Tuesday, January 28, 2020

Effects of Nutribullet Processing on Glycemic Response

Effects of Nutribullet Processing on Glycemic Response The major results from the present study show that processing a variety of fruits with the Nutribullet has had beneficial effects on the postprandial glycemic response in healthy subjects. We observed that after the ingestion of the Nutribullet mixed fruit treatment, on average the subjects maximum glycemic increment was only 0.4mmol/L, in comparison to the maximum increment of 1.3mmol/L after the ingestion of whole mixed fruit. In contrast, processing mango with the Nutribullet showed to have no added beneficial effects on postprandial glycemic response in comparison to the ingestion of whole mango. After the ingestion of the Nutribullet processed mango the maximum glycemic increment was 0.9mmol/L, compared to the maximum increment of 0.8mmol/L in the whole mango group. Although the processing of mango did not have the same effects seen for the mixed fruit group, these results are still significant because they demonstrate that the domestic processing mango alone and processing a variety of fruits together does not increase their GI as previously thought. In fact, the results of the present study demonstrate that Nutribullet processing a combination of fruits favorably flattens the postprandial glycemic response which is in conflict with the current recommendations for diabetics to avoid fruit smoothies. As mentioned earlier, these recommendations are formed on the assumption that the majority of fibre in fruit juice and smoothies has either been removed or broken down. Although there is substantial evidence supporting the link between the consumption of fruit juice and the increased risk of T2DM (Muraki et al, 2013; Bolton et al, 1981; Haber et al, 1977), there appears to be a sparse amount of research investigating the effects of domestically blending fruits on glucose metabolism. Although, there is one study to our knowledge that has investigated the impact of whole fruit, fibre-disrupted purà ©e and fruit juice (Haber et al, 1977). The authors reported that plasma glucose rose to similar levels after the consumption all three meals. However, they suggested the removal of fibre from food or the physical disruption of fibre, could lead to slightly higher postprandial glycemic responses. Indeed the cellular structure of fruit is important and potentially explains the results of the present study because unlike fruit juice, the fibre was not removed during the Nutribullet processing. Interestingly, evidence from a recent investigation showed that commercial smoothies which have gone through a homogenization process still contained high concentrations of intact fruit cells (Chu et al, 2017). However, we must appreciate that the process of homogenization is completely different to domestic food processing and therefore, it could be argued that perhaps domestic processing would elicit different outcomes with regards to fibre content. Although a recent study reported that the concentrations of insoluble and soluble fibre were the same in both domestically blended mango fruit and high hydrostatic pressurized mango (Elizondo-Montemayor et al, 2015). Therefore, this evidence signifies that the processing of fruits, with a domestic blender does not completely breakdown the fibre. This may go on to explain why the present study did not observe a sharp peak in blood glu cose following the consumption of Nutribullet treatments, in comparison to studies which have observed postprandial hyperglycemia due to the consumption of fruit juice where the fibre is absent (Bolton et al, 1981;). Although the results of the present study may be in part attributable to the presence of dietary fibre within the treatments, several other parameters have also been identified to affect the absorption of glucose. These parameters include the viscosity of the fruit and other properties of fibre, such as solubility and swelling capacity. Effects of fibre on carbohydrate absorption Fibre can be classified as either soluble or insoluble, characterized by how they react in aqueous solutions.   Insoluble fibre includes lignin, cellulose and many hemicelluloses. These fibres make up the cellular-wall structure of fruits and vegetables. When consumed together with foods, these fibres behave as bulking agents and also increase intestinal transit time. Water-soluble fibre comprises hemicelluloses, and many polysaccharides, such as pectin. These fibres are characterized by their high water-holding capacity, also several of them are highly viscous in solution (Wursch et al, 1997). Pectins are constituents of the primary cell wall and intercellular layer of plant cells. They are insoluble in unripe fruit, yet become more water-soluble as the fruit ripens. Lastly, they have large water-holding capacity and form gels in aqueous solutions. Within the scientific community, it has been acknowledged that the presence of certain dietary fibres influences the digestion and absorption of CHO within the small intestine, resulting in a reduced and levelled off glycemic response. Importantly, this effect has been shown in both healthy and T2DM subjects (Jenkins et al, 2002; Anderson et al, 1994). It has widely been reported that viscous soluble fibre are most effective in improving glycemic control by reducing the postprandial glycemic response, in comparison to insoluble fibres (Jenkins et al, 1978; Elizondo-Montemayor et al, 2015). In contrast, it has also been established that when the viscosity of fibre in several products has been