Thursday, January 30, 2020

Urbanization increases Essay Example for Free

Urbanization increases Essay Golf courses also use fertilizers and chemicals in watering and maintaining the area which also contribute to the contamination of water. According to 1FAOs estimate of changes of forest area cover in developing countries, the world’s forest area had significantly decreased during the period of 1980 to 1995 largely brought about by development and the demands of urbanization. The developing countries have contributed to the natural forests as much as 25%, an average of 12% in Latin America, 5% in Asia and 8% in Africa (FAO, 1997). It has to be stressed that the figures correspond to only 15 years span. Gornitz and colleagues also found that vegetation clearing accounts for a one percent reduction of annual stream flow and an average of 10% decrease in the annual volume of freshwater used by humans (Gornitz et. al, 1997 page 148). The most direct physical impact of urbanization to the interruption of the water cycle is the general increase in the impervious cover (IC). The increase in IC due to urbanization affects the water cycle in these ways: 1. Urbanization increases impermeable land covers such as sidewalks, roads, roofs and parking lots. These urban structures decrease the amount of water to be absorbed by the soil as infiltration process is hardly possible to occur in these areas. In highly urbanized areas, more half of the volume of rainwater flows as run-off (Center for Watershed Protection, 2003). Studies also reveal that in cases where impervious cover is less than 10%, streams to where run-off flows remain protected. On the other hand, if IC is above 10% run-off that goes to the streams will cause the ecosystem to be degraded (American Society of Civil Engineers, 1996). Center for Watershed Protection said some of the evidences of this damage are bank erosions, sedimentation and the loss of stream bank tree covers. 2. Urbanization significantly increases annual floods. As infiltration and transpiration is reduced much of the surface precipitation is diverted to the drainage system. In a pre-urban setting, precipitation is intercepted by the natural vegetation through the process of absorption. Ground cover and forest canopy naturally absorbs rainfall through their roots. The wider the ground cover and the denser the forest canopy, infiltration and transpiration of precipitation are held in its natural state as more water is stored in the water table. This way water storage deep down into the ground as reservoir. With the clearing of vegetation and deforestation, urbanization becomes directly liable for the increase in annual floods. Because of the increase in the volume of run-off water in highly urbanized areas, the construction of drainage systems have been the nearest possible solution made by the government. Such drainage systems were designed to regulate the flow of run-off directly to the watercourse. However localized flash flooding seemed aggravated the problem with the construction of such sewage systems. The problem with this development projects is that the volume that watercourse and the drainage systems can contain is limited. The speed or velocity of runoff brought about by high peak storm water. Another vital factor is time which is relatively not enough for water to be absorbed and contained by the drainage systems and so flash floods are always possible. With flash floods, water contamination is highly possible because the excess water that runs in the streets catches much of the contaminants in the land surface which will then be carried to the bodies of water as flood find its way to leave the area. Because highly urbanized areas do have little ground cover like trees to absorb storm water, run off will likely stay longer in the surface as infiltration is hardly possible. Because imperviousness is directly related to water dynamics, highly urbanized areas have the high risk of containing high peak storm discharges. In urban areas, collection in combined sewerage systems may impose increased hydraulic and pollutant loads on conventional wastewater treatment facilities (Perry and McIntyre 1986).

