves the changes and logs out. Alternative Flow of Events: 4. Some of the menu might not need any change. 5. User might enter invalid password and need to go back. Post-condition: A menu list will be displayed when the user enters the system. Assumption: The Store manager is given the rights and privileges to enter the system and make the required changes. Activity diagram for this use case is given below: Figure 4. Activity diagram for Update Menu Use Case Use Case 4. Monitor Inventory. * Primary Actor: Food preparation person, Store Manager Description: This use case triggers when an item goes out of stock. Pre-condition: None Flow of Events: 1. Food preparation person/Store manager notices an item out of stock 2. Updates the menu accordingly. Post-condition: A new and updated menu list will be displayed. Assumption: The Store manager is given the rights and privileges to enter the system and make the required changes. Activity diagram for this use case is given below: Figure 5. Activity Diagram for Monitor Inventory Use Case 5. Read Order. Primary Actor: Food preparation person, Internal Order system. Description: Internal order system reads the order once the customer confirms his order and then he communicates the order to the food preparation person. Pre-condition: User confirms the order. Flow of Events: 1. Internal order system reads the order 2. Communicates the order to the food preparation person Post-condition: The final ord er is being processed in the kitchen. Assumption: Food preparation person is available to take the order and know the sequence of processing the orders. Activity diagram for this use case is given below: Figure 6. Activity diagram for Read Order Use Case Task Component Interaction Figure 7. Use Case Task Component Interaction Generation of Requirements from Use Cases Having generated the baseline textual use cases and the scenarios for the current problem we can now generate the requirements for the Self Served Fast Food system. Requirements are derived from various goals and scenarios, use cases so it is important to trace back the source of requirement. High-Level Requirements (ENSE 621 version) These are the first draft of requirements written during the beginning of the semester when the system engineering principles were not very clear. These requirements are not quantified and are very ambiguous. They are not specific to any object or process and hence needs to be refined. User Requirements 1. User should be able to navigate the system without any difficulty. 2. System supports native language of the country and other commonly spoken languages. 3. User should be able to place order according to his choices 4. User should be able to make payment using cash/credit/debit card. 5. User should get a receipt and a token number after making the payment. Sources: Goals 1,2 ; 5, Scenario 1. 1,3. 1, ; 5. 4, Use Case 1 ; 2. Performance Requirements 1. The system should be able to take any type of inputs, once the mouse is clicked on the respective button. 2. The system should be able to take any amount of order and display it when finished. 3. The system should be able to calculate the bill and prompt the user for the mode of payment and generate a receipt. 4. The system should be able to pass on the order in the kitchen for processing. 5. The system should be secured to restrict the number of people to enter the system to make changes in the menu and its items. 6. The system should be sturdy for rough usage. 7. System has a cash collector which gives refund up to 5 $ in coins. 8. System should be able to communicate to the central database to verify the authenticity of the credit/debit card. 9. System should allow Store manager to add/delete/alter system items. Sources: Goals 5,6 ; 7, Scenario 4. 1 ; 4. 2, Use Case 2,3,4 ; 5 User Interface Requirements 1. The system must be a graphical user interface for easy use and understanding. 2. The system must be able to prompt the user for the next step to be performed during the process of using the system. 3. The system must display the bill and final order for confirmation. Sources: Goal 1, Scenario 4. 3 ; 5. 4, Use Case 1 ; 4 Ergonomics Requirements 1. The system interface layout must be self-explanatory 2. Horizontal and vertical distances between two adjacent buttons should be at least 5 pixels for better visibility and accessibility. 3. The mouse should be placed not below 3 feet above the ground. Sources: Goal 1, Scenario 1. 2 ; 1. 3, Use Case 1 ; 4. Requirements Traceability Flowdown of Requirements from Use Cases/Scenarios The detailed flowdown of requirements from use cases and scenarios is as follows (ENSE 621, version): SOURCE | DESTINATION | Use Case | Scenario | Requirement No | Description | Place Order | 1. 2 | User 1 | Easy navigability | | 2. 1, 2. 2 | User 2 | Support of native language and others | | 1. 3, 3. 1, 3. 2 | User 3 | User places order as per his choice | | 3. 1, 3. 2 | Performance 1,2 | Take any input and amount of order | | 4. 1 | Performance 3 | Able to calculate bill, prompt for mode of payment and give receipt. | | 1. 3, 1. 1 | User Interface 1 | Supports GUI for easy use. | | 1. 2 | User Interface 2 | Prompts user for next step | | 4. 1 | User Interface 3 | Display bill and confirm order | | 1. , 1. 3 | Ergonomics 1 | Self explanatory system interface | | 1. 3 | Ergonomics 2 | 5 pixel distance b/w buttons | Make Payment | 1. 2 | User 1 | Easy navigability | | 5. 1, 5. 3 | User 4 | Make payment using cash/credit/debit cards. | | 5. 5 | User 5 | Generation of receipt/token no. | | 4. 1 | Performance 3 | Able to calculate bill, prompt for mode of payment and give receipt. | | 5. 2 | Performance 7 | Eq uipped with cash refund device. | | 5. 4 | Performance 8 | Ability to connect with bank central database. | | 1. 2 | User Interface 2 | Prompts user for next step. | | 4. | User Interface 3 | Display bill and confirm order. | | 1. 1 ; 1. 3 | Ergonomics 1 | Self explanatory system interface. | | 1. 3 | Ergonomics 2 | 5 pixel distance b/w buttons Update Menu. | | 7. 1 | Performance 5 | Restricted access to change system. | | 6. 1, 6. 2 ; 6. 3 | Performance 9 | Ability to add /delete / alter menu items. | | 1. 1 ; 1. 3 | Ergonomics 1 | Self explanatory system interface. | | 1. 3 | Ergonomics 2 | 5 pixel distance b/w buttons Monitor inventory. | | 6. 1, 6. 2 and 6. 3 | Performance 9 | Ability to add /delete / alter menu items Read Order. | | 5. | Performance 4 | Communicate order to kitchen. | Traceability of Requirements to Use Cases / Scenarios Traceability from requirements back to originating use cases/scenarios is as follows (ENSE 621 version): SOURCE | DESTINATION | Requirement No | Description | Scenario | Use Case | User 1 | Easy navigability | 1. 2 | 1,2 | User 2 | Support of native language ; others. | 2. 1, 2. 