reduced through varied processing techniques then the reduction in blood glucose peak is attenuated (Wursch et al, 1997), signifying that both the solubility and viscosity of the fibre is directly linked to the attenuation of blood glucose. Due to the growing pool of scientific evidence linking t he consumption soluble fibre with a flattened glycemic response, several theories have been developed to explain what mechanisms in the small intestine may be causing the modulation of the glycemic response. One mechanism suggested is a delayed rate of gastric emptying. It is thought that due to the water-holding capacity of soluble fibre, a resulting delayed gastric emptying and transit time through the small intestine occurs, thereby resulting in a reduced rate of CHO absorption (Benini et al, 1995; Cherbut et al, 1995; Ou et al, 2001). Another proposed mechanism is that the ingestion of soluble fibre increases the viscosity in the small intestine resulting in a reduced mixing effect of peristalsis, thus reducing the digestion of CHO by pancreatic alpha-amylase and in turn causing a delayed diffusion of CHO to the intestinal mucosa (Cherbut et al, 1994; Ou et al, 2001). Lastly, it has also been proposed that the capacity of dietary fibre to bind to glucose may reduce the concentration of available glucose in the small intestine, resulting in reduced digestion and absorption of glucose (Ou et al, 2001). Considering all this, a theory has been developed to further explain the results observed in the present study for the Nutribullet mixed fruit treatment. The theory is that the banana used within the mixed fruit treatment is potentially the main fruit influencing the postprandial glycemic responses. As previously mentioned, the ripeness of fruits is a major influencing factor on the concentrations of soluble and insoluble fibre. Recall from the methodology in the present study that all of the fruit was freshly purchased within days of the appropriate trial. Therefore, it is highly probable that the banana included in the mixed fruit trial was unripe as they were refrigerated for no more than 2 days. This theory is based on the evidence that unripe or less-ripe bananas contain higher concentrations of resistant starch, in comparison to over-ripe bananas. Resistant starch has been found to be more slowly digested in humans by alpha-amylase thereby causing a flattened glycemic response due to the reduced availability of glucose (Wolever et al, 1990; Hermansen et al, 1992). From all of this information we have established that dietary fibre is still present in fruits which have been domestically blended, also we have discussed some of the mechanisms potentially causing the effects fibre has on glycemic response. The next question at hand is whether Nutribullet processing effects the sugar content of fruit. It has been proposed that foods containing Effects of Nutribullet processing on the composition of mango and mixed fruit carbohydrates The content of simple sugars was lower per portion of mango (11.8g) and mixed fruits (15.7g) after Nutribullet processing, compared to whole mango (16.5g) and whole mixed fruits (24.9) (Table 3).   Recall for the methodology in the present study that we calculated specific servings of each fruit to give 25g of sugar per serving among the whole fruit and Nutribullet treatments. Due to this it was hypothesized that HPLC analysis would reveal that the sugar content of the whole fruit treatments would be similar, if not lower, compared to the sugar content of the Nutribullet treatments. Previous work has suggested that processing fruits, through homogenization, can cause losses in cell integrity, thus resulting in the release of simple sugars from compartmentalized structures and non-covalent links (Elizondo-Montemayor et al, 2015). On the contrary, this was not observed in the present study. When comparing the total sugar content of both mango treatments to the observed postprandial glycemic responses (Figure 1), there is a discrepancy where the extrapolated IAUC for both mango treatments do not correlate with the sugar content revealed through HPLC analysis. For example, from figure 1 we can see that both mango treatments had a very similar postprandial glycemic response, yet HPLC analysis would suggest that the whole mango treatment should have had a higher glycemic response. Although this was not the case, signifying that errors in the HPLC methodology are potentially causing these results. For example, upon completion of the HPLC testing, it was regrettably found that several tubes containing various mango treatments still had remaining supernatant within them. This of course would explain the varied sugar content between the mango treatments and reflects that the investigators had varied pipetting skills. Regarding the mixed fruit HPLC results, the total sugar content of both mixed fruit treatments seem to correlate well with the postprandial glycemic responses (Figure 1). In addition, the mixed fruit Nutribullet contained half the sugar content compared to the whole fruit treatment. As discussed earlier, the potential mechanisms associated soluble fibre may explain why the Nutribullet treatment revealed to have a lower sugar content. For example, the fibre may have bound to the glucose molecules reducing the available glucose in the small intestine, thus resulting in the attenuation of postprandial glycemic response. An in vitro digestion model, designed to mimic the in vivo situation, was able to determine the glucose content within supernatant by mixing 1g of resistant starch or soluble fibre