Wednesday, January 22, 2020

Close reading of the Poem Casey at the Bat :: essays research papers

1) Poetics: a. & b. Rhyme/ Rhythm A/14 A/14 B/14 B/14 C/14 C/14 D/14 D/14 E/14 E/14 D/14 D/14 F/14 F/14 G/14 G/14 H/14 H/14 D/14 D/14 I/14 I/14 D/14 D/14 J/14 J/14 K/14 K/14 L/14 L/14 M/14 M/14 N/14 N/14 O/14 O/14 P/14 P/14 Q/14 Q/14 R/14 R/14 S/14 S/14 T/14 T/14 U/14 U/14 V/14 V/14 W/14 W/14 c. No Real Meter d. Title: The title is linked to the figurative meaning because it shows the hope the team has of Casey. e. 4 lines per stanza f. 13 Stanzas with 4 lines each g. No italics h. No Bold i. There are quotes on lines 32, 35, 40, and 41 that just explain what people are saying literally j. The tone is reminiscing 2. Literal Meaning The Mudville team was predicted to lose They were losing without much time left Two players named Cooney and Barrows are out at first The crowed went quiet A few people in the crowed leave The rest stay with hope for the losing team The crowed thinks Casey is the last hope The team is gaining hope and confidence in Casey But before Casey was Flynn and jimmy Blake After casey came Lulu and the next player wasn?t very good There was a loosing feeling about There was no hope that Casey would ever get to bat Flynn hits a single every one is shocked Even though Blake wasn?t liked he hit the ball hard After the dust lifted the other team saw what happened Jimmy was on second and Flynn on third The crowed went wild The roar was so loud it was heard from far It Rang off the mountain and in the flat lands Because Casey was now at bat Casey seemed calm as he stepped up to bat He was very proud and showed a smile He tipped his hat as a response to the cheers Every one knew that is was Casey at bat The whole crowds eyes were on Casey as he rubbed his hands in the dirt They crowed watched as he wiped his hands on his shirt The pitcher rubbed the ball against his hip Casey sneered at the pitcher The ball was pitched Casey stood proudly watching the ball The ball sped past Casey Casey said ?that ain?t my style? and the umpire said ?strike one? The crowed roarded Like the roar of the ocean A person from the crowed exclaims Kill the umpire And the might have if Casey didn?t raise his hand Casey?s face showed a Christian like smile He quieted the crowed and let the game go on He signaled to the pitcher and the ball was thrown But Casey didn?t swing taking a second strike The crowed is unhappy with the call Casey looked at the crowed sternly and they were silenced His face grew stern and cold and his muscles tight Casey would swing at the next pitch Casey sneered and clinched his teeth He hit his bat against the plate The pitcher held the ball and let go

