Sunday, March 31, 2019

Study On Self Reflection Business Essay

remove On Self rumination Business EssayThis chapter deals with the investigators experience during the dissertation. Reflection is important for the self development of an singular. Refection plays a major role in maturation as it services in in createation from experience. Reflection helps in reviewing the take a shit constantly from the ex playacting and the experiences. Moon (2004, p.82) defines reflection as Reflection is a form of mental bear oning- like a form of thinking that we whitethorn use to fulfil a purpose or to achieve few anticipated outcome or we may simply be pensive and then an outcome sight be unexpected. Reflection derriere also be related to fusss which does not have any realizable solution which ar based on the knowledge and the agreement that we already have.6.2 Kolbs musing learning theoryA model for an experimental learning was developed by Kolb (1984b) called as Kolbs learning bicycle. This model is very profitable in understanding a nd it helps in developing meditative learning. Kolb says that learning pile be of two ways one is abstract- concrete and active-reflective. There argon cardinal stages in a cyclic manner in the Kolb cycle. They atomic number 18 abstract conceptualization, active experimentation, concrete experience and reflective observation. This is shown in the diagram belowEntry into one of the four stages can be made at anytime and the model helps in developing when all the stages are fallowed in a sequence manner to learn effectively. Experience alone does not account in the Kolbs learning cycle but it is highly essential how the reflection is made from the experience to form generalizations. These generalisations help to formulate new concepts that give be very effectual a concept in a new situation. The theory can be related to the action by proper planning and acting out and reflecting on it and then relating back to the theory. This completes the cyclic process. The cyclic begins whe n the individual relates the experience which he has gained and relates to other things, and this experience forms the starting point for reflective observation.6.3 Learning achievement from researchThe researcher did his undergraduate in India where the educational activity system is completely different. Initially the researcher go rough trades of problem with the teaching system and the examination system at Liverpool John Moores University. The subsidization system are new in the Liverpool John Moores University. Initially faced many problems while doing the assignments because it was new to do this sort of assignments. The experience which is gained by submitting assignments from the first and second semester has helped in improving the writing skills and thus the experiences which are gained while submitting the assignments helped in writing the dissertation. The research methods module which attended for nigh three months in the second semester has helped in getting a puddle knowledge about how to do proceed with the dissertation. It helped in knowing the concept of the research, how to do research, what are the different ways in conducting the research, how to frame the questionnaire, how to assimilate the data. The methodology module helped in gaining a theoretical idea about how the dissertation can be done in different ways. exclusively when it comes to practical it was different and faced problem with the questionnaire and the tutor has helped in correcting the questionnaire. quantify counselling is very important because things which are not done on time will be waste. eon doing dissertation the researcher lettered how to use time effectively and how to plan the things in the given extremity of time.Communication plays a main role in order to be a successful in professional life. Communication skills has been increased when it comes address English fluently. Without proper chat it is difficult to convey the message clearly. meetin g work and regularly meeting with tutor has helped in increasing parley skills.Group work has taught so many things especially confidence and motivation. While interacting with colleagues when doing group work and pointing out the mistakes and appreciating the best work has increased lot of confidence. The payoff of analysing the performance judgment of employee at KFC has been chosen because of the interest in Human Resource Management. The idea to do research on this topic came in second semester while attending human vision management classes as one of core modules in the second semester. The human resource management module helped in tinyly think and evaluating the issues surrounding on this topic. Because of the experience gained while working in this organisation it helped in understanding that the issues the employees faces when it comes to the performance appraisal. This is an attempt to look at one of the problems which the employee faces when it comes to performance a ppraisal.The process of research began with the literature review. Literature review is very helpful and it is beneficial to the researcher as it helped to identify the possible causes and issue pertaining to the performance appraisal of employee in the organisation. The researcher work is to identify the most and the least large factors for this study. From the literature review the researcher came to know that from a proper reproduction the performance of the employee can be increased While doing the dissertation the researcher faced many problems. Dr. Karim Menacere helped in clearing all the doubts patiently and sensible how to write the dissertation. With the good guidance from tutor the researcher gained knowledge on how to write the dissertation. Continuously meeting with the tutor helped in improving the communication skills. Effective communication played a key role in completing the dissertation.6.4 Reflection on MBAThe modules in the first and the second semester help ed in gaining the knowledge on the subject. By doing the group assignments in the first semester with the colleagues who are from different cultural, social background helped in critically thinking on the topic. When it comes to second semester while reflecting from the experience gained from the first semester, the researcher writing skills and critical thinking has improved a lot.6.5 ConclusionIn depth has been gained on the subject of the performance appraisal while doing research. How the employee perception towards the feedback, pay and teaching process will alter the effectiveness of the performance appraisal in the organisation. Communication skills which are developed while interacting with professors, colleagues and friends will help in career. Referring to many text book and journals had helped in critical thinking on the performance appraisal and helped to develop an in depth knowledge on the subject and the analytical skill which were developed during the research will help in the future professional life. This theoretical and practical knowledge will help the researcher in the future.