with 100ml of glucose solution, then incubating the mixture in a water bath (37 °C) for 6 hours, followed by centrifuging (Ou et al, 2001). The authors reported that the solutions which had added fibre contained less glucose within the supernatant, signifying that the fibre had binding potential to glucose. On the other hand, it is important to consider that the HPLC results for the mixed fruit treatments may also be subject to errors within the methodology. For example, looking at Table 4, there is high relative deviation amongst the whole fruit samples, yet not amongst the Nutribullet samples. This indicates that there was low precision during the measurement of whole fruit samples. Again, perhaps due to the low level of skill among the investigators with regards to the pipetting, syringing and filtration of supernatant. Considering all of these limitations, the results obtained from HPLC analysis provide little relevance and impact to the present study. Practical Implications of the results The fact that both the whole fruit and Nutribullet treatments elicited a low GI and specifically that the mixed fruit Nutribullet treatment showed a significantly lower GI (figure 2) has important clinical implications for both healthy and T2DM subjects. A relatively recent Cochrane review which was based on 11 randomized controlled trials, reported that glycemic control in T2DM subjects was improved significantly following a low GI diet, compared to those on a high GI diet (Thomas et al, 2009). In addition, a low GI diet elicited significant reductions in glycated hemoglobin A1c (0.5%) which are comparable to reductions usually found through medications for recently diagnosed T2DM patients (Holman, 1995; Holman, 1999). Furthermore, improvements in A1c of this size have been linked with the reduced risk of diabetes-related microvascular complications, such as retinopathy (Stratton, 2000). With regards to healthy subjects, diets containing low GI foods have been associated with reduct ions in body weight, improvements in lipid profile and a decreased risk of T2DM and cardiovascular disease (Jenkins et al, 2011; Barclay et al, 2008; Van Dam et al, 2000). Overall, as the Nutribullet does not appear increase their GI of commonly eaten fruits, both healthy and T2DM subjects could potentially benefit from this method of food preparation by improving glycemic control. Although as the results from the present study are novel, more research is needed before any conclusions can be drawn with regards to the safety and effectiveness of recommending that diabetics can consume fruit smoothies. Study limitations There are some limitations within the methodology of the present study that should be mentioned. Firstly, the present study employed only one reference trial. Recommendations are that the reference food (glucose) trial should be repeated at least once to minimise the variation of mean GI values (Wolever et al, 1991, 2002). For example, a simulation study carried out by Wolever et al (2003) found that the margin of error of the estimation of mean GI was reduced significantly from one to two reference measurements. Secondly, we were unable to enforce a strict standardization of diet and physical activity 24 hours prior to the test days which may reduce the reproducibility of the results. An ideal example would be that the subjects consumed a meal of their choice prior to the overnight fast and then would have been required to repeat that same meal before each trial. Thirdly, the results may be subject to selection bias as the participants included in the mixed fruit trials were also th e investigators of the study and randomization was not used. In addition, due to the 10% drop out rate, it is possible that the degree of statistical power and precision was reduced as recommendations are that glycemic trials include a minimum of 10 participants (Brouns et al, 2005). Although, several strengths include the appropriate use of a repeated measures design which ensures less individual differences and allows the inclusion of fewer participants. Another strength is that the protocol closely followed evidence-based recommendations. Conclusion In conclusion, our results indicate the consumption of a variety of fruits including banana, mango, passion fruit, kiwi, raspberry and pineapple have a low GI and that processing these fruits with a Nutribullet generated further benefits, such as a significantly lower GI and a more favorable glycemic response. A higher proportion of the subjects presented a low GI for both of the Nutribullet treatments. These results are in conflict with current recommendations to restrict or avoid fruit smoothies. However, much evidence has indicated that the fibre content of fruit is still present after domestic and commercial processing treatments. More so, the evidence suggests that the presence of fibre within the processed fruit is still potentially having several beneficial effects on the postprandial glycemic response, such slowing gastric emptying and reducing the amount of available glucose through binding mechanisms. These results could potentially have clinical implications for healthy an d T2DM subjects who include these fruits in their diet. However, more research is needed 1. to determine if these effects are reproducible and 2. to determine the safety of diabetics consuming different fruit treatments produced by Nutribullet and/or other domestic appliances. Future research should further investigate the potential mechanisms involved with Nutribullet blending and how they are causing an altered glycemic response.