2 | 1 | User 3 | User places order as per his choice. | 1. 3, 3. 1 ; 3. 2 | 1 | User 4 | Make payment using cash/credit/debit cards | 5. 1 ; 5. 3 | 2 | User 5 | Generation of receipt/token no. | 5. 5 | 2 | Performance 1 | Take any input. | 3. 1 ; 3. 2 | 1 | Performance 2 | Take any amount of order. | 3. 1 ; 3. 2 | 1 | Performance 3 | Able to calculate bill, prompt for mode of payment and give receipt. | 4. 1 | 1,2 | Performance 4 | Communicate order to kitchen. | 5. 6 | 5 | Performance 5 | Restricted access to change system. | 7. 1 | 3 | Performance 6 | Sturdy system for rough usage. | 7. 2 | None | Performance 7 | Equipped with cash refund device. | 5. 2 | 2 | Performance 8 | Ability to connect with bank central database. | 5. 4 | 2 | Performance 9 | Ability to add /delete / alter menu items. 6. 1, 6. 2 ; 6. 3 | 3,4 | User Interface 1 | Supports GUI for easy use. | 1. 1 ; 1. 3 | 1 | User Interface 2 | Prompts user for next step. | 1. 2 | 1,2 | User Interface 3 | Display bill and confirm order. | 4. 1 | 1,2 | Ergonomics 1 | Self explanatory system interface | 1. 1 ; 1. 3 | 1,2,3 | Ergonomics 2 | 5 pixel distance b/w buttons. | 1. 3 | 1,2,3 | Ergonomics 3 | Vertical placing of mouse. | 1. 2 | None | High-Level Requirements (ENSE 622 version) Concept Requirement List (CRL) are the set of requirements which demonstrate the over all system, its needs and outputs. These are the set of requirements generally provided by the management to the designers. Following are the set of CRL for the fast-food ordering system that we plan to design and develop. 1. System supports native language of the country and other commonly spoken languages. 2. User should be able to place order according to his choices 3. User should be able to make payment using cash / credit / debit card. 4. User should get a receipt and a token number after making the payment. 5. The system should be able to take any type of inputs, once he touches the respective button. . The system should be able to calculate the bill and prompt the user for the mode of payment and generate a receipt. 7. The system should be able to pass on the order in the kitchen for processing. 8. The system should be secured to restrict the number of people to enter the system to make changes in the menu and its items. 9. The system should be sturdy for rough usage. 10. System has a cash return mechanism whi ch gives refund up to 5 $ in coins. 11. System should be able to communicate to the central database to verify the authenticity of the credit/debit card. 12. System should allow Store manager to add/delete/alter system items. 13. The system must be a graphical user interface for easy use and understanding. 14. The system must be able to prompt the user for the next step to be performed during the process of using the system. Generation of Specifications Synthesis and Breakdown of Requirements Detailed model of Requirements Flowdown : System-level requirements are assigned to elements in the system architecture, which in turn, flow down to subsystem elements. Appropriate test requirements are generated at each level of the system development. Starting ate the sub-system level, other stakeholder requirements are taken into account, perhaps because the subsystem elements will be used across a product line. Designers working on the sub-system elements provide feedback to the system-level designers. We divide our system at different levels of requirements, to make sure that all the requirement specifications are covered and study the flowdown of requirements. You will notice that there are the requirements at the system level, which are very similar to the higher level requirements and then we study the requirements at the Sub-System level and component level. Later, in the project we will see how these requirements are tested and verified at there levels and then we integrate them to test the whole system. Figure 8. Detailed model of Requirement Flowdown 1. 0 System Level Requirements System-level requirements are assigned to elements in the system architecture, which in turn, flow down to subsystem elements. Appropriate test requirements are generated at each level of the system development. 1. 1. Restaurant will be open for 16 hours and will operate in four shifts as Morning (730 AM -1130 AM), Afternoon (1130 AM -330 PM), Evening (330 PM ââ¬â 730 PM) and Night (730 PM -1130 PM). . 2. System should be able to serve a throughput of 50, 125, 50, 75 customers per hour during these four shifts respectively. 1. 3. Cooks, cleaners and assemblers will be the type of employees working the restaurant. 1. 4. Cook will be paid at the rate of $5 per hour for the duration of their work. 1. 5. Assemblers will be paid at the rate of $4. 75 per hour for the duration of their work. 1. 6. Cleaner will be paid at the rate of $4. 5 per hour for the duration of their work. 1. 7. Customer will leave without ordering if he sees 6 or more people in the line waiting to be served thereby causing a loss in revenue. 2. Sub-system Level Requirements Starting at the sub-system level, other stakeholder requirements are taken into account, perhaps because the subsystem elements will be used across a product line. Designers working on the sub-system elements provide feedback to the system-level designers. (a) 2. 1 Ordering and Processing System 2. 1. 1. The system will provide queue management by passing orders sequentially to kitchen (FIFO) by assigning order numbers to them. 2. 1. 2. Customer should be able to order item either by name or by number (for combo deals). 2. 1. 3. System will support native and other commonly spoken language in the country. . 1. 4. An average order takes about 1 minute to complete with a variance of 10 seconds. 2 . 1. 5. Customer takes 2 minutes on an average to complete and ordering process. 2. 1. 6. System will be equipped with a standard QWERTY keyboard for taking inputs. (b) 2. 2 Payment System 2. 2. 1. This Order number will be printed on the bill that customer receives. 2. 2. 2. System shall be able to accept cash and coins. 2. 2. 3. System should be able to accept debit / credit cards. 2. 2. 4. System will accept only $1, 5, 10, 20 bills and nickel, dime, quarter denomination of coins. 2. 2. 5. System will reject pennies ; $50, $100 bills. 2. 2. 6. System wonââ¬â¢t allow putting in $1 coin. 2. 2. 7 Cash return will return change only in coins (up to $5 maximum) 3. 0 Component Level Requirements (a) 3. 1 Touch Screen 3. 1. 1. Touch screen should be able to take inputs from users when they apply a light pressure (x lb) from their fingers corresponding to an item. 3. 1. 2. Touch screen should be able to withstand rough use i. e. it will be scratch proof (i. e. , will be resistant to nail scratching) and will not malfunction if a pressure of (x+5) lb is applied to the screen. 3. 1. 3. Touch screen will colored for visual appeal and will support at least 256 colors. 