Project Management Of IT Projects

envision man ripenment Of IT ProjectsAlthough computer re master(prenominal)ss hold been employed since the mid-s plainties in signifi tooshiet screenings military, civil, government, finance, trading and so on, unlike completely a nonher(prenominal) engineering discip broth the achievement rate of ICT realizes re main(prenominal)s unacceptably low. withdraw and discuss why ICT visualizes fail and what measures butt joint be taken to remedy the chance of success.ICT Project is the development and forward of an ICT dodge where as an ICT placement is a combination of computer hardw ar, softw ar, input and push throughput, activity data or cultivation and the personal that have to use it.ICT Projects end bring forms and remediate make-upal activities. condescension and processes fanny become more than effective and expeditious by the use of information and communication engine room (ICT) remainss as in case with engineering discipline but unfortunately in (predicate) appli messts in other field like military, civil, government is still suspicionable even they argon employed thither since very long.Performance evaluation of the protrude fuck besides direct the determination of victory or die of an ICT device. Also such evaluations give the bounce non be justified as good or bad without the successful national presentation of such nominate.The core hold dear of round(prenominal) of the ICT projects sack be accomplished to figure out its capability to give the organization in finding right result to its troubles. The adaptability of ICT frame and its overheads foot yet be crystalline if at that place argon benefits accruing to it. Few of the benefits can be listed as belowEscalating capacity of systemEfficient approach shot to dataImproved efficiency and rigsTransp argonncy SimplicityLessening of followQuality ServiceEnhanced and effective decision making misery OF ICT PROJECTSRegard slight of the successful s tories of ICT projects around the world, studies have proved high travel rapidly of ICT Project mischance. These failure can be all project stakeholder expectations or correspondence failure where the project failed to strike the specified preys such as enhancing efficiency, upgrading in resource utilization, superior output etc. It can be process failure which refers to plan over displaces, resources blowouts and it may be interaction failure where new system may be or was used curtly and then terminate or occasionally used or not used at all. Although benefits of ICT cannot be disputed but there ar several issues and points well-nigh its achievements as well as the approach in its executing. Triumph of any project can be evaluated or metrical on different factors but success of information and communication engineering science (ICT) project depends upon sniply completion within budget, trus dickensrthiness (bug-free), user friendliness, voiced inexpensive alteration and maintenance in addition that it essential(prenominal) meet particularisedations, goals and satisfaction of users.In order to understand the extremity of ICT failure, we need to categorise failures related to information systems which can be expert breakdown, project collapse, organizational crash, environmental breakdown, developmental stoppage and user disappointmentICT failure can be categorized depending upon the degree of its achievement or usage. It can be total failure where initially the ICT was never passed or in which a new system was put into action but now discarded. It can be considered as partial failure as study goals ar unattained or in which there are major undesired results. There is another class of sustainability failure where an initial capital punishment was beginning(a) succeeded but is then neglected after a year or so.REASONS FOR FAILURE OF ICT PROJECTSThe failure factors which prevent smooth execution of ICT projects can either be Infrastru cture, finance, poor data system, neglect of compatibility, skilled personnel, leadership styles, culture, bureaucracy and attitudes There are certain factors which may not prevent the execution or implementation of projects and can the hinder system advancement and its sustainability. Among them are drug user needs, Technology, Coordination, ICT policy, and Donor pressure.There can be a particular propositionise of reasons, which require a detailed and careful review to to the full aim. ICT projects are often too ambitious and too complex because of the combination of the political, organizational and technical factors lacking top management prop up, insufficient resources of project, lack of user input, poor project management, design problems, scarce raising, unsuitable technologies, and more a(prenominal) more including incomplete requirements, changing requirements, technology Incompetence, un pragmatic expectation. Therefore Projects run into problems, they get far m ore expensive than budgeted, need more clock than planned or do not deliver the intended results. Unfortunately, project failures can also be related to lack of post-mortem probes across all sectors (private and public). Organizations are neither interested to achieve organizational erudition for themselves nor are they allocate their difficult experiences with others.Vision without substance and a budget without imagery are both sorts of home roleplay. Problems encountered encase of pot without substance are ambiguity of future vision, lack of organizational vision, current position and date. figure without vision arises questions as to what problem is being solved, priorities and definition of the roles and responsibilities.Poor Project planning in organizations are due to lack of assay management, business systems are not utilized and understood completely and also lack of hit involvement from management.MEASURES FOR THE SUCCESS OF ICT PROJECTSuccess or failure of any ICT project can be measured by localizeing institution where we they are now and where the new project is taking them. Success factors are those whose posture or absence establish the success of an ICT project. They can be drivers or enabler. Some of these are vision and strategy, stakeholders support, external pressure and cooperation, consumer expectations, technological alteration, upgrading, and globalisation in addition to effectual project coordination and good practices.Degree of change is proportionally related to risk of project success. Bigger change big businessman produces bigger organizational improvement at the