Tuesday, January 14, 2020

Approach to Software Architecture Description Using UML

The 3+1 Approach to Software Architecture Description Using ML Revision 2. 2 Henries B ¦Arab Christensen, Anion Sorry, and Klaus Marcus Hansen Department of Computer Science, University of Argus Beograd 34, 8200 rush N, Denmark May 2011 Abstract This document presents a practical way of describing software architectures using the Unified Modeling Language. The approach is based on a â€Å"3+1† structure in which three viewpoints on the described system are used – module, component & connector, and allocation – are used to describe a solution for a set of architectural requirements.Introduction Software architecture represents an appropriate level of abstraction for many system development activities [Bass et al. , 2003]. Consequently and correspondingly, appropriate software architectural descriptions may support, e. G. , stakeholder communication, iterative and incremental architectural design, or evaluation of architectures [Bass et al. , 2003], [Clement et a l. , Bibb], [Clement et al. , AAA].This document represents a practical basis for architectural description and in doing so, we follow the IEEE recommended practice for architectural description of software-intensive systems [Software Engineering Standards Committee, 2000]. Central to this recommended practice is the concept of a viewpoint through which the software architecture of a system is described (see Figure 1). A concrete architectural description consists of a set of views corresponding to a chosen set of viewpoints. This document recommends the use of three viewpoints (in accordance with the recommendations of [Clement et al. AAA]): A Module viewpoint concerned with how functionality of the system maps to static development units, a Component & Connector viewpoint concerned with the runtime mapping of nationality to components of the architecture, and an Allocation viewpoint concerned with how software entities are mapped to environmental entities In addition to the views on the architecture, we recommend collecting architecturally significant requirements (see Section 2) in the architecture documentation.This corresponds to the mission of a system as described in [Software Engineering Standards Committee, 2000]. The views corresponding to these viewpoints are described using the Unified Modeling Language standard (ML; [OMG, 2003]). This reports provides examples of doing so. The ML has certain shortcomings in describing software architectures effectively , but is used here to strike a balance between precision/expressiveness and understandability of architectural descriptions. Figure 1 : Ontology of architectural descriptions 1. Structure The rest of this document is structured in two main sections: One introducing the â€Å"Architectural Requirements† section of the documentation (Section 2, page 3), and one introducing the â€Å"Architectural Description† section of the documentation (Section 2, page 3). These sections are introduced in general and a specific example of applying them to the documentation of a system is provided. The examples are created to describe a point-of-sale system (Next POS) for, e. G. , a supermarket point-of-sales. The example is inspired by the case study of Alarms [Alarms, 2002].The system supports the recording of sales and handling of payments for a generic store; it includes hardware components as a bar code scanner, a display, a register, a terminal in the inventory hall, etc. More details of the functionality of the system can be found in Section 2. 1 This is in particular connected to the central Component & Connector viewpoint [Clement et al. , AAA] 2 Architectural Requirements Two types of descriptions of architecturally significant requirements are appropriate: scenario-based and quality attribute-based requirements.The architecturally significant scenarios (or use cases) contain a subset of the overall scenarios providing the functional requirements for the system. These ca n possibly be augmented with requirements on performance, availability, reliability etc. Related to the scenarios. Moreover, â€Å"non-functional† scenarios, e. G. , describing modifiability of the system may be useful as a supplements . All requirements cannot be described as scenarios of system functionality, and we propose supplementing the scenarios with a set of the most critical quality attributes that the system should fulfill.Since quality attributes (such as modifiability and performance) are often in conflict, this needs to be a subset of all architectural quality attributes. The goal of describing architectural requirements is to enable the construction of a set of â€Å"test cases† against which deterrent architectural designs may be compared and/or evaluated. 2. 1 Example In the Next POS case, a scenario is a specific path through a use case. An example of such a scenario is: Process Sale: A customer arrives at a checkout with items to purchase. The cashie r uses the POS system to record each purchased item.The system presents a running total and line-item details. The customer enters payment information, which the system validates and records. The system updates inventory. The customer receives a receipt from the system and then leaves with the items. Critical architectural attributes for the Next POS system area : Availability. The system shall be highly available since the costiveness of sales depends on its availability Ђ Portability. The system shall be portable too range of deterrent platforms to support a product line of POS systems Usability.The system shall be usable by clerks with a minimum of training and with a high degree of e science 3 Architectural Description It is beneficial, when documenting software architecture, to apply deterrent viewpoints to the system. Otherwise the description of the system will be incomprehensible. 2 Architecturally significant scenarios are the basis of many architectural evaluation appr oaches [Clement et al. , Bibb] 3 Note that this choice of quality attributes excludes, e. G. Performance, scalability, security, safety, reliability, intolerability, and testability.Taken this into account, it is first important with a viewpoint which describes the functionality of the system in terms of how functionality is mapped into implementation. Secondly, it is important to describe how the functionality of the system maps to components and interaction among components. And thirdly, it is important to see how software components map onto the environment, in particular hardware structures. These three viewpoints are the module, component & connector, and allocation viewpoints respectively in concordance with [Clement et l. AAA]. The viewpoints used in the architectural description section are defined as proposed in [Software Engineering Standards Committee, 2000]: for each, we first have a section describing the concerns of this viewpoint, then a section describing the stakeho lders, then a section describing the elements and relations that can be used to describe views in this viewpoint, and finally an example of a view. 3. 1 3. 1. 1 Module Viewpoint Concerns This architectural viewpoint is concerned with how the functionality is mapped to the units of implementation.It visualizes the static view of the systems architecture by wowing the elements that comprise the system and their relationships. 3. 1. 2 Stakeholder Roles This viewpoint is important to architects and developers working on or with the system. 3. 1 . 3 Elements and Relations The elements are units of implementation including: Class: A class describing the properties of the objects that exist at runtime. Package: A logical division of classes in the system. This can refer to packages as we find them in Java or Just give a logical division between the classes of the system.Interface: A classification of the interface of the element that realizes it. It can refer to the interfaces found in e. G. Java or Just a description of an interface that a class can conform to. The relations describe constraints on the runtime relationships between elements: Association: Shows that there is a hard or weak aggregation relationship between the elements and can be used between classes. Generalization: Shows that there is a generalization relation between the elements and can be used between two classes or two interfaces. Realization: Shows that one element realizes the other and can be used from a class to the interface it implements. Dependency: Shows that there is a dependency between the elements and can be used between all the elements. 3. 1 . 4 Examples The module view of the POS system can be described using the class diagrams of JIMS, which can contain all the above mentioned elements and relations. It is possible to describe the system top-down by starting with the most top-level diagram. In figure 2 the overall packages of the system are shown.Figure 3 and figure 4 show furthe r decomposition of the Domain Model package and the Payments package in the Domain Model package. Figure 2: Package overview diagram for the POS system Dependencies among packages are also shown; these dependencies arise because of relationship among classes in deterrent packages. As an example, consider the association between figure 4 there is an association from classes in Payments to the Customer class of the Sales package. This relationship gives rise to a dependency from the Payments to Sales package as shown in figure 3.Figure 3: Decomposition of the Domain Model package of the POS system Typically, class diagrams such as figure 4 will suppress detail and also omit elements for clarity, since a major purpose of architectural description is come annunciation. In figure 4, e. G. , details of methods and attributes of classes have been suppressed and certain classes have been omitted. Figure 4: Decomposition of the Payments package of the POS system 3. 