3. 1. 4. Resolution of the screen will be at least 640X480 pixels. 3. 1. 5. Touch screen will be at least 10 in size. 3. 1. 6. Touch screen should be able to display at least 15 rows and 60 columns of text when the font size of the text is 10. (b) 3. 2 Card Acceptor/Reader 3. 2. 1. System will be equipped with a card reader with built it keypad (containing all digits and special function keys corresponding to CANCEL, OK, # etc). 3. 2. 2. This card reader should be able to read the card information if swiped at a speed 1 m/s. 3. . 3. Card reader will have a vertical slot on the right hand side of the keypad. (c) 3. 3. Display 3. 3. 1. System will display all the menu items in icons/graphics format for selecting. 3. 3. 2. System will prompt the user for mode of payment. 3. 3. 3. Order will be transferred to the kitchen touch screen instantaneously once the user does the payment. 3. 3. 4. System will disp lay the order sequentially on the kitchen screen with a forward and back button at the bottom. 3. 3. 5. Touching an order on the kitchen screen will prompt the system that the order has been delivered and the screen will be rolled forward. . 3. 6. Any error message during such a process will be reported to the user on the touch screen informing him to take any further action. 3. 3. 7. There will be a high contrast between the foreground and the background of the display for easy reading capabilities. 3. 3. 8. Throughout the ordering process all the text displayed on the screen will be either greater than 10 or less than 18 font size so that all users (young, adult, old) can read it. (d) 3. 4. Modem 3. 4. 1. Modem should be able to complete a transaction (dialing, sending information, receiving information) in 15 seconds or less at all times. . 4. 2. Once connected to the bank system will supply the card information to the bank database, will query the card validity and will supply t he amount to be charged to the card. (e) 3. 5 Software 3. 5. 1. System will be secured to grant access rights only to the system administrator. For this a login ID and a password will be assigned which could be changed. Password wonââ¬â¢t be visible to onlookers while typing for increased security. 3. 5. 2. System will deny access to change the contents if the login/password both are incorrect by providing an error message System Modeling and Analysis System Behavior System behavior shows what a system does or appears to do, Its represented graphically by a model which integrates the functional model and the inputs and outputs. The figures below shows two versions of two different functional models. Our first model is the Order System and the second model show the payment activity. The 621 version is the basic version of the model with most of function not very well defined which you will notice when you view the 622 version of the Activities. FFBDââ¬â¢s for Order and Payment (ENSE 621 version) Figure 9. FFBDââ¬â¢s for Order and Payment (ENSE 621 Version) FFBD for System Updates (ENSE 621 version) Figure 10. FFBD for System Updates. FFBD for Pay Bill (ENSE 622 version) This is a more detailed functional flow block diagram of the sequence of functions that take place in the Order and Payment processes. Figure 11. FFBD for Pay Bill (ENSE 622 version) FFBD for System Administrator (ENSE 622 version) Figure 12. FFBD for System Administrator (ENSE 622 version) Statechart Diagram A statechart diagram (STD) describes the possible states of a single class and the events that cause state transitions. They are useful for showing the life cycle of the class. Statechart and activity diagrams both describe state transitions and share many of the same elements. An activity diagram is most effective for describing processes that involve more than one object. The following diagram shows the statechart diagram of our system. Figure 13. Statechart diagram â⬠¦. System Structure The model of system structure has evolved through two versions. Preliminary System Structure (ENSE 621 version) In the preliminary implementation (ENSE 621), the ââ¬Å"automated ordering systemâ⬠was partitioned into elements for input, menu, payment, system administration and output. Figure 14. System Structure (ENSE 621 Version). Notice that the system structure does not include the environment within which the ordering system works and also some of the objects that are considered at lower level are not objects of the system, instead they are attributes. Revised System Structure (ENSE 622 version) Version two of the system structure has a larger scope. The highest-level of system structure, ââ¬Å"fast food systemâ⬠is a composition of three systems ââ¬â staff, kitchen and automated food ordering system. Figure 15. Revised System Structure (ENSE 622 version) Attributes and functions are assigned to classes in the system hierarchy, as shown in Figure 15. System-Level Design We now map chunks of behavior onto the system structure and show the flow of messages/data among system components with sequence diagrams. As you can see in the diagram below the system structure have been revised again to trace all the functions of the system behavior. We have also added the attributes related to each object in the system structure. Assigning Fragments of Behavior to the Object Structure System-Level Design (ENSE 622 version) Figure 16. System Structure Fragments of Behavior for the System-Level Design Sequence diagram provides a graphical representation for how a task is accomplished by passing a sequence of messages among objects. These interactions define behavior as implemented by the fragments of the system structure. Our system can be divided into two different sequence diagram as shown below: Sequence Diagrams for Placing an Order (ENSE 621 version) Figure 17. Sequence of Messages for Placing an Order As seen in the diagram the customer enters the system by clicking begin button and selects his language choice. He then clicks on the menu button to see the menu items and then makes a selection. He then confirms his order by clicking on the confirm order button. Sequence Diagrams for Making the Payment (ENSE 621 version) Figure 18. Sequence of Message for Making the Payment Customer has been prompted for the mode of payment. If he selects cash then he has to give cash to the cash collector and receive change, if any. He also receives a receipt from the cash collector. If the customer selects debit/credit card payment mode, he is asked again to select from debit or credit. If he selects debit card then he is asked a pin number or else he is asked to slide the card. After checking for the validity of the card the payment is made and the customer receives a receipt. Traceability of Requirements to Attributes and Functions System Level Requirements | Object | Attribute | Function | 1. 