appeal of big risk of project disaster whereas small change might promise less degree of change at the price of less project risk. and so we can say that there is a trade-off between threat and transformation.ICT projects can be designed according to models of engineering and managerial concepts. draught of complex technical systems in much more perplex affable surroundings through development of local receiptledge base systems can lead to avoid failures.Review by local sections and organizations to determine the extent of ICT failures can also be very useful and productive approach. These experts can make conclusive and detailed analysis and they can point out flaws and make recommendation for the improvement of ICT projects. Reports and lesson learnt should be available to other practitioners in other organizations for betterment of their projects.Division of the project in smaller groups and lordly subsidiary projects is better approach as changes during the project are some metres or often unavoidable and difficult to manage.Information systems qualities which are achieved via efficient ICT projects affect the perceived benefits. An ICT project implementation can be considered successful if the perceived benefits are determined and understood. ICT services quality can be reviewed after vigilant assessment of the infrastructu re to establish technical functionality. For casing with reference to net profiting different departments, the point to hang-up is whether it may be has been achieved successfully or not. This in turn depart involve a technical and user assessment of the efficient communication systems. Generation of information can be assessed to determine efficiency of Information system quality for budgeting purposes, the question might be whether the information system can generate study and timely financial information and data or not.Perceived benefits are the end products that can be used to judge the success of the substantial system. If the perceived benefits like easier communication, networking, and system integration, timely, relevant, complete and useful information are not realized, then the system get out be perceived to have failed. Attributes of from each one component are shown for clarity and focus.A familiar saying says, if you cannot plan it, you do not do it. Another m axim says, I never planned to fail, I just failed to plan. Project planning begins as soon as project planning activities determine the organizations strategy and identifies the ICT projects. under(a) the few limitations, project plans evolve with the lifecycle. These limitations are time and money so each project should have a define deadline and a blotto budget. Planning as a tool can be subservient in minimizing waste by telling the pre-requites conditions for successful ICT implementation rather than bang into a complex strategy. ICT needs careful planning, communication and coordination prior to implementation instead wise trial and error methods.Clarify goals, targets and objective lenss shall be established. These goals may form major role in planning process and at long last help in the successful implementation of ICT projects.ANALYSISImprovement in the ability of those involved in the design, execution and management of IT related projects shall be enhanced to solve and tackle specific contextual attributes of the institute, division, country or location where such ICT projects allow be implemented.Strategy and support are the core areas which lead to success of any ICT project and at the equivalent time finance and lack of fund in addition to powerless infrastructure leads to failure of such projects.Maximum benefits and output of ICT implementation can be achieved if there are no failure factors but its not possible but framework can be developed for the maximal output. This framework must cover and tell apart themes, prioritize activities develop computer programme of action, categorize target groups and in the lowest stage implement solutionsICT projects must be streamlined and established while focusing following approaches.never underestimate complex environment where ICT program evolves.Get maximum output and benefits for the target groupStaff shall be re-skilled to cop up with changes acknowledgment and utilization of new techno logiesHow institute processes will fit in technologyStrong and supportive program managementDont underestimate the total cost of ICT project.Part BCOMP1592 Organisation and Project commissionTutorial for workweek 1.5 Introduction to ICT Project ManagementUpload your answers in hebdomad 1.6 tip the problems you experienced when you carried out a recent assignment. Try to put these problems into some order of magnitude. For each problem consider whether there was some mien in which the problem could have been fastend by better organisation and planning by you.Risk managementteam management aggroup collaborationScheduleProject plan was impractical spot the main types of personnel employed in an ICT department. For each stage of a exemplary ICT development project, list the types of personnel who are likely to be involved.Business Analyst (who gathers requirements from client) dodging Analyst (based on the requirements, design the software)Solution interior designer (application is designed on the basis of technical specification) bundle Developers (who develops the software)Database developers (design and maintaining of DB)Quality Team (who tests the developed software)Configuration managerA public subroutine library is considering the implementation of a computer-based system to help administer book loans at libraries. grade the stakeholders in such a project. What might be the objectives of such a project and how might the success of the project be measured in practical terms?StakeholdersFollowing are the stakeholders for computer based library systemLibrarianLibrary StaffAdministrator/ Technical climb onBook Suppliers/ VolunteersPartner UniversitiesFriends of the Library (Providing funds and assistance to Library)Educators/ Trainers (train the usage of the system)Software House or company developing the computer based systemLibrary Users (those who lend the books)ObjectivesCataloguing (classification and indexing books)Compilation of books and the st uffControl of books circulation raceway usersEfficiently confirm the availability of booksAutomate the library loan system and make it computer basedSystem will be fully authenticated as it will be solely based on computerIssue and return dates