Monday, January 20, 2020

telecommunications :: essays research papers

Networking and Telecommunications Table of Contents Introduction Technology Involved Telephone System Network Setup Cost Sampling of Companies Possible Future Trends Global Implications Conclusion Introduction We have been hired to design a small network for a company that will utilize the newest technology out there and give each person the capability to work from the office as well as on the road. This company has ten people and will be working from home and on the road quite often. The best solution would be to set up a wireless network with additional security and the use if Internet Protocol phones. We will also make a push to hire a full time systems administrator to handle all the security issues and the overall maintenance of the network. First we need to stress the importance of a full time systems administrator to work from the site as well as on call 24 hours a day. We are going to use a wireless network as well as IP phones and from time to time they are going to experience connectivity issues as well as authentication problems logging into the servers remotely. The main point we must stress to the customer is the security issues that affect every network. The network will need constant monitoring and updates due to the nature of the business and the virtual private network that will be utilized for off site connectivity. Technology Involved The proposed hardware list will contain 3 physical servers, a Cisco router, 2 black and white laser printers, a color laser printer, 12 laptops, 12 IP phones, a server rack, cabling, and wireless PCMCIA cards. We want to make sure there are a few laptops and phones configured for users who are experiencing problems. This list will continue to grow as we start to install the network and get everything configured properly and continue on with the testing. We must also ensure we have the proper licensing for all the servers to include Microsoft Server 2003 and Microsoft Exchange. We will run Symantec Antivirus software on each of the laptops as well. Telephone System The telephone system that we are going to put into place is a Mitel system consisting of twelve 5220 IP phones. This system will consist of a voice mail system, and the ability to take your phone home and all your calls will be forwarded to that phone making it easier for our staff to work from home without the customers knowing. The hardware involved in the setup of this system is a PC for voice mail administration, and two switches. telecommunications :: essays research papers Networking and Telecommunications Table of Contents Introduction Technology Involved Telephone System Network Setup Cost Sampling of Companies Possible Future Trends Global Implications Conclusion Introduction We have been hired to design a small network for a company that will utilize the newest technology out there and give each person the capability to work from the office as well as on the road. This company has ten people and will be working from home and on the road quite often. The best solution would be to set up a wireless network with additional security and the use if Internet Protocol phones. We will also make a push to hire a full time systems administrator to handle all the security issues and the overall maintenance of the network. First we need to stress the importance of a full time systems administrator to work from the site as well as on call 24 hours a day. We are going to use a wireless network as well as IP phones and from time to time they are going to experience connectivity issues as well as authentication problems logging into the servers remotely. The main point we must stress to the customer is the security issues that affect every network. The network will need constant monitoring and updates due to the nature of the business and the virtual private network that will be utilized for off site connectivity. Technology Involved The proposed hardware list will contain 3 physical servers, a Cisco router, 2 black and white laser printers, a color laser printer, 12 laptops, 12 IP phones, a server rack, cabling, and wireless PCMCIA cards. We want to make sure there are a few laptops and phones configured for users who are experiencing problems. This list will continue to grow as we start to install the network and get everything configured properly and continue on with the testing. We must also ensure we have the proper licensing for all the servers to include Microsoft Server 2003 and Microsoft Exchange. We will run Symantec Antivirus software on each of the laptops as well. Telephone System The telephone system that we are going to put into place is a Mitel system consisting of twelve 5220 IP phones. This system will consist of a voice mail system, and the ability to take your phone home and all your calls will be forwarded to that phone making it easier for our staff to work from home without the customers knowing. The hardware involved in the setup of this system is a PC for voice mail administration, and two switches.

Sunday, January 12, 2020

Srs of Library Membership System

SOFTWARE REQUIREMENTS SPECIFICATION (SRS) for the System Name UNISEL LIBRARY MEMBERSHIP SYSTEM Prepared For: MDM NOR AZLIANA AKMAL JAMALUDIN Prepared By: MOHAMAD HAFIZ BIN MOHAMAD NOOR 4111017111 LOGGESWARAN SINNAIH4111009881 MUHAMMAD ABDUL HAKIM BIN ZAINI 4111022751 SYED AHMAD RIDHWAN BIN SYED MOKHTAR 4111023651 Authenticated by __________________Approved by__________________ Date ___________________Date __________________ TABLE OF CONTENTS 1. Scope†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4 1. 1 IDENTIFICATION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 1. 2 Module overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 4 1. 3 Document Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 1. 4 R elationship to other plan†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 6 2. reference†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 2. 1 Government Documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 2 Non-Government Documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦7 2. 