2 3. 2. 1 Component and Co nnectors (C&C) Viewpoint This viewpoint is concerned with the run-time functionality of the system?I. . What does the system do? This functionality lies as the heart of purpose of the system under development, thus this viewpoint is of course a very central viewpoint, and architectural design often starts from tit . In this viewpoint, software systems are received as consisting of components which are blackball units of functionality and connectors which are first-class representations of communication paths between components. Components embody functional behavior while control and communication aspects are defined by the connectors.Paraphrasing this, you can say that components define what parts of the system is responsible for doing while connectors define how components exchange control and data. It is important to describe properties of both components and connectors in the documentation. This is done using a combination of textual descriptions (listing susceptibilities for exa mple) with diagrams showing protocols, state transitions, threading and concurrency issues as seems relevant to the architecture at hand. 4 Hoverflies et al. Hoverflies et al. , 1999] defines a process where this viewpoint is the first to be considered and other viewpoints are derived and elaborated from it. 6 Figure 5: C&C overview of the POS system 3. 2. 2 This viewpoint is important to architects, developers, and may also serve to give an impression of the overall system runtime behavior to customers and end users. 3. 2. 3 The C&C viewpoint has one element type and one relation type: Component: A national unit that has a well-defined behavioral responsibility.Connector: A communication relation between components that defines how control and data is exchanged. Both are first class citizens of this viewpoint and both may contain behavior. This is obvious for components, but connectors may exhibit behavior as well. Examples of connectors with behavior are those that provide bufferi ng of data between a data producer and consumer, data convention, adoption of protocols, remote procedure calls, networking, etc. A connector defines one or more protocols. A protocol defines both incoming and outgoing operations and mandates the ordering of them.Thus a connector's protocol is radically deterrent from a class' interface that only tells what operations its instances provide (not uses) and does not describe any sequencing of method calls. 3. 2. 4 The POS system has four major functional parts as shown in the C&C view in figure 5. Components are represented by ML active objects, connectors by links with association names and possibly role names. Active objects are typically processes or threads in the operating system or programming language, and links the communication paths between them.The diagram cannot stand alone, as component names and connector names are only indicative of the functional responsibilities associated with each. We 7 therefore provide an descripti on of component functionality in terms of responsibilities: Barded Scanner. Responsible for 1) Control and communication with bar code scanner hardware and 2) notification providing ID of scanned bar code for items passing the scanner. Sales. Responsible for 1) keeping track of items scanned; their price and quantity; running total of scanned items and 2) initiation and end of sales handling. Ђ Presentation. Responsible for 1) displaying item names, quantity, subtotals and grand total on a terminal 2) printing item, quantity, subtotals and grand total on paper receipt 3) handle key board input for defining quantities when only one of a set of items are scanned. Inventory. Responsible for 1) keeping track of items in store 2) mapping between bar code ID's and item name and unit price. Likewise, the connectors' protocols needs to be described in more detail. The level of detail needed depends on the architecture at hand.For some connectors, it may be us cent with a short textual d escription (for instance if it is a straightforward application of the observer pattern; or if it is a direct memory read); others may best be explained by ML interaction diagrams; and still others may have a very large set of potential interactions (like a SQL connector) of which only a few may be worthwhile to describe in more detail. The POS example names three connectors: MFC. A standard MFC patterns is the protocol for this connector that connects the Sales component serving the role of model and Presentation serving as controller and view. Ђ JDBC. This connector handles standard SQL queries over the JDBC protocol. BPCS. This connector defines a protocol for connecting with a barded scanner. Data and control is exchanged using ASCII strings in a coded format containing control words and data elements. Sequence diagrams can be used to describe connector protocols. Depending on the system, it may be relevant to document connector protocols individually (a sequence diagram for each protocol) and/or to provide the â€Å"big picture† showing interaction over a set of connectors.Typical use cases as well as critical failure scenarios may be considered for description. In our point of sales example, an overall sequence diagram (diagram 6 seems most elevate, as the individual connectors have rather simple protocols. The scenario shown in the diagram is the event of a single item being scanned and registered. Further detail can be provided, like a sequence diagram showing observer registration and steady state operation for the MFC connector; perhaps table layout or SQL statements for the JDBC; or command language for the BPCS connector.However, most likely this information does not provide architectural insight (they do not eject architectural qualities) and their details should be found in more detailed documentation instead. 8 Figure 6: POS â€Å"item scanned† scenario 3. 3 3. 3. 1 Allocation Viewpoint This architectural viewpoint is concerned with how the software elements of the system – in particular the C&C viewpoint elements and relations – are mapped to platform elements in the environment of the system.We are interested in what the software elements require (e. G. , processing power, memory availability, network bandwidth) and what the hardware elements provide. 3. 3. 2 This viewpoint is important to a number of stakeholders: Maintainers needing to deploy and maintain the system, to users/customers who need to know how nationality is mapped to hardware, to developers who need to implement the system, and to architects. 3. 3. 3 The deployment viewpoint has two primary element types: Software elements: These may be, e. . , executables or link libraries containing components from the C&C views. Environmental elements: Nodes of computing hardware Furthermore, there are three main relation types: Allocated-to relations: Shows to which environmental elements software elements are allocated at runtime. Thes e relations may be either static or dynamic (e. G. , if components move between environmental elements). Dependencies among software elements Protocol links among environmental elements showing a communication protocol used between nodes. 3. 3. 4 Figure 7 shows the deployment of the Next POS system using a ML deployment diagram. The deployment is a typical 3-tier deployment in which presentation is run on a client, domain code is run on a JEEZ application server, and data is stored on a database server. Figure 7: Deployment view of the Next POS system The following elements are of interest Environmental elements (shown as ML nodes) – The Barded Scanner is the device used for inputting sold items into the system.It s read via an ROARS connection to the POS Terminals – The Terminal is the main point of interaction for the users of the Next POS system – The Application Server is a machine dedicated for serving all Terminals on an application level – A Databa se Server provides secondary storage Software elements (Shown as ML components) – The POS executable component runs the client part of the Next POS system including presentation and handling of external devices (biz. The Barded Scanner). It communicates with the Application Server via RMI over IIOP – Jobs is an open source application server which is used for running the domain- elated functionality of the system. It uses the Database Server via JDBC 10 – Myself is an open source SQL database which handles defenestrated functionality (storage, transactions, concurrency control) of the system. 3. 4 Overview The three viewpoints and their associated elements and relations are summarized below.Module c Deployment Elements Class Component Executable Interface Computing node Package Relations Association Connector Allocated-to Generalization Dependency Realization Protocol link +1 view: Architectural requirements The mapping to ML is straight forward for the module a nd deployment viewpoint UT less so for the C viewpoint. For the C viewpoint, components are show by ML Active Objects (that represent run-time entities with their own thread of execution, typically threads and processes), while connectors are shown by ML links (that represent control- and data flow using some protocol). 2