1. Restaurant will be open for 16 hours and will operate in four shifts as Morning (730 AM -1130 AM), Afternoon (1130 AM -330 PM), Evening (330 PM ââ¬â 730 PM) and Night (730 PM -1130 PM). | Fast Food System | Time | | 1. 2. System should be able to serve a throughput of 50, 125, 50, 75 customers per hour during these four shifts respectively. | Fast Food System | Throughput | | 1. . Cooks, cleaners and assemblers will be the type of employees working the restaurant. | Employee | type | | 1. 4. Cook will be paid at the rate of $5 per hour for the duration of their work. | Cook | Salary | | 1. 5. Assemblers will be paid at the rate of $4. 75 per hour for the duration of their work. | Assemblers | Salary | | 1. 6. Cleaner will be paid at the rate of $4. 5 per hour for the duration of their work. | Cleaner | Salary | | 1. 7. Customer will leave without ordering if he sees 6 or more people in the line waiting to be served thereby causing a loss in revenue. Fast Food System | Waiting time | | Sub-System Level Requirements | Object | Attribute | Function | 2. 1. 1. The system will provide queue management by passing orders sequentially to kitchen (FIFO) by assigning order numbers to them. | Internal Ordering System | Order No | TransmitOrder ToKitchen | 2. 1. 2. Customer should be able to order item either by name or by number (for combo deals). | Item | Type/Name | Order | 2. 1. 3. System will support native and other commonly spoken language in the country. | Display | Language | | 2. 1. 4. An average order takes about 1 minute to complete with a variance of 10 seconds. | Kitchen | | Make Order | 2. 1. 5. Customer takes 2 minutes on an average to complete and ordering process. | | | place order | 2. 1. 6. System will be equipped with a standard QWERTY keyboard for taking inputs. | Keypad | layout | | 2. 2. 1. This Order number will be printed on the bill that customer receives. | Receipt Printer | Order No | PrintOrderNo | 2. 2. 2. System shall be able to accept cash and coins. | Cash Acceptor | Type | AcceptCash- AndCoin | 2. 2. 3. System should be able to accept debit / credit cards. Card Reader | Type | ReadCard | 2. 2. 4. System will accept only $1, 5, 10, 20 bills and nickel, dime, quarter denomination of coins. | Cash Acceptor | TypeTo AceeptCash- AndCoin | AcceptCash- AndCoin | 2. 2. 5. System will reject pennies ; $50, $100 bills. | Cash Acceptor | | RejectCash AndCoin | 2. 2. 6. System wonââ¬â¢t allow putting in $1 coin. | Cash Acceptor | | RejectCash AndCoi n | 2. 2. 7. Cash return will return change only in coins. | Cash Return | type | returnChange | Component Level Requirements | Object | Attribute | Function | 3. 1. 1. Touch screen should be able to take inputs from users when they apply a light pressure (x lb) from their fingers corresponding to an item. | Touch Screen | | TakeInput | 3. 1. 2. Touch screen should be able to withstand rough use i. e. it will be scratch proof (i. e. , will be resistant to nail scratching) and will not malfunction if a pressure of (x+5) lb is applied to the screen. | Touch Screen | | | 3. 1. 3. Touch screen will colored for visual appeal and will support at least 256 colors. | Touch Screen | type | | 3. 1. 4. Resolution of the screen will be at least 640X480 pixels. Touch Screen | pixels | | 3. 1. 5. Touch screen will be at least 10â⬠³ in size. | Touch Screen | dimension | | 3. 1. 6. Touch screen should be able to display at least 15 rows and 60 columns of text when the font size of the text is 10. | Touch Screen | dimension | | 3. 2. 1. System will be equipped with a card reader with built it keypad (containing all digits and special function keys corresponding to CANCEL, OK, # etc). | Card Reader | type | | 3. 2. 2. This card reader should be able to read the card information if swiped at a speed 1 m/s. | Card Reader | | ReadCard | 3. 2. 3. Card reader ill have a vertical slot on the right hand side of the keypad. | Card Reader | LocationOf Slot | | 3. 2. 4. System will read the swiped card, will retrieve the total bill amount and initiate the modem to dial the bank to complete the transaction. | Modem / Card Processor | | Dial Bank | 3. 3. 1. System will display all the menu items in icons/graphics format for selecting. | Display | | selectItem | 3. 3. 2. System will prompt the user for mode of payment. | Display | Payment Mode | SelectPayment Mode | 3. 3. 3. Order will be transferred to the kitchen touch screen instantaneously once the user does the payment. Internal Ordering System | ProtocolTo- Communicate | TransmitOrder ToKitchen | 3. 3. 4. System will display the order sequentially on the kitchen screen with a forward and back but ton at the bottom. | KitchenScreen | | ForwardOrder ReverseOrder | 3. 3. 5. Touching an order on the kitchen screen will prompt the system that the order has been delivered and the screen will be rolled forward. | KitchenScreen | | SignalComplete- Order | 3. 3. 6. Any error message during such a process will be reported to the user on the touch screen informing him to take any further action. Display | | ReportError Message | 3. 3. 7. There will be a high contrast between the foreground and the background of the display for easy reading capabilities. | Display | | | 3. 3. 8. Throughout the ordering process all the text displayed on the screen will be either greater than 10 or less than 18 font size so that all users (young, adult, old) can read it. | Display | Text/Size | | 3. 4. 1. Modem should be able to complete a transaction (dialing, sending information, receiving information) in 15 seconds or less at all times. | Modem | Speed | Dial Bank/ Transmit Information | 3. 4. 2. Once connected to the bank system will supply the card information to the bank database, will query the card validity and will supply the amount to be charged to the card. | Modem | | Transmit Information | 3. 5. 1. System will be secured to grant access rights only to the system administrator. For this a login ID and a password will be assigned which could be changed. Password wonââ¬â¢t be visible to onlookers while typing for increased security. | Software| Login/ Password | Authorize | 3. 5. 