3 Contractual documents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 7 2. 4 Non-contractual document†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. 7 3. Engineering Document †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 8 3. 1 System Context Diagram†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3. 1. 1 Unisel library Membership System†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 3. 1. 1. 1 Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 2 Association†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 3 Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 1. 1. 4 Association†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦10 3. 2 General System Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 3. 2. 1 Use Case Name 1 (SRS_REQ1_001)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 1 3. 2. 1. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦13 2 3. 2. 1. 2Characteristic of Acti vation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 3 3. 2. 1. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 4 3. 2. 1. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 13 5 3. 2. 1. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3 3. 2. 2 Use Case Name 1 (SRS_REQ1_002)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 6 3. 2. 2. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 14 7 3. 2. 2. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 8 3. 2. 2. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 9 3. 2. 2. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 10 3. 2. 2. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦15 3. 2. 3 Use Case Name 1 (SRS_REQ1_003) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 11 3. 2. 3. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. 15 12 3. 2. 3. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 13 3. 2. 3. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 14 3. 2. 3. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦ 15 15 3. 2. 3. Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2. 4 Use Case Name 1 (SRS_REQ1_004)†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 16 3. 2. 4. 1Brief Description†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 17 3. 2. 4. 2Characteristic of Activation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 18 3. 2. 4. 3Pre-Condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦16 19 3. 2. 4. 4Basic Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦16 20 3. 2. 4. 5Alternative Flow†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦16 3. 3 Exception Flow †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 3. 3. 1 Post condition†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 2 Rules (s) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 3 Constraint (s) .. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 3. 3. 4 Note (s) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 4. Gui †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 3. 4. 1 Main Screen†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦19 3. 4. 2 Registration†¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦19 3. 4. 3 Logging in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 3. 4. 4 About us page†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 19 3. 4. 5 Database page†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 5CSCI Internal Interfaces †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 3. 6 Module data element requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 3. 7 Adaptation Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 25 3. 8 Sizing and Timing Requirements†¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 3. 9Safety Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 25 4. 0Requirements Traceability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦26 4. preparation for delivery †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 26 5. Note †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 26 1SCOPE 1 1. 11. 1 Identification System Number : 01-02-022-R0-2006-03 System Name: UNISEL LIBRARY MEMBERSHIP SYSTEM System Abbreviation: 01-02-022-R0 Module Number: 01-02-022-R0-2006-03 Module Name: UNISEL LIBRARY MEMBERSHIP Module Abbreviation: 01- 02-022-R0 2 1. 21. 2 Module OverviewThis paragraph describes the purpose of the system and the module to which this SRS applies. Purpose of the Unisel Library Membership System: The main purpose of the system is to make the registration process and book borrowing process easier. Purpose of the Unisel Library Membership System: 1. Online registration -Students can make registration from their place without going to the library. They can go to the online library page and key in their information and register themselves. 2. Information about the library -The main page of the system contains the information about the library and also the information about the system.It also contains the procedures for borrowing the book from the library. 3. Administrator login -This page is the login page for the Administrators. There is place to enter â€Å"username†, â€Å"password† and a â€Å"login† button. Once they enter the username and password correctly, the system will dir ect them to another page. 4. Student database -This is the database page that contains all the registered student's information. This page contains student's name, id, race, course, religion, password, email, address, membership type, and faculty. 3 1. 31. 3 Document OverviewThis document describes the interaction between the actors with the module Unisel Library Membership System. Analysis of the requirements applying to Unisel Library Membership System relies on an OOAD UML notation using the Rational Rose 2000 tool. Certain elements resulting from this analysis are presented in this document. Chapter 1:Scope Chapter 2:Referenced Documents Chapter 3:Engineering Requirements Chapter 4: Qualification Requirements Chapter 5: Preparation for Delivery Chapter 6:Notes 4 1. 41. 4 Relationship to other plans Not applicable. 