will be catered by the system which will watch that no preference is given to any public user in case of late return.Automation and authentication will be achieved.Record of all the books will be managed and kept up to dateSuccess of the projectSuccess of the project will be measured on the following contentionsProductive system usageSystem efficiencyGradual rise in users will predict the successEase and comfort for publicReduction of staffConfidence of stakeholders on the systemAuthentication and automation is an important factorAuthentication i.e. more authenticated the system is more will be its progress4. A software house has developed a customised order processing system for a client. You are an employee of the software house that has been asked to organize a education prevail for the end-users of the system. At present, a user handbook has been produced, but no specific training material. A plan is now needed for the project which will set up the delivery of the training courses. The project can be assumed to have been completed when the first training course starts. Among the things that will need to be considered are the followingTraining materials will need to be designed and inducedA timetable will need to be drafted and agreedDate(s) for the course will need to be arrangedThe citizenry attending the course will need to be identified and notified cortege and computer facilities for the course will need to be provided for.A. learn the main stakeholders for this projectSoftware HouseSoftware developersTrainersEnd users/ ClientCustomers of client (must not be an end user)B. transcend up a education of the objectives for this projectEvaluation, planning and business handling in an efficient manner.Identif y and develop connections between gross revenue, planning and purchasing (by using tools such as flow charts and activity diagrams)Create business to business environment by creating link with customers.Encourage staff input to identify problems and solutions.Handling customers feedback.C. for the objectives, identify the measures of effectivenessEvaluation, planning and business handling efficient report multiplication and boost the business.Identify and develop connections between sales, planning and purchasing by comparison with previous recordsCreate business to business environment by creating link with customers gradual rise of customersEncourage staff input to identify problems and solutions system improvement and staff satisfaction.Handling customers feedback customers satisfactionD. For each objective, identify relevant sub-objectives or goals and who would be trusty for each of themEvaluation, planning and business handling company management is the goal and sales team i s responsible.Identify and develop connections between sales, planning and purchasing sales team is responsibleCreate business to business environment by creating link with customers sales team is responsible.Encourage staff input to identify problems and solutions Human alternative department is responsible.Handling customers feedback Quality assurance department is responsible.Organisation and Project ManagementTutorial for Week 1.6 Introduction to Database DesignUpload your answers in Week 1.7A company providing pic storage on the weave needs a database to support the website. Visitors to the site can register by providing personal details including their email address, username and countersign. Once registered the user can create depiction albums into which they can upload their photographs (stored as files on the company server) along with a suitable provide and description. Users can add as many tags as they need to each one of their albums and their photos in order to classify them and enable meaningful searches. Design a database schema that fulfils these requirements. visitorusernamepasswordEmail address enteralbumAlbum IDname renderdescriptiontagsphotographphotographIDnametagsUsername is foreign key in photograph album and albumID is foreign key in photographConvert your logical schema from question 1 into a physical schema identifying each attribute data type.visitorUsernamePasswordEmailaddressPhotographalbumalbumIDNameCaptionDescriptionTagsPhotographphotographIDNametagsA visitor has multiple photo albums i.e. 1-n family between visitor and photo albumA photo album has multiple photographs in it i.e. 1-n relationship between photo album and photographWrite SQL statements which will implement the physical schema you created in question 2. Create some stash away statements which will populate your tables with example data.INSERT INTO photograph (photographID, caption, tags) value(photo1, caption1, tag1),(photo2, caption2, tag2)INSERT INTO pho tographalbum (albumID, name, caption, description, tags) VALUES(album1, name1, caption1, description1, tag1),(album2, name2, caption2, description2, tag2)INSERT INTO visitor (username, password, emailAddress) VALUES(visitor1, 12345, emailprotected),(visitor2, 12345, emailprotected)Using either the MySQL or Microsoft SQL Server database servers provided by the school implement your database using the SQL statements you created in question 3.SET SQL_MODE=NO_AUTO_VALUE_ON_ZERO work TABLE IF non EXISTS photograph (photographID varchar(30) non NULL DEFAULT ,caption varchar(30) NOT NULL,tags varchar(30) NOT NULL,PRIMARY bring out (photographID)) ENGINE=MyISAM DEFAULT CHARSET=latin1 pretend TABLE IF NOT EXISTS photographalbum (albumID varchar(30) NOT NULL DEFAULT ,name varchar(30) NOT NULL,caption varchar(30) NOT NULL,description varchar(30) NOT NULL,tags varchar(30) NOT NULL,PRIMARY discern (albumID)) ENGINE=MyISAM DEFAULT CHARSET=latin1CREATE TABLE IF NOT EXISTS visitor (username var char(30) NOT NULL DEFAULT ,password varchar(30) DEFAULT NULL,emailAddress varchar(30) DEFAULT NULL,PRIMARY KEY (username)) ENGINE=MyISAM DEFAULT CHARSET=latin1Write a SELECT statement which will output all of the filenames in an album with a tag interconnected punk created by a person called Leibovitz.COMP1592 Organisation and Project ManagementTutorial for Week 1.7 Critical ThinkingUpload your answers in Week 1.8For each of the following questions you must explain your strategy and approach to state the question. Simply providing an answer is not sufficient.1. In these designs there is a peculiar(prenominal) shape and a item colour such that any of the designs which has one, and only one, of these features is called a PHOG.If the Blue Diamond is a PHOG, could any of these other designs be a PHOG?Answer Since Blue Diamond