2. System will deny access to change the contents if the login/password/ both are incorrect by providing an error message. System Administrator/ Software| | Deny Access | Design Structure Matrix Systems engineering of product, process, and organizations require tools and techniques for system decomposition and integration. A design structure matrix provides a simple compact and visual representation of a complex system that supports innovative solutions to decomposition and integration prob lems. The techniques of DSMs have led to there increasing use in a variety of contexts, including product development, project planning, project management, systems engineering, and organization design. There are two main categories of DSMs: Static and Time-based. Static DSMs represent system elements existing simultaneously, such as components of a product architecture or groups in an organization. In time-based DSMs, the ordering of the rows and columns indicate a flow through time: upstream activities in a process precede downstream activities, and terms like ââ¬ËFeedforwardââ¬â¢ and ââ¬ËFeedbackââ¬â¢ become meaningful when referring to interfaces. Figure 19. DSM Taxonomy 1. Component -Based or Architecture DSM: Used for modeling systems architectures based components and/or subsystems and their relationships. . Team-Based or Organization DSM: Use for modeling organization structures based on people and/or groups and their interactions. 3. Activity-Based or Schedule DSM: Used for modeling processes and activity based networks based on activities and their information flow and other dependencies. 4. Parameter-Based (or Low-Level Schedule) DSM: Used for modeling low-lev el relationships between design decisions and parameters, systems of equations, subroutine parameter exchanges. Now let us apply one of the DSM techniques to our existing system. Let us consider the Pay Bill activity of our system and apply the ââ¬ËInformation Flow based Process Modelingââ¬â¢ using the Activity-Based DSM. Processes ââ¬â especially product development processes are complex systems. A prerequisite to process improvement is process understanding. Process structure or architecture affects process efficiency and effectiveness. Therefore, process architecture can be an important source of competitive advantage. Improved understanding of process architecture can be gained by using process models, particularly ones that support process decomposition and integration analysis. Process decomposition requires and understanding of process activities and their interfaces, because the interfaces are what give a process its added value. therefore process models must capture flows. Modeling a process requires two representation steps, followed by integration analysis 1. Decompose the process into activities 2. Document the information flow among the activities 3. Analyze the sequencing of the activities into a maximally-feed-forward process flow. Activity-Based DSM of the payment design process: Activities| | 1| 2| 3| 4| 5| 6| 7| 8| 9| 10| 11| 12| 13| 14| 15| 16| 17| Display Bill| 1| | X| | | | | | | | | | | | | | | | Select Mode of payment| 2| | | X| | | | | | | | | | X| | | | | Read Card| 3| | | | X| | | | | | | | | | | | | | Dial bank| 4| | | | | X| | | | | | | | | | | | | Transmit information| 5| | | | | | X| | X| | | | | | | | | | Decline card| 6| | | | | | | X| | | | | | | | | | | Display error message| 7| | X| | | | | | | | | | | | | | | | Approve card| 8| | | | | | | | | X| | | | | | | | | Display Approved message| 9| | | | | | | | | | X| | | | | | | | Get signature| 10| | | | | | | | | | | X| | | | | | | Print receipt| 11| | | | | | | | | | | | X| | | | | | Transmit order to kitchen| 12| | | | | | | | | | | | | X| | | | | Accept cash/coins| 13| | | | | | | | | | | | | | | | | | read amount| 14| | | | | | | | | | | | | | X| X| | Count total amount and display| 15| | | | | | | | | | | | | X| | | | X| Reject Cash/Coin| 16| | | | | | | | | | | | | X| | | | | Return chan ge| 17| | | | | | | | | | | X| | | | | | | Figure: Activity Based DSM for Fast Food Payment System With a reasonably accurate model of a process, one then uses the model to look for improvements, expecting that they can be implemented in the real process. the primary goal in basic DSM analysis is to minimize feedbacks and their scope by restructuring and re-architecting the process, that is, by re-sequencing the rows and columns of the matrix. This widely practiced initial step in analysis is called partitioning, block diagonalization or block triangularization. In our model since there are very few feedback paths and amongst the existing ones every path is important hence we cannot minimize the number of feedback paths. But after frequenting DSM we have the following block-diagonalized DSM Activities| | 4| 5| 6| 1| 7| 2| 3| 8| 9| 10| 15| 11| 17| 13| 14| 16| 12| Dial bank| 4| | X| | | | | | | | | | | | | | | | Transmit information| 5| | | X| | | | | X| | | | | | | | | | Decline card| 6| | | | | X| | | | | | | | | | | | | Display Bill| 1| | | | | | X| | | | | | | | | | | | Display error message| 7| | | | | | X| | | | | | | | | | | | Select Mode of payment| 2| | | | | | | X| | | | | | | X| | | | Read Card| 3| X| | | | | | | | | | | | | | | | | Approve card| 8| | | | | | | | | X| | | | | | | | | Display Approved message| 9| | | | | | | | | | X| | | | | | | | Get signature| 10| | | | | | | | | | | | X| | | | | | Count total amount and display| 15| | | | | | | | | | | | | X| X| | | | Print receipt| 11| | | | | | | | | | | | | | | | | X| Return change| 17| | | | | | | | | | | | X| | | | | | Accept cash/coins| 13| | | | | | | | | | | | | | | X| | | read amount| 14| | | | | | | | | | | X| | | | | X| | Reject Cash/Coin| 16| | | | | | | | | | | | | | X| | | | Transmit order to kitchen| 12| | | | | | | | | | | | | | | | | | Figure: Revised Activity Based DSM for Fast Food Payment System An activity based DSM provides a systematic method for designing a data-driven project schedule such that information transfer is timely and the design more rapidly converges to the desired performance specifications along multiple dimensions. System Trade-Off Analysis System Performance Characteristics 1. Minimizing the Cost of Operating the System (per day/per shift). This directly relates to the salary of the employees and the other variable cost like operating cost of the touch screen and the raw materials 2. Maximizing the Number of customers (Throughput), Which can be handled by the system in a given shift: This in turn again relates to the number of employees and the number of operating touch screen. 3. Minimizing the Queue Length This is a direct measure of the customer satisfaction with the system and may cause loss of revenue if a customer decides it is not worth waiting for the system to be free and will leave. 4. Maximizing the Operator Utilization That is we would not like to pay for the employees, which are sitting idle and cause the cost of operating the system to go up without generating revenue. 5. Minimizing the Maximum Time spent by the Customer in the System This might be a bottleneck consideration while designing the system. A customer will not come back again if he sees that he has to spend a lot of time get his order completed. Also this is an important characteristic in time critical setting (for e. g. at airport where a customer has to catch a connecting flight and he drops in to get a quick snack or the operation of the fast food restaurant in the business neighborhood where people are always running late for meetings and other important work). 