2REFERENCE DOCUMENTThe following documents, for which the exact is indicated, form part of the specification as far as everything specified hereafter is concerned. In the event of a discrepancy between the documents referred to here and the content of this specification, it is the content of the specification, which should be considered to be the background reference. Copies of specifications, standards, drawings and publications requested by suppliers in contact with the specified supplying functions may be obtained by contacting the contracting agency or directly through the contracting office. 1 2. 12. 1 Government DocumentsNot applicable. 2 2. 22. 2 Non-Government Documents |[1] |Sommerville Software Engineering | |[2] |System Requirement Study | | | | 3 2. 3 Contractual documents Not applicable. 4 2. 42. 4 Non-contractual document Not applicable. 3ENGINEERING REQUIREMENTS 1 3. 13. 1 System Context Diagram Figure 1: Context Diagram Figure 2: Use Case DiagramFigure 2 System Flow 3. 1. 1Unisel Library Membership System System Interface Identification: System Administrator Interface Type: Person 3. 1. 1. 1 Description The System Administrator is an actor who responsible for managing Unisel Library Membership System. He / She will manage the users and contents of Unisel Library Membership System. 3. 1. 1. 2 Association This actor communicates with all of the use cases. Interface Identification: Normal User Interface Type: Person (Student) 3. 1. 1. 3 Description Normal User are the students, they can only use â€Å"Main Page†, â€Å"Registration Page† and also the â€Å"Book Borrowing Page†. . 1. 1. 4 Association This actor communicates with the following use cases : 1. visit main page 2. register – normal user can register 3. using the system – normal user use the system only for borrowing 2 3. 2 3. 2General System Requirements 3. 2 HAHH STUDENT Figure 2: Use Case 3. 2. 3Use Case Name3 (SRS_REQ1_001) Eg: Figure 5: Use Case Registration diagram 1 3. 2. 3. 1Brief Description Student must complete the form and click submit if the form has been completed. We have fill in to register as a lib rary member. 2 3. 2. 3. 2Characteristic of ActivationStudents must register first before using the system library, personal information should be stored in the system. 3 3. 2. 3. 3Pre-Condition 4 1. System displays registration button. (SRS_REQ1_003) 5 3. 2. 3. 4Basic Flow 1. This use case begins when the first register. 2. Registration display system that includes the following options: A-1: We have text box for name, id, race, course, religion, password, email and address. After insert detail click submit button to submit the form after completely fill in the form. 3. The use case ends. 7 3. 2. 3. 5Alternative Flow Not applicable. 3. 2. 1Use Case Name1 (SRS_REQ1_002) Eg: Figure 3: Use Case Main Screen diagram 1 3. 2. 1. 1Brief Description The main screen is a main page about the online registration for the library. The main page have a button home, about us and registration. 2 3. 2. 1. 2Characteristic of Activation User must register and enter the password and the email address or Id card. 3 3. 2. 1. 3Pre-Condition 1. System displays user or person menu. (SRS_REQ1_001) 2. User can't access Administration page. (SRS_REQ1_001) 4 3. 2. 1. 4Basic Flow 1.This use case begins when the user has registered information on the first page. 2. System display home, about us and registration which including the following options: – Additional buttons are about us and registration to assist the customers. 3. The use case ends. 5 3. 2. 1. 5Alternative Flow A-1: Selects Add New library system button 1. Information such as the button for the contact information should be added in the future. (SRS_REQ1_001) 2. The use case continues. A-2: Selects contact information button 1. users can contact if there any problems. 3. 2. 2Use Case Name2 (SRS_REQ1_003)Eg: Figure 4: Use Case about us diagram 1 2 3. 2. 2. 1Brief Description These pages show the library system database. This database shows information about students who have registered to become library members. 3 3. 2. 2. 2Characteristic of Activation The name, id, race, course, religion, password, email, and address, membership type and faculty. 4 3. 2. 2. 3Pre-Condition 5 1. Admin allows to check the details of the information. Unisel library system shows the table that contains the record of all students that are member of the library. Present a form to the admin to allow him to search the record of the students. SRS_REQ1_102) 6 3. 2. 2. 4Basic Flow 1. This use case is begin when the admin click the database page [A-1: Actor select the search bar to view the student database] 2. System display the student information who have registered [A-1: Actor select to view according to name, id, race, course, religion, password, email, and address, membership type and faculty] 3 . The use case ends. A-1: Not applicable. 1. The use case ends. 7 3. 2. 2. 5Alternative Flow [A-1: Actor selects delete] 1. System displays the delete button [A-2: Actor selects menu box button] 2. The use case continuesA-2: Actor selects home button 1. System goes back to previous screen. 3. 2. 4Use Case Name4 (SRS_REQ1_004) Eg: Figure 6: Use Case Admin diagram 1 3. 2. 4. 1Brief Description Only admin can check and updates the record information . 2 3. 2. 4. 2Characteristic of Activation Admin can open the data and check the information through the database. 3 3. 2. 4. 3Pre-Condition 1. System displays Administration menu. (SRS_REQ1_004) 2. User has privilege to access Administration page. (SRS_REQ1_004) 4 3. 2. 4. 4Basic Flow 1. This use case is begin when check the information through the database 2.System display admin which including the following options: A-1: Admin can login in admin panel and insert username and password to check the data. 3. The use case ends. 5 3. 2. 4. 5Alternative Flow Not applicable. 6 7 3. 3 Exception Flow †¢ Error massage will appear in registration information could not continue if the information is incomplete. †¢ Error massage will appear to enter the email and pas sword information is wrong. †¢ Error massage will appear when the information is already used. 8 3. 3. 1Post Condition(s) †¢ The system are successful. 9 10 3. 