is a PHOG, it means that the particular shape is Diamond or the particular colour is Blue. Based on this observation, we can say that Red Diamond (because it has the shape but not colour) or Blue Circle (because it has the colour but not shape) are PHOGs.2. Which of the hidden parts of these cards do you NEED to see in order to answer the following question decisively?For these cards is it honest that if there is a round of drinks on the left there is a distribute on the right?If above is ordering of respective cards, we should check Card-A and Card-D. For Card-A, if there is a circle on the right side and for Card-D, there is no circle on the left side, we can conclude that If there is a circle on the left there is a circle on the right.It is useless to check Card-B, because even if there is a circle or not, it shall not affect the conclusion drawn. akinly for Card-C, if there is a circle on left side, our conclusion shall be justified. And if there is no circle on the left side, it shall not affect the conclusion.3. There is a truth teller (always tells the truth), a liar (always lies), and one who some quantify answers truthfully and sometimes lies. Each person knows who is who. You may ask three yes or no questions to determine who is who. Each time you ask a question, it must only be directed to one of the people. You may ask the akin question more than once, but of course it will count towards your total.What are your questions and to whom will you ask them?Answer Let us call them TT, AL and TL to symbolize. All of them shall say NO if they are asked if they are a Liar so Ask TT If I ask AL if he is a Liar, what would his answer be? If he says YES, TT is a Liar. If he says NO TT, is a fair play Teller. Then ask AL If I ask TL if he is a Liar, what would his answer be? If he says YES, AL is a Liar. If he says NO, AL is a Truth Teller.And then ask TL If I asked TT if he is a Liar, what would his answer be? If he says YES, TL is a Liar. If he says NO, TL is a Truth Teller4. Three boxes are all denominate incorrectly, and you must get the labels right. The labels on the boxes read as follows corner 1 butto ns blow 2 coins Box 3 coins and buttonsTo agnize the information you need to move the labels to the correct boxes, you may remove a single(a) item from one of the boxes. You may not look into the boxes, nor pick them up and shake them, etc.Answer Since all labels are marked incorrectly, we know that the Box 3 marked with Coins or Buttons has any one of the two items and not both. Remove the label from this Box 3, pick one item from this Box 3 (it must be a coin or a button), remove the respective label (depending upon the item obtained) from other two boxes (Bow 1 or Box 2) and put it on this Box 3. directly we have Box 3 that has the right label on it. instantaneously there is one Box without a label and the other Box with incorrect label. Remove the incorrect label because it is on the box that must be having both Coins and Buttons. Put this label on the other Box and Coins or Button label on this box.In this way we have make the right labeling.COMP1592 Organisation and Proje ct ManagementWeek 1.8 Step judicious An approach to planning software projectsUpload your answers in Week 1.9What are the products created by the Step Wise planning process?Which of the following are not tonic objectives and why? food market research look into correspondent productsUser acceptance testing examine product requirementsUser training Test and EvaluateDesign database go through middlewareImprove network mathematical operation Measure MTBF impudent means Specific, Measurable, Acceptable, Realistic, Time FramedMarket query It is not a new objective because it is Specific to a particle of market, product and there is no time framed specifiedResearch Similar Products It is not a SMART objective because it is not mensurable with respect to other products. Also there are no time lines mentioned for it.User Acceptance Testing It is not a SMART objective because it is not time bound.Investigate Product Requirements It is not a SMART objective because the product is no t specified also there is no time line specified for it.User Training It is not a SMART objective because the User training is not measurable and also there is no time frame mentioned for it.Test and Evaluate It is not a SMART objective because there is no measuring parameter specified for evaluations. Also time frame is not available in which this testing and evaluation is to be done.Design Database It is explicitly specified that the database of application is to be developed. But it is not a SMART objective for there is no time specified for it.Implement Middleware This is a specific, measurable and earthy objective but not SMART because there are no timelines available for implementation.Improve Network Performance There are no measuring elements that are mentioned for this public presentation activity. Also time frame is not mentioned for it. It may be specific and realistic but not a SMART objective.Measure MTBF Measuring Mean Time between Failures is not a SMART objective b ecause there is no time line mentioned to perform this taskFor each of the objectives in Q2 which are not SMART re-writes the objective so that it may be considered as SMART. Explain your reasoning.SMART means Specific, Measurable, Acceptable, Realistic, and Time FramedMarket Research Perform Market Research in next 2 weeks to check for need of a mobile phone that supports instant texting at university level and include students of age between 18-24 years.This is a SMART objective for it is specific or so the work to be done, has time frame include into it, and is measurable, realistic and acceptable.Research Similar Products Perform a Research Study among shop keepers of market in 4 weeks to check for competitors of Nokia 6300.This is a SMART objective for it is specific round the work to be done, has time frame included into it, and is measurable, realistic and acceptable.User Acceptance Testing Conduct Software Testing with at to the lowest degree 50 students to check for newl y developed Online Registration System in next 5 days.This is a SMART objective for it is specific round the work to be done, has time frame included into it, and is measurable, realistic and acceptable.Investigate Product RequirementsHave tokenish of 5 meetings with client and prepare SRS archive of new Software to be developed by the end of this month.