Monday, January 6, 2020

Abigail Williams, the Villian of The Crucible by Arthur...

In writing short stories, novels, or plays, there are certain standards the writer comes to meet. He will choose a basic story element to go by; either man versus nature, man versus man, or man versus himself. Then, a setting that is appropriate to the writer is chosen, a place where the writer envisions the story happening. Inevitably the characters are introduced one by one, and the writer tries to convey their personality and instill a mental image for the reader. There have always been the heroes, the villains and the victims. Any story can revolve particularly around any of these, but often they all have roles that create equilibrium in the plot. However, in The Crucible, Arthur Miller did not need to create any such†¦show more content†¦Abigail Williams accuses all of these people with only two things in mind. One of them is her desperate desire to be in the spotlight at all times. ealthy motives are the reasons for the murdering of innocent people. Abigail Williams’ main cause for her wild accusations is a selfish one. It is to be with John Proctor, a married man with whom she has an affair. She is sent away but all she thinks of is being reunited with him. Abigail drinks blood, wishing to be with John Proctor, which could happen only if his wife Elizabeth died. She then, after committing adultery and contributing to the breaking of a marriage, is not through. Abigail pursues John and does not recognize that the affair is over. She conveys this in saying â€Å"I have something better than hope, I think!† (22). Abigail does not just miss her love, she becomes ruthless to get him back. Abigail William’s aggressive personality easily persuades the other girls to follow her footsteps, and back up anything and everything she says. This personality also frightens people in the courtroom to question her truthfulness, or her relation with John Proctor. Due to her forceful behavior, the girls support Abigail, and therefore become entangled in her web of lies, sins, and murders. There are not many people like Abigail Williams who could send people to their death and feel no remorse. With the exception of John