3. Rules(s) †¢ Users not allowed to access the database system. †¢ The register form must be complete before proceed. †¢ Users can access the system anytime. †¢ System can use by all students at UNISEL. 11 3. 3. 3Constraint(s) 12 †¢ Users must knowledgeable about this system before use it. †¢ If form not completed, user cannot submit the form. †¢ User must have id number to log in this system. †¢ The information of all the users must be stored in a database that is accessible by the Online Library System. †¢ The university information security system must be compatible with the Internet applications. The users access the Online Library System from any computer that has Internet browsing capabilities and an Internet connection. †¢ The billing system is connected to th e Online Library System and the database used by the billing system must be compatible with the interface of the Online Library System 13 3. 3. 4Note(s) 14 †¢ Users can browse to see the books existing currently in the library via online access. †¢ System can update all new information about the university. †¢ System can display the charge fines imposed for late return of books. 1 3. 4 GUI 1) Main ScreenIn the main page users are able to: I. Do Registration. II. Logging in. III. View information about the library. [pic] Figure 7 : Main Screen 2) Registration I. Click on the button Register. II. Registration page. [pic] Figure 8 : Registration page III. Fill in name, id, race, course, religion, password, Email, address and choose the membership type. IV. Click to submit button (to be complete the registration). 3) Logging in. I. User must type a user name and password to log in the system II. Click the button â€Å"login† to access the system [pic] Figure 9 : Lo gging in page III. About us page [pic]Figure 10 : about us page 1. On this page it tells the story of rooms available to fine reading materials and system. 2. It also a story about the library system IV. Database page [pic] Figure 11 : Database page I. This database show information of about student who have registered to become library members. II. Admin allow to check the details of information . III. They also can edit and delete it. 3. 5CSCI Internal Interfaces 3. 5. 1Main Class Diagram 1 1.. * 10.. * 10.. * 3. 6Module Data Element Requirements This paragraph identifies the interfaces between the capabilities identified above.In this case, this means that we give the main activity, the list of the classes, the received and sent messages of each class according to an object-oriented viewpoint. 3 3. 53. 7 Adaptation Requirements Not applicable. 4 3. 63. 8Sizing and Timing Requirements |ITEM |INPUT |DESCRIPTION |OUTPUT | | |Username and password |Session will expire if the |System logged out automatically | |20 seconds | |system is idle for 30 minutes | |Table 1: Time Requirements Description 5 3. 73. 9Safety Requirements |ITEM |INPUT |DESCRIPTION |OUTPUT | | | |Insert the wrong id all |System reset all information | |Error |Register |information will be deleted and |automatically | | | |can't process. | | Table 2 : Safety Requirements 3. 9Requirements Traceability |No |Requirement No. |Description | |1. |SRS_REQ1_001 |System displays Registration | |2. |SRS_REQ1_002 |System displays Main Screen | |3. |SRS_REQ1_003 |System displays Database | |4. SRS_REQ1_004 |System displays Record Information | Table 3: Unisel Library Membership System Use Case Requirements Traceability 4PREPARATION FOR DELIVERY The delivery of documents will be delivered in the following formats: File format:MS Word (. doc) Submission formats:Hardcopy Quantity:1 each 5NOTES Abbreviation used: – CSCIComputer Software Configuration Item – CSCComputer Software Component †“ CSUComputer Software unit 3. 8 2 3. 10 [pic] ———————– Admin e-Document Student Unisel Library Membership System Registration online and Web Information Main screen User Home Registration About us Complete Form Submit Form Database Login Login Page Admin Registration Main Screen STUDENT DATABASE RECORD INFORMATION ADMIN Registration Main Screen Database Record Information 1. The register button to access the registration form Logging button Home Button About us button 3. Submit button 2. Registration form . Logging in form. 2. Logging in button Admin Unisel Library Membership System Register Database Student ———————– †¦Ã¢â‚¬ ¦/†¦.. /SRS/120082009 UNISEL LIBRARY MEMBERSHIP SYSTEM V3 A4 00-01-022-0 ITEM NUMBER VERSION FORMAT CSCI NAME DOCUMENT IDENTIFICATION COVER PAGE V3 A4 01-02-022-R0 UNISEL LIBRARY MEMBERSHIP SYSTEM ITEM NUMBER VERSION FORMAT CSCI NAME DOCUM ENT IDENTIFICATION V3 A4 01-02-022-R0 UNISEL LIBRARY MEMBERSHIP SYSTEM ITEM NUMBER VERSION FORMAT CSCI NAME DOCUMENT IDENTIFICATION

Friday, January 3, 2020

Breast Cancer Essay - 1330 Words

Breast Cancer Kinds of support Breast Cancer Clients’ need. Harpreet Kaur Malhi Scholarly Writing in Nursing Wednesday October 27, 2017 Breast cancer is no longer a menace as it was years back; however, little is known on what the patients experience after treatment. Pauwels, Charlier, Lechner Van Hoof (2013) state that the period of transition to survivorship is filled with emotional distress and a low quality of life. It is evident that the survivors have to go through many struggles and in the recent past, there have been interventions that are meant to improve on their well being. No clear guidelines exist on how the psychological interventions that should be applied to assist breast cancer patients to make a quick†¦show more content†¦Learning on the best coping strategies will help to do away with their fears and learn on how to run the day to day stress. Depression, PTSD, or even psychological suffering may make treatment of breast cancer quite difficult (Hutchinson, 2010). Better handling of the accompanying emotions will help to improve the medical care that the patient receives. For younger women, the treatment procedure may be tougher on them. Changes such as induced early menopause, lower level of estrogen can bring issues such as hot flashes, sweating at night and even vaginal dryness. Besides cases of infertility due to lower estrogen levels, there is the possibility of experiencing lower sexual drive (Partridge, 2013). With the treatment-induced