6. Minimizing the Average Waiting Time This is more or less directly relates to the queue length minimization problem. But it is important to consider the time it takes for an average customer to complete the order on the touch screen. So queue moves quickly. So this in turn relates to designing a user interface, which causes a user to navigate smoothly across the screens without fumbling for the things, he is looking for. 7. Minimize the Queue Length at the Pickup Counter It is not simply enough to state that minimizing the queue on the touch screens or average waiting time on the touch screens will do the job. We also have to consider employing enough assemblers so that they deliver the prepared order quickly and efficiently. 8. Minimizing the Number of Lost Customers This directly relates to the requirement on the percentage of customer who will be served by the system. Obviously a lost customer is lost revenue and as this number increases so is the increasing dissatisfaction with the restaurant operation. After all no owner would like to listen to a grapevine that its restaurant fails to meet the demand of that particular area. Decision Variables The decision variables are as follows: 1. Number of Cooks This variable directly relates to the speed of making the food. A large number will ensure that a customer does not have to wait for their order to be prepared. But on the other hand a large number may signify that cooks are sitting idle if the demand is not so big there by increasing the cost of operation. 2. Number of Assemblers These people are needed to assemble food and delivering them in an efficient fashion. Sometimes these people are also required to deliver instant entities in the order like soda and fries. For a system design without touch screens these are the people, which take the order. A higher number is good from the customer point of view, as they don? t have to wait but is bad from the ownerââ¬â¢s perspective because it means a higher idle time for slump periods and increasing cost of operation. 3. Number of Cleaners Obviously as per the federal guidelines a restaurant has to ensure a degree of cleanliness. So this number increases as the number of customer increase to utilize the system. 4. Number of Touch Screens There is an upfront cost of installing and networking the screens via a central server, which carries all the data. So it is important of the owner to decide upon the number of customer he expects in a particular business setting and employ a most cost effective solution. A higher number means customer has to wait in small queue and their order will be sent to the kitchen promptly. But there is a operating cost and a fixed cost of installing each of the touch screens. CPLEX Problem Formulation Identifying the above performance characteristic and the decision variable now we have to conduct a trade off analysis to optimize the system design with respect to all of the performance characteristics. As seen above this is a multi objective optimization problem with competing objectives with respect to the decision variables. Trade off analysis with CPLEX: In this we will analyze the performance of the system with respect to the decision variables. Specifically we chose Cost of operating the system, number of customers that can be handled and the length of the queue. As per the given requirement document the following model equations were obtained. See an explanation of the details of the equation below. Objective Function * Minimize the cost of operating the system per day. * 20(X1+X2+X3+X4)+18(Y1+Y2+Y3+Y4)+19(Z1+Z2+Z3+Z4)+16W * Maximize the number of customers which can handled by the system (throughput) * 240(X1+X2+X3+X4) Minimize the length of queue generated at the counter: This in effect becomes maximizing W. We will show it in a moment. where: * X1: Number of cooks working in the breakfast shift * X2: Number of cooks working in the lunch shift * X3: Number of cooks working in the snacks shift * X4: Number of cooks working in the dinner shift * Y1: Number of cleaners working in the breakfast shift * Y2: Number of cleaners working in the lunch shift * Y3: Number of cleaners working in the snacks shift * Y4: Number of cleaners working in the dinner shift * Z1: Number of assemblers working in the breakfast shift * Z2: Number of assemblers working in the lunch shift Z3: Number of assemblers working in the snacks shift * Z4: Number of assemblers working in the dinner shift * W: Number of touch screens installed in the system Equation for the operating cost was obtained as follows: As per the requirement document cooks, cleaners and the assemblers are paid a salary of $5, $4. 5 and $4. 75 per hour. We have 4 hours per shift and there are four shifts. So salary expenses for a typical day becomes: Salary = 4*5(X1+X2+X3+X4)+4*4. 5(Y1+Y2+Y3+Y4)+4*4. 75(Z1+Z2+Z3+Z4) = 20 (X1+X2+X3+X4) + 18 (Y1+Y2+Y3+Y4)+ 19 (Z1+Z2+Z3+Z4) Operating cost of a touch screen was deter mined to be $1 per hour based on its useful life and the cost of buying it. So for 16 hours operation of w screens we have an operating cost of 16W per day added to the above equation resulting in the complete equation of the cost. Equation for the number of customers that can be handled by the system per day was obtained as follows: Bottleneck process for the system is preparing food, which is carried out by the employed cooks in a particular shift. It was estimated that for an average order a cook takes about 1 minute to prepare the main dish. So for a shift one cook can handle about 240 customers based on the 4-hour duration of the shift. Again to keep the problem simple small breaks taken by the employees during the work were neglected. We are designing the system to operate at its peak capacity and then see its performance. Based on this data average throughput of the system per day is given by 240*( X1 + X2 + X3 + X4) Any demand over this value will cause long lines at the pickup counter and possibly loss of the customers. As noted above in the objective formulation we now explain how minimizing the length of queue relates to the maximizing number of touch screen installed. Though it is very intuitive. Customer arrival and customer service follow poison and exponential distribution respectively. The queue under consideration is called a multi-channel single stage queue as shown below: That is, customers arrive according to a poison process with a mean rate of arrival into the system and join a single queue. The person at the front of the queue seizes the first available resource (touch screen) to place his order. The process of placing the order is exponential with a mean rate of about 2 minutes. This is symbolized as a M/M/W type of multi-channel single stage queue. Length of this queue is calculated as follows: Customers arrive according to a Poisson process with rate l There are s servers. There is a single line of entities awaiting service Service time is exponential with rate m Let r = l/sm We have used an Excel template to calculate Lq Result of the CPLEX Runs We have used the constraint method to solve this multi-objective optimization problem. i. . , we have minimized the cost taking the throughput and the number of the screens as the constraints. Following matrix shows the result of the cplex run (A log of the cplex file containing the runs can be seen in Appendix 1. LP formulation file used to run the cplex optimization can be seen in Appendix 2). No. | Design Variables | Cost | Meal Throughput | Queue Length | | W | X1 | X2 | X3 | X4 | Y1 | Y2 | Y3 | Y4 | Z1 | Z2 | Z3 | Z4 | | Breakfast | Lunch | Snacks | Dinner | Total | Bf | Lun | Nn | Din | Avg | 1 | 7 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 419 | 200 | 500 | 200 | 300 | 1200 | 0. 