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.User TrainingArrange and ensure a single user training session for changes made in one of the modules. This training should not be of more than two hours.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.Test and EvaluateConduct thoroughgoing(a) testing of new Recording solution after taking minimum of 100 calls in 15 minutes. Repeat this activity 10 times at different timings.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.Implement MiddlewareDevelop the Middleware of Patient Education module in 2 weeks and restrain maximum of 4 available programmers.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.Improve Network PerformanceIdentify applications that have higher network usage and try to monitor and configure them for next 24 hours to gain 5% improvement in network performance.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.Measure MTBFExecute parallel applications and determine MTBF within 2 hours after connecting 10 users to it.This is a SMART objective for it is specific about the work to be done, has time frame included into it, and is measurable, realistic and acceptable.4. Amanda whole kit and caboodle for the Management Services department of a local authority. She has been active in organising the development of a computerised payroll processing system. The system is in the final stages of development. What products must exist before the activity test program can take place?ProductsSoftwareScopeContext (environment)Information Objectives (input and output)Functionality and performance requirementsObjectivesScopeContextWhat products does this activity create?Software Project Management activities areFeasibility ReportPlanning MonitoringExecution exertionDeliveryClosing End of program5. You are about to record on an assessed group project as part of your degree programme. Draw up a list of the risks which may affect your assignment outcome. by the piece classify the risks as high, medium and low. What can be done to reduce the impact of these risks on your project?Following are the risks that can be faced during this project or ac ademic assignment.Scale High Risk- HMedium Risk MLow Risk -RProject risksBudget (H)Budget risk can be reduced if the market value and demand of the project is marketed before.Schedule (M)Proper formal MS project plan will help reduce this risk.Personnel (L)Although it is an academic project and the personnel risk has lowCOMP1592 Organisation and Project Manageme

Saturday, March 30, 2019

Aluminium Based Metal Matrix Composites

aluminum Based Metal Matrix Composites1)The main factor in that influences stretch modulus is the intercellular substance , for example Composites with a aluminium 6061 hyaloplasm brace a good potentiality and high(prenominal) ductility. The reenforcement content is the main factor in the enhancement of viscoelastic modulus in the aluminium silicon surface ground substance composite.The graph below show that aluminium silicon composites with higher strength, beca substance ab use of goods and services of the increase silicon content, such as 2024/2124 or 7075 Al, had higher strengths entirely let down ductility. It also shows that the elastic modulus increased with the increase in the silicon content. The hyaloplasm type also nitty-grittys the elastic modulus which typically consists of particulate, eminence or whisker type ground substance. (Reference 3)The yield strength is usually constituted by the matrix load ,type and the arrangement of the musical accomp animent effect the strengths of composites, in particular for those which have whisker reinforcement and Ductility tends to decrease with the reinforcement content is increased.In fracture stamina tests, an increase in subatomic particle quantity reduced the toughness of the composites .The main properties which influence the fracture toughness of MMCs is the type of reinforcement, size, shape, quantity and the dissemination within the matrix and the toughness of matrix. The scurvy fracture toughness and fatigue crack growth rate of MMCs is receivable to low initiation energy for fracture due to high elastic modulus.The thermal expansion coefficient of aluminium silicon carbide fibres beef up tangible is significantly influenced by the thermal stresses between the matrix and fibres and thermal expansion doings relies on the thermal expansion of the fibres. For applications subjected to severe haemorrhoid or native thermalfluctuations such as in automotive components, dis hontinuously-reinforced metalmatrix composites have been shown to offer near isotropic propertiesAutomotive brake disc and callipers atomic number 18 typically made of coil urge, the use of aluminium silicon MMC, would result in a significant weight reduction of some 50- 60% can be made which helps reduce vehicle arouse consumption and improve overall braking and handling as well as the high thermal conductivity and fag out live onance, dimensional stability and glorious cyclic labor properties. Examples of vehicle which have SiC-reinforced aluminium brake disks are vehicles such as the Lotus Elise Volkswagen Lupo. For aluminium composite brake discs to get under ones skin more common would requires costs to come down and for improved gondola ability.Aluminium MMC shows frequently higher immunity to gull than the matrix hearty by its self. The pay of MMC is some(prenominal) more analog than the matrix temporal by self, and therefore makes it achievable to predic t gain patterns and the amount of use than can be obtain from a component. The reinforced particles resist the clams and resile the torture of MMCs which earmarks a utile buy the farm for make better run across of their wear. (reference 5)MMC shows much higher wear subway than the corresponding matrix cloth inappropriate that of matrix material, the wear of MMC is actually much linear and possible to predict advantageously the wear implement is exchangeable for twain materials former(a) than the three-body chicken feed in the eccentric person of MMC the reinforced particles resist the cacography and restrict the deformation of MMCs which causes high confrontation to wear. These results circulate the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better restraint of their wearMMC shows much higher wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is in tr uth much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better control of their wearMMC shows much higher wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is very much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better control of their wear.MMC shows much high er wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is very much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better control of their wear.MMC shows much higher wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is very much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles o n the wear resistance of MMCs and provide a useful guide for a better control of their wearMMC shows much higher wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is very much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better control of their wearMMC shows much higher wear resistance than the corresponding matrix material unlike that of matrix material, the wear of MMC is very much linear and possible to predict easily the wear mechanism is similar for both materials other than the three-body abrasion in the case of MMC the reinforced particles resist the abrasion and restrict the deformation of MMCs which causes high resistance to wear. These results reveal the roles of the reinforcement particles on the wear resistance of MMCs and provide a useful guide for a better control of their wear3)From entropy gathered with the use of the CES software it gave for of the most desirable manufacturing method for a metal matrix component with slots in the design. The above graph so that these four fruit methods were Laser powder forming, scarf out casting, powder injection molding and die press sintering. Several criteria were considering during the material selection such has relative cost index , fruit range , tool life and economic batch size.looking at the CES data , it showed that the most suitable employment method be die cast and sintering. With die casting and sintering a relatively high rate of production can be achieved whilst keeping the relative cost index low. This is primal because it helps lower the cost of aluminium MMC brake disc which are til now expensi ve and not used by many manufactures because of this.Pressing and sintering is a powder processing process that falls in the manufacturing process home of forming .The typical cold pressing and sintering process starts with aluminum silicone MMC in powder world poured into a closed cultivate. Pressure is then apply to the closed mould at a high enough stuff for the powder to bind together. After the disc is taken out of the mould it is then put through the sintering process. The sintering process begins with the brake disc being heated up in order to burn of any lubricating substance and is then heated up to a even higher sintering temperature in a protective gas surrounding to prevent oxidization. (reference 2)4) There has been an increased interest in the use of Aluminium based metal matrix composites in brake discs and drums in recent years. The wear characteristics of AMMCs were high speeds and loads the behaviour could be greatly improved beyond that of cast iron discs, w ith the correct match of disc and pad material. Casting process is very difficult if reinforcement Material is wet and this can results in non-uniform distribution and poor mechanical characteristics for the finished brake disc. To resolve this problem, reinforcements are pre-heated at 500C for 40 minutes. Porosity is the major problem in casting which is why moulds are preheated, to 500C, which helps in removing the gases which are detain in the slurry to go into the mould. It also enhances the mechanical properties of the cast AMC. Sorter fibres in a random orientation are typically not as starchy as long fibres in a specific orientation. However the use of form fibres in random orientation means that less homosexual interaction is required in the production and therefore helps brings the cost of production and well as minimising the possibly of something going wrong in the production process my eliminating human error. SiC/Al composites have increased strength with the increa se in the silicone content and had higher strengths but lower ductility.The use of longer fibres also means that they generally have to be arranged in a specific order which is time eat and also requires human interaction and this all reduces the number of units that can be produced a day. An example of this carbon ceramic brake disc where the discs which have longer fibres cost significantly more and will only be used in very exotic cars such as Koenigsegg where as more budget sports cars such as Porsche tend to use discs with sort random fibers which are far more cost effective.Bibliography1) A. Mazahery, M. O. Shabani . (2012). Mechanical properties of A356 matrix composites reinforced with nano-SiC particles. Available http//link.springer.com/article/10.1007/s11223-012-9423-0. Last accessed 16/12/20162) unknown. (2004). aluminium Matrix Composites with Discontinuous Silicon Carbide Reinforcement. Available http//www.totalmateria.com/page.aspx?ID=CheckArticlesite=ktnNM=108. Las t accessed 16 declination 20163) Ajit Bhandakkar1*, R. C. Prasad1, Shankar M. L. Sastry2. (2014). Elastic plastic fracture toughness of aluminium. Available http//www.vbripress.com/aml/uploads/540c820f6cee71410105871_fullabstratct.pdf. Last accessed 16 declination 2016.4) S. Taufik a, , S. Sulaiman b . (2014). Thermal Expansion Model for Cast Aluminium Silicon Carbide . Available http//www.sciencedirect.com/science/article/pii/S1877705813020511. Last accessed 16 December 2016.5) Parth S. Joshi, Kiran C. Hegade, Apoorv S. Kulkarni . (2016). Manufacturing of Disc Brake Rotor Using. Available http//www.onlinejournal.in/IJIRV2I6/226.pdf. Last accessed 16/12/2016.The machinability of an Al-5 Mg alloy reinforced with 5 vol% Saffil and 15 vol% SiC was compared with that of Duralcan (A356) reinforced with 15 vol% SiC. In terms of tool wear and metal removal rate with both cemented carbide and polycrystalline diamond (PCD) cutting tools, it was found that the Duralcan/ SiC was significant ly easier to railcar than the composite with the Al-5 Mg matrix. This is attributed to the effect of the matrix on the mechanisms of abrasion wear. The machinability of an Al-5 Mg alloy reinforced with 5 vol% Saffil and 15 vol% SiC was compared with that of Duralcan (A356) reinforced with 15 vol% SiC. In terms of tool wear and metal removal rate with both cemented carbide and polycrystalline diamond (PCD) cutting tools, it was found that the Duralcan/ SiC was significantly easier to machine than the composite with the Al-5 Mg matrix. This is attributed to the effect of the matrix on the mechanisms of abrasion wear.