menopause, there is a high possibility of weight gain; it is commonly accompanied by sleep disturbance and fatigue. Due to the treatment, there is a possibility of having lower bone mineral deposits; this may lead to bone-related deficiencies. Cardiovascular health issues have also been reported; besides the bodily harm that they cause, there is a great possibility of physiological disturbance that will need expert care (Partridge, 2013). Support needed by the patients Partridge, (2013) states that; a comprehensive approach is needed to accord the patients the best care possible. With this knowledge, researchers developed a program that addresses the issues facedShow MoreRelatedMale Breast Cancer Essay861 Words   |  4 Pages Breast cancer in males is quite common, yet still many people are unaware of this disease. Often, it can go undiagnosed until the cancer is in the fourth stage. Every year over 2,000 men will be diagnosed, but only 54% will survive. Cancer in men is often overlooked as it is almost 100 times less common in men than women. During a man’s entire lifespan, the risk of having a diagnosis is about one in one-thousand. The most common symptom of this devastating disease are a lump or some swelling. ThisRead More Breast Cancer Essay1204 Words   |  5 Pages BREAST CANCER I) Anatomy of the breast nbsp;nbsp;nbsp;nbsp;nbsp;The breast is a gland designed to make milk. nbsp;nbsp;nbsp;nbsp;nbsp; II) What is breast cancer? nbsp;nbsp;nbsp;nbsp;nbsp;Breast cancer is an abnormal growth of cells. nbsp;nbsp;nbsp;nbsp;nbsp;These abnormal growths are called tumors. Not all tumors are cancerous. nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;Non-cancerous tumors – benign nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;nbsp;CancerousRead More Breast Cancer Essay1235 Words   |  5 PagesBreast Cancer Cancer is one of the leading causes of death in the United States. There are many different types of cancer that are affecting people all over. Breast Cancer is one of these, and is found in man and women. Over 200,000 women and 1,300 men have been diagnosed with breast cancer this year. One in eight women will detect breast cancer in their lifetime. Men are less than one percent of the cases of breast cancer that are detected. Although prevention is not yet available, earlyRead MoreEssay Breast Cancer1675 Words   |  7 PagesBreast Cancer Breast cancer is a disease that is becoming more and more popular in this day of age. One in every eight women is diagnosed with breast cancer (Breast Cancer, 2010). Women and men who suffer from breast cancer not only are fighting cancer but are also fighting the psychological aspects of the disease. Breast Cancer is the second most diagnosed cancer among women in the United States right behind skin cancer. Women are now surviving breast cancer a lot more frequently becauseRead MoreBreast Cancer Essay642 Words   |  3 PagesBreast Cancer Breast Cancer is a cancer that forms in tissues of the breast, usually the ducts (tubes that carry milk to the nipple) and lobules (glands that make milk). It occurs in both men and women, although male breast cancer is rare. Anyone women could be at risk for breast cancer but, there are factors that make some women more susceptible to breast cancer than others. A risk factor is anything that affects your chances of getting a particular disease. Some can be controlled and some can’tRead MoreBreast Cancer Essay937 Words   |  4 PagesBreast cancer along with many other cancers are being researched daily to find new treatments. With all the new research, it is possible to see high survival rates and lower reoccurrence rate. Many are benefiting from the new treatments that are being discovered. Breast cancer is the second leading cause of death in women and the advancements that have been made are remarkable. There are different types of breast cancer that could be used in planning treatment and new therapies. Authors of MayoRead MoreBreast Cancer Essay1253 Words   |  6 PagesCancer lies dormant in all of us; all living organisms such as our bodies are making defective cells all the time (1). This is how tumors are developed. Our bodies are also equipped with a number of mechanisms that detect and keep such cells in check (1). Breast Cancer (BC), is the most common malignancy in women worldwide, and it is associated with high morbidity and mortality (2). These breast tumors are comprised of phenotypically diverse populations of breast cancer cells (3). However, chemoresistanceRead MoreBreast Cancer Essay1178 Words   |  5 PagesAbstract: Breast cancer is the second most common cancer in women worldwide. The most common type of breast cancer is ductal carcinoma, which arises in cells that lines breast duct. Many imaging techniques are used for the screening and diagnosis, but typically patients are diagnosed at advanced stage only, and the prognosis is associated with early detection. At present serum and protein biomarkers improving early detection of breast cancer, these make better treatment options with a better responseRead MoreEssay on Breast Cancer1788 Words   |  8 Pages Breast cancer is the most common type of cancer in women, it accounts for one of every three diagnoses in the United States. Breast cancers are malignancies, life threatening tumors that develops in one or both breasts. A female breast consists of fatty and fibrous connective tissues. The interior of the breast is divided into about twenty different sections called lobes. Each of the lobes is further divided in to lobules, which are structures that contain small milk-producing glands. These glandsRead More Breast Cancer Essay2259 Words   |  10 PagesBreast cancer is the second most common cancer in the world (Breast). Every three minutes a woman is diagnosed: one in eight women will have breast cancer (Walgreens, 2011; Chen, 2010). â€Å"I have to admit, like so many women, I always knew there was a chance. But like so many women, I never thought it would be me. I never thought Id hear those devastating words: You have breast cancer. â€Å"- Debbie Wasserman Schultz, a democratic representative of Florida (2011). Mutations turn genes on and off