001 | 0. 235 | 0. 001 | 0. 009 | 0. 615 | 2 | 7 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 419 | 240 | 720 | 240 | 480 | 1680 | 0. 002 | 3. 683 | 0. 002 | 0. 189 | 0. 969 | 3 | 7 | 1 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 439 | 200 | 600 | 250 | 350 | 1400 | 0. 001 | 0. 81 | 0. 003 | 0. 024 | 0. 2095 | 4 | 7 | 2 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 459 | 250 | 650 | 250 | 450 | 1600 | 0. 003 | 1. 48 | 0. 003 | 0. 119 | 0. 40125 | 5 | 7 | 2 | 4 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 518 | 250 | 750 | 300 | 500 | 1800 | 0. 003 | 5. 847 | 0. 009 | 0. 235 | 1. 5235 | 6 | 7 | 2 | 4 | 2 | 4 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 538 | 300 | 800 | 350 | 750 | 2200 | 0. 009 | 17. 223 | 0. 024 | 5. 847 | 5. 7575 | 7 | 8 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 435 | 200 | 500 | 200 | 300 | 1200 | 0 | 0. 078 | 0 | 0. 002 | 0. 02 | 8 | 8 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 435 | 240 | 720 | 240 | 480 | 1680 | 0 | 1. 071 | 0 | 0. 059 | 0. 2825 | 9 | 8 | 1 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 455 | 200 | 600 | 250 | 350 | 1400 | 0 | 0. 279 | 0. 001 | 0. 006 | 0. 0715 | 10 | 8 | 2 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 475 | 250 | 650 | 250 | 450 | 1600 | 0. 001 | 0. 494 | 0. 001 | 0. 038 | 0. 1335 | 11 | 8 | 2 | 4 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 534 | 250 | 750 | 300 | 500 | 1800 | 0. 001 | 1. 494 | 0. 002 | 0. 078 | 0. 9375 | 12 | 8 | 2 | 4 | 2 | 4 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 554 | 300 | 800 | 350 | 750 | 2200 | 0. 002 | 2. 663 | 0. 006 | 1. 494 | 1. 04125 | 13 | 9 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 451 | 200 | 500 | 200 | 300 | 1200 | 0 | 0. 026 | 0 | 0 | 0. 0065 | 14 | 9 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 451 | 240 | 720 | 240 | 480 | 1680 | 0 | 0. 39 | 0 | 0. 019 | 0. 10225 | 15 | 9 | 1 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 471 | 200 | 600 | 250 | 350 | 1400 | 0 | 0. 101 | 0 | 0. 002 | 0. 02575 | 16 | 9 | 2 | 3 | 2 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 491 | 250 | 650 | 250 | 450 | 1600 | 0 | 0. 182 | 0 | 0. 012 | 0. 485 | 17 | 9 | 2 | 4 | 2 | 3 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 550 | 250 | 750 | 300 | 500 | 1800 | 0 | 0. 536 | 0 | 0. 026 | 0. 1405 | 18 | 9 | 2 | 4 | 2 | 4 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 2 | 570 | 300 | 800 | 350 | 750 | 2200 | 0 | 0. 895 | 0. 002 | 0. 536 | 0. 35825 | Where * Throughput = Breakfast + Lunch + Snacks + Dinner * Lenbf: Average length of queue for breakfast * Lenlun: Average length of queue for lunch * Lensn: Average length of queue for snacks * Lendin: Average length of queue for dinner * Average: (Lenbf + Lenlun + Lensn + Lendin)/4. 0 Plot of Non Inferior Solution in the Objective Space Trade-Off between Throughput and Cost Trade-Off b etween Cost and Length of Queue Trade-Off between Throughput and Length of Queue Analysis of Pareto Points of the System From the above matrix and the graphs plotted taken two objective at a time following pareto points were obtained (shown in the above graphs with a circle around it): No. | Cost | Throughput | Length of Queue | W | X1 | X2 | X3 | X4 | Y1 | Y2 | Y3 | Y4 | Z1 | Z2 | Z3 | Z4 | 1 | 419 | 1200 | 0. 0615 | 7 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 2 | 419 | 1680 | 0. 969 | 7 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 7 | 435 | 1200 | 0. 02 | 8 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 8 | 435 | 1680 | 0. 2825 | 8 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 13 | 451 | 1200 | 0. 065 | 9 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | 14 | 451 | 1680 | 0. 1022 | 9 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | A Pareto point correspond to a point in the objective space which belongs to a set of non-inferior solutions meaning if you move away from this point to any other point in the objective space you will have to sac rifice at least one objective. Final System Design From the owners perspective point 2 seems to be a best compromise among all the available system design because it has a low cost of operation per day and can handle a high throughput at a reasonable queue length, which is acceptable by the requirement document. No. | Cost | Throughput | Length of Queue | W | X1 | X2 | X3 | X4 | Y1 | Y2 | Y3 | Y4 | Z1 | Z2 | Z3 | Z4 | 2 | 419 | 1680 | 0. 969 | 7 | 1 | 3 | 1 | 2 | 1 | 1 | 1 | 1 | 1 | 2 | 1 | 1 | System-Component Testing Primary Verification Plan Testing and product delivery procedures begin at the component level and work toward the system and stakeholder tests. Primary verification and validation plan for the above system in proposed as follows: Figure 20. Detailed Model of Product Testing and Delivery. Testing and product delivery procedures include: * Verification of the products against ââ¬Å"specified requirementsâ⬠and; * Validation of the assembled (sub)system against assigned requirements. Below are some examples to demonstrate how we can test our requirments at different levels: Requirement 1. 1. Restaurant will be open for 16 hours and will operate in four shifts as Morning (730 AM -1130 AM), Afternoon (1130 AM -330 PM), Evening (330 PM ââ¬â 730 PM) and Night (730 PM -1130 PM). Examination. 1. 1. 1 Inspect the restaurant operation where this proposed system will be installed (As per the requirement supplied by the customer). * System will fail if the operating time is changed once the system in installed (might reflect in high operating cost or low efficiency and utilization of system resources making the operation non profitable). Requirement 1. 2. System should be able to serve a throughput of 50, 125, 50, 75 customers per hour during these four shifts respectively. Simulation. 1. 2. 1. Run a system wide simulation (as done in arena for example) * System fails if the maximum number in line (bottleneck) exceeds 10 or if there are lost customers. Examination. 