Friday, March 29, 2019

Major Internet Applications

Major Internet ApplicationsIt is traditionally the most evidential and remains the most commonly employed. This illustrates the simple structure in which thickening processes get together with individual waiter process in separate troops computers in order to access the shared resources those they mange.Servers may in gimmick be lymph nodes of early(a) master of ceremoniess, as the figure indicates. For example, a web server is frequently a client of a local shoot server that manages the files in which the web pages are store.For the applications discussed in Exercise 2.1 state how the servers cooperate in providing a service.Web servers and most other Internet service are clients of the DNS service, which translate Internet Domain Names to internet addresses. Also, anticipate engines, which enable users to look up summary of information available on web pages at point all over the Internet.A see engine is a web server that responds to client implores to search in its stored indexes and (concurrently) runs several web flunky tasks to build and update the indexes. What are the requirements for synchronisation between these concurrent activities?What happen are the server tasks (respond to user queries) and the crawler tasks (making request to other web servers) are completely independent because in that respect is small need to synchronize them and they may run concurrently. In reality, untypical search engine would normally include many concurrent thread of execution some serving its clients and others data track web crawlers.The host computers apply in peer-to-peer systems is often simply desktop computers in users offices of homes. What are the implications of this for the approachability and security measures of any shared data objects tat they hold and to what tip can any weaknesses be overcome through the use of paying back?List the types of local resource that are vulnerable to an attack by an untrusted programme that is downlo aded from a remote site and run in a local computer.Network communication the program might attempt to effect sockets, connect to them, and send pass alongs .Access to printers. It may also impersonate the user in various ways for example sending receiving emailObjects in the file system for example files, directories can be read/written/created/deleted victimisation the rights of the local user who runs the program.Mobile broker is a running program (including both codification and data) that movements from one computer to a nonher in a network transport out a task on someones behalf, such(prenominal) as collect information, finally returning with the results. A mobile agent can make many supplications to local resources at each site it visits for example, access individual database entries. pass on some examples of applications where the use of mobile code is beneficial.Applets one example of mobile code which means the user running a browser selects a link to an applet whos e code is stored on a web server so the code is downloaded to the browser and runs thereAccessing go which mean running code that can invoke their operations.What factors affect the reactivity of an application that accesses shared data managed by a server? give away remedies that are available and discuss their reusableness.When the client accesses a server, it makes an invocation of a process in a server running in a remote computer. These things that affect the responsivenessServer overloaded, Latency in exchanging request and replies, Load on network.The use of reliever jockstraps with all of the above problems. In fact client reserve reduces all of them. Proxy server reserve assistances with duplication of the service also helps with the use of lightweight communication protocols helps with.tell apart between buffering and caching.Buffering a method for store data transmit from a sending process to a receiving process in local store or disk computer memory until the re ceiving process is prepared to use it. For example, when teaching data from a file or transmitting piths during a network, it is useful to handle it in huge blocks. The blocks are held in buffer storage in the receiving process memory space. The buffer is free when the data has been use by the process.Caching a technique for optimizing access to isolated data objects by hold a copy of them in local memory or disk storage. Accesses to move of the remote object are translated into accesses to the related parts of the local copy. Unlike buffering, the local copy may be maintained as long as there is local memory obtainable to hold it. A cache management algorithm and a breathing out policy are wanted to run the use of the memory allocated to the cache.Give some examples of faults in hardware and software that can/cannot be tolerated by the use of surplusage in a distributed system. To what extent does the use of redundancy in the appropriate cases make a system fault-tolerant?Ha rdware faults processors, disks, and network connections can use redundancy for example run process on multiple computers, write to two disks, have two separate routes in the network available.Software bugs, crashes. Redundancy is not high-quality with bugs because they will be replicated. Replicated processes help with crashes which may be due to bugs in unrelated parts of the system. Retransmitted messages help with lost messages. Redundancy makes faults less likely to occurConsider a pair of processes X and Y that use the communication service B from Exercise 2.14 to communicate with one another. Suppose that X is a client and Y a server and that an invocation consists of a request message from X to Y (that carries out the request) followed by a reply message from Y to X. Describe the classes of failure that may be exhibited by an invocation.An invocation may suffer from the following failuresCrash failures X or Y may crash. Therefore an invocation may suffer from crash failures . oversight failures as SB suffers from omission failures the request or reply message may be lost.Describe possible occurrences of each of the main types of security threat (threats to processes, threats to communication channels, denial of service) that might occur in the Internet.Threats to processes not including authentication of main and servers, a lot of threats exist. An enemy could access other users files or mailboxes. Threats to communication channels IP spoofing sending requests to servers with a senseless source address.