Thursday, May 28, 2020
How to Convince the Med School Adcom That They Want You
Yourà med school applicationà is your sales pitch. If after reading your application, the adcom isnââ¬â¢t interested in hearing more from you, then you havenââ¬â¢t done an adequate job selling yourself. There are FOUR things you need to reveal in your application if you want to convince the admissions committee that you understand the foundations of a strong med school application and that youââ¬â¢re worth investing in. In your medical school application you MUST show that: 1. You can do the work. High test scores, a solid transcript, and a good sampling of clinical work/research will prove to the adcom that youââ¬â¢ve got the brains and the know-how to succeed. 2. You share the mission of the school. You must show your commitment to diversity, to working in underserved communities, to holistic healing, to osteopathy, etc. ââ¬â if your target school focuses on any of the above (or other areas), then it would do your application good to indicate that those factors are important to you as well. 3. You will make a good physician. Yourà letters of recommendationà will come into play here. You need strong voices to vouch for your abilities and passion to become a physician. The more experience you have in the field here, the better. 4. You will contribute to your school community and medical profession. A foundation of admissions is the belief that ââ¬Å"Past behavior predicts future behavior.â⬠Schools want to admit students who will be active participants in their community, and alumni who will make them proud. Show that you have been active in the past and that you have revealed the qualities medical schools value to persuade them you have what they seek. If youââ¬â¢ve beenà involved in extracurriculars, contributed to your school or local community, and/or volunteered, then youââ¬â¢ll want to include this information in your application. Similarly, if youââ¬â¢ve participated in important medical research and can show that youââ¬â¢re passionate about continuing to contribute to medical advancements, then this should be explained in your app as well. If your pitch is weak in even ONE of the above four areas, then itââ¬â¢s likely that the adcom readers will turn you down and move on to the next applicant on their list. Do you need help strengthening your pitch? Check out ourà medical school admissions services. ; For 25 years, Accepted has helped applicants gain acceptance to their dream healthcare programs. Our outstanding team of admissions consultants features former admissions directors, admissions committee members, pre-health advisors, postbac program directors, and doctors. Our staff has guided applicants to acceptance at allopathic (MD) and osteopathic (DO) medical schools, residencies and fellowships, dental school, veterinarian school, and physician assistant programs at top schools such as Harvard, Stanford, Penn, UCSF, Johns Hopkins, Columbia, and many more.à Want an admissions expertà to help you get Accepted? Click here to get in touch! Related Resources: â⬠¢Ã Med School Rankings Numbers: What You Must Know â⬠¢ 5 Reasons Why Med Applicants Should Volunteer â⬠¢ Med School Student Interviews
Saturday, May 16, 2020
Should Minimum Number Of Beijing Residents Living...
From the June 2016 issue ââ¬Å"Minimum number of Beijing residents living in underground bomb shelters : 150,000 Percentage increase since 2014 in the annual number of reported labor strikes in China : 65 Minimum number of Turks who have been criminally charged for insulting President Erdogan since August 2014 : 1,845 Number of names on Turkey s terrorist watch list in 2014 : 4,800 Today : 37,000 Estimated annual economic cost of tightened border controls to the European Union : $13,000,000,000 Number of cyberattacks directed against the U.S.â⬠(Rivka Galchen, harpers.org) ISIL rocket attacks on Turkey (2016), February 2016 Ankara bombing (Ankara, the capital of Turkey, at least 30 people died and 60 were injured) March 2016 Ankara bombing (Ankara car bomb kills at least 32) 2016 Atatà ¼rk Airport attack (terrorists killed 42 people) 2016 Bursa bombing (injuring 13 people) February 2016 Diyarbakir bombing (209 People Killed, 862 Injured) March 2016 Diyarbakir bombing (killed s even police officers and wounded around two dozen people injured) May 2016 Diyarbakir bombing (May 10 2016-killing 3 people and wounding 45 others, May 12 2016-death toll of 16) May 2016 Dà ¼rà ¼mlà ¼ bombing (16 villagers were killed and 23 villagers were wounded) May 2016 Gaziantep bombing (killed two policemen and injured 22 others) August 2016 Gaziantep bombing (56 people were killed and 66 injured in the attack, 14 of the 66 were critically injured) January 2016 Istanbul bombing (killed 13 people, allShow MoreRelatedOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pagesbefore in history, for example, had so many humans enjoyed such high standards of living, and never had so many been so impoverished or died of malnutrition and disease. If the period from the 1870s is included in a long twentieth century (and perhaps even if it is not), migration served as a mode of escape from oppression and poverty and, in many instances, as an avenue toward advancement for an unprecedented number of people that soared well into the hundreds of millions by centuryââ¬â¢s end. ButRead MoreExploring Corporate Strategy - Case164366 Words à |à 658 Pagespractice. They are not intended to be a comprehensive collection of teaching material. They have been chosen (or speciï ¬ cally written) to provide readers with a core of cases which, together, cover most of the main issues in the text. As such, they should provide a useful backbone to a programme of study but could sensibly be supplemented by other material. We have provided a mixture of longer and shorter cases to increase the ï ¬âexibility for teachers. Combined with the illustrations and the short caseRead MoreOrganisational Theory230255 Words à |à 922 Pagestogether the very diverse strands of work that today qualify as constituting the subject of organisational theory. Whilst their writing is accessible and engaging, their approach is scholarly and serious. It is so easy for students (and indeed others who should know better) t o trivialize this very problematic and challenging subject. This is not the case with the present book. This is a book that deserves to achieve a wide readership. Professor Stephen Ackroyd, Lancaster University, UK This new textbook
Wednesday, May 6, 2020
Role of Cognitive Development in Trying Juveniles as...
In the United States, you are considered an adult at 18-years old. With age comes a plethora of other privledges. You can drive at 16 with a proper drivers license, legally engage in intercourse at 17, vote and purchase cigarrettes at 18 and purchase and consume alcohol at 21. Although there is one age restriction that hasnt been set in stone. In the justice system, one may be considered an adult at 18 and be tried as such. The option of being tried as an adult hangs on many circumstances. If the individual commited a serious crime, such as armed robbery, rape, or murder, then they may be tried as an adult. If the individual was tried as an adult in an earlier case, then they will continue to do so indefinetly. Theâ⬠¦show more contentâ⬠¦Scientists in this field, such as Lawrence Kohlberg ( known for his theory of moral development) and Jean Piaget ( known for his epistemological studies with children) study the construction of the human brain and its understanding of the wo rld. Modern cognitive scientists have come up with a new theory about the mind. After doing an experiment involving an MRI of the human brain from ages two to twenty-two, they have conluded that the human brain is not fully developed until at least 25 years old. This means that the justice system may be incorrect in trying juvinilles as adults in court cases. What is the proper age that a person is considered an adult? Adolecents lack the ability to make rational judgements and control sudden impulses when under stress. Their descions are usually lacking in sense if it was made based purely upon the emotion at hand (fear, anger, and nervousness illicit the most dangerous reactions). Young adults are more likely to take focus on the current situation rather than the consequences of the future. Teen judgement is skewed because of a great deal of emotion going into their thinking, leading them to make irrational judgements. According to scientists, the brain develops from the back to the front. The frontal lobe, which is mainly responsible for executive processes (judgement, weighing outcomes and decision making) is not fully mature. TheShow MoreRelatedSocial Psychological Theories Of Criminal Behavior1494 Words à |à 6 Pagessubjective life experiences, such as the development of oneââ¬â¢s identity, cognitive and emotional processes, and the capacity to make choices.â⬠(Listenbee, 2014 p.1.) Utilizing social aspects of the past and present criminal justice agencies can predict the type of life that may be lived by the young adult, whether it is a criminally active life-style or more conformed to the civilities of society. With knowledge of what may yet come in the life of a juvenile, it is possible to curve the criminal activityRead MoreA Critical Look in Current Events Facing Juveniles in the Juvenile Justice System1802 Words à |à 8 PagesLook in Current Events Facing Juveniles in the Juvenile justice system The juvenile justice system was founded on the belief that juveniles should be rehabilitated from committing crime. It was the belief of the government that juveniles do not posses the cognitive reasoning of adults, therefore should not be punished as adults. The juvenile court was formed in 1899 with the belief that the government needs to play a more active role in the rehabilitation of juveniles. This belief held strong upRead MoreCompassion Impacts Wayward Youth1619 Words à |à 7 PagesJuvenile court systems developed in Chicago based on the patriarchal premise that a tough compassionate judge could impact the lives of wayward youths. However, politicians changed this with ââ¬Å"tough on crimeâ⬠policies for election. Many juvenile criminals became labeled as ââ¬Å"superpredatorsâ⬠and were thus deemed beyond any help and were tried as adults. Fortunately, not everyone in the criminal system believes that juvenile criminals are beyond help. Some of the peopl e that believe that there isRead MoreThe State Of Wisconsin Department Of Corrections2728 Words à |à 11 PagesAccording to Ruddell and Thomas (2009), in 2006 it was estimated that there was 93,000 juveniles in either a detention center or juvenile correctional facility; however, the arrest rates have decreased at least by 2,000 since 1993. Many juveniles on release are reoffending quickly since most of them have been locked up throughout their developmental years and their brain did not get the right cognitive development it needed to help make the right decision. Many different states and correctional institutionsRead MoreSocial Perspectives on Juvenile Delinquency Essay903 Words à |à 4 PagesThe juvenile generation of today has drifted far from the family values that their parents grew up with and tried to pass along to them but there are many loop holes in the generations of yesterday and today. Although, it is not easy to find the true connection between the practices of e arly childhood development and the social development better known as the recklessness stages of life. Many children fall victim to their environment and end up being a product of the life they see outside theirRead MoreInvestigation Report Form Of Juvenile Criminal History Record856 Words à |à 4 Pages125 HAIR: Brown SS NO: 754-24-2195 OTHER: MULTIPLE ââ¬Å"SPIDER WEBâ⬠TATTOOS ON BOTH ARMS ADULT CRIMINAL HISTORY RECORD: A. Adult Person Felonies ââ¬â 000 B. Adult Non-person Felonies ââ¬â 000 C. Adult Person Misdemeanor ââ¬â 000 D. D. Adult Non-person Misdemeanor ââ¬â 000 E. Juvenile Person Felonies ââ¬â 000 F. Juvenile Non-Per Felony ââ¬â 000 JUVENILE CRIMINAL HISTORY RECORD Juvenile Adjudications: 1. None known or admitted. Adult Adjudications: 1. 