1. 2. 1 After the prototype is installed in one of the restaurant observe the total throughput and the maximum number in queue. Requirement 1. 3. Cooks, cleaners and assemblers will be the type of employees working the restaurant. Examination. 1. 3. 1. See the type of workers working in the restaurant where we plan to install such a system. System fails if a new level of hierarchy is introduced by the management at a later point of time, which causes the operating cost per day to be changed. Requirement 1. 4. Cook will be paid at the rate of $5 per hour for the duration of their work. Examination. 1. 4. 1. Find out the rate of the pay of the cook for the restaurant where we plan to install the system. Simulation. 1. 4. 1. See if the direct labor cost corresponding to cook resource and divide it by number of hours worked. This number should be $5/hr. * System fails otherwise. â⬠¦Ã¢â¬ ¦ details of verification plan removed â⬠¦. Requirement 3. 4. 2 Once connected to the bank system will supply the card information to the bank database, will query the card validity and will supply the amount to be charged to the card. Demo. 3. 4. 2. After the modem connects to the bank touch screen display changes to (transmitting, authorizing, approved) in succession when user is paying with a credit card with remaining credit on it. * System fails if above sequence does not take place even though user has swiped a card with a remaining credit on it Simulation. 3. 4. 2. 1. When executing the scenario of paying by the credit card, software subsystem supplies the card information, total bill amount to be charged to the credit card, query its validity and debit the amount. * System fails if such functionality does not exist while paying with a credit card. Requirement 3. 5. 1 System will be secured to grant access rights only to the system administrator. For this a login ID and a password will be assigned which could be changed. Password won? e visible to onlookers while typing for increased security. Demo. 3. 5. 1. 1: En How to cite Fast Food Automated Ordering System, Essay examples
Monday, April 27, 2020
The Effects of Watching Tagalized English Movies in the Philippines Essay Example
The Effects of Watching Tagalized English Movies in the Philippines Essay Introduction: . Tagalization is the process of converting foreign language into Filipino language or it is the translating of text into Filipino. Under the 1987 Constitution XIV Section 6, the Filipino national language was settled and the Education department adopted a bilingual program to promote the use of Tagalog, the other official language. The government was swayed by studies indicating that children tended to learn better in their native languages The trend for Tagalization or as some would call it Filipinization has increased in the recent years. Among those in the media which have changed languages through the years are the movies. And because of this, the level of English proficiency decreased. Incapability to speak English fluently and efficiently is one of the realities faced by many young Filipinos today. There are many reasons to explain the decline in English proficiency but the proliferation of television shows such as tagalizing English movies is one of the attributors. With this, how could we expect the young generation to speak and write English fluently? Absract: This research entitled ââ¬Å"The Effects of Tagalizing English on the English Proficiency of the First Year College Students of Pasig Catholic Collegeâ⬠was conducted to know the effects of tagalizing English movies of the first year college students of Pasig Catholic College. It aims to answer the following questions 1. What is the profile of the first year college students of Pasig Catholic College in terms of: 1. 1 Gender 1. 2 Program1. 3 Age 2. What is the academic level of performance of those students who watch tagalized English movies? 3. What are the effects of watching tagalized English movies? We will write a custom essay sample on The Effects of Watching Tagalized English Movies in the Philippines specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Effects of Watching Tagalized English Movies in the Philippines specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Effects of Watching Tagalized English Movies in the Philippines specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The researcher chose the first year college students of Pasig Catholic College to be her respondents. In this regard, the researcher used descriptive method to determine the different effects of tagalizing English movies of the abovementioned first year college students. The researcher used the survey questionnaires in gathering data as the main instrument. The questionnaire is divided into three parts. Part I was about the profile of the respondents, part II was the grade in English of the first year college students for the first semester, and part III dealt with the different factors regarding tagalized movies. In the light of the study, the researcher came up with the following findings: Area of Focus This study aims to determine the effects of tagalizing English movies of the first year college students of Pasig Catholic College. The English Teacher: This study may prove significant to the English teachers to become aware of the studentââ¬â¢s needs and responses. He/she, as a facilitator of learning should encourage the students in engaging oral and written activities to enhance their English proficiency. The Students: This study will serve as an encouragement to the students to watch English movies more instead of tagalized English movies to develop fundamental communication skills that prepare students to engage in fluent and responsible communication. The Parents: Through this reseach, the parents will come up with ways to assist and expose their children to different English resources to develop the studentââ¬â¢s skills in English proficiency. Related Literature: According to Shianee Mamanglu of Manila Bulletin (2010) agreed that the Filipino skill in English have diminished over the years thus the need to enhance it. She also said that only five to ten are accepted out of every 100 call center applicants because of poor English skills particularly on communication. Lingualearn, (2002 ) said that one can learn grammar of a language in different ways and one of these is by watching television. All have an inborn mechanism for decoding and making sense of foreign languages. By immersion in the foreign language and culture, one should be able to pick up any language. The New Strait Times and the Star Newspaper (2005) said that it is important that students should watch more television, especially educational English programs.
Subscribe to:
Posts (Atom)