09/17/2015 solicited for sex Plantation, Florida CRIMINAL HISTORY:Read MoreThe Recidivism Rate of Juvenile Sex Offenders between Uses of Legal Sentencing as Adults or Utilizing Psychological Treatment2308 Words à |à 10 PagesThe Recidivism Rate of Juvenile Sex Offenders between Uses of Legal Sentencing as Adults or Utilizing Psychological Treatment It is typically thought that sex offenders are the type of individual that needs to be tried in our courts and then sentenced because there is really no hope for an individual that harms the most innocent of our society. But there just may be an exception to this way of thinking. Juveniles who at one point themselves may have been victims, and as they have grown into adolescenceRead MorePursuing A Master s Student Affairs1412 Words à |à 6 Pagesas an undergraduate student. While in undergraduate, I was involved with Alpha Phi Alpha Fraternity, Campus Activities Board Directors, Student Support Services, Student Government Association, Residential Housing, and the Department of Student Developments. Pursuing a Masterââ¬â¢s degree has always been an interest of mines, but I never knew what degree to pursue. While working as a student worker for the department of student activities, I gained a love for the college campus environment. This loveRead More Hope for Rehabilitation for Institutionalized Youth Offenders4628 Words à |à 19 Pages ââ¬Å"You do the crime, you pay the time,â⬠is a common phrase uttered throughout our society in regard to juvenile delinquency. It has been suggested that a punitive response to the problem of youth violence in America is an effective means of solving the issue of youth crime, and would also deter future offenders. As a result, the existence of rehabilitation strategies within the system available to offenders is under threat. A harsh and punitive response to youth violence was, in part,Read MoreTesting Kohlbergs Theory of Moral Development for Gender Bias1369 Words à |à 6 PagesTesting Kohlbergs Theory of Moral Development for Gender Bias Testing Kohlbergs Theory of Moral Development for Gender Bias Introduction Building upon Piagets moral development model, which suggests that children around the ages of 10 or 11 transition from a rule-based morality to one that is more relativistic, Kohlberg concluded in his 1958 doctoral dissertation that there were at least five stages of moral development (Crain, 1985). According to Kohlberg, the maturation from one stage to
Tuesday, May 5, 2020
Climate Change and Poverty free essay sample
Over the past few decades, a major concern is the threat climate change possess for todayââ¬â¢s economy. Millions of people are affected each and every day by climate change but this is just the beginning of the worst. One thing that seems to go unharmed by climate change is social status; how long will money last as a barrier to the effects of Mother Nature? How does poverty increase the risks associated the devastating powers of climate change? When speaking in terms of poverty many different categories arise. Poverty in America is different than poverty in Asia or Africa. Every country has faced poverty. It is inevitable; some countries however, face a disproportionately high percentage of poverty. Climate change affects many different aspects of each country. Each country is at risk of poverty due to climate change; however, poverty stricken areas are more economically, socially, and politically unprepared. Countryââ¬â¢s economic standings are greatly affected by climate change Many people are confused as to how the changing climates affect the economy. Every country depends on agriculture and specific levels of water to generate specific revenues. The more poverty stricken areas rely on farming and water levels more so than well off countries. Most of these countries have not yet been fully developed like USA, Europe or some parts of Asia. Climate change threatens the potential future crop yields. Climate change could place an additional 5 to 170 million people at risk of hunger by the 2080ââ¬â¢s (Rosenzwig and Parry). We are talking about a vicious never ending cycle of devastation. Countries depend on rain fall for agricultural growth; climate change affects the amount of rain fall from droughts to monsoon levels. Farming is at the mercy of water, leaving communities with the threat of possible starvation. Most of the poverty stricken areas rely solely on farming, not only for revenue, but also for nutrition. This being said, climate change drastically threatens a countryââ¬â¢s economic status not just for the more poverty stricken areas but every country as well. Climate change and agriculture are intertwined processes; both take place on a global scale. The problem about climate change is that it has a very slow increase, such as one or two degrees a year. This does not seem to be that devastating. However, many crops are climate based such as grains and coffee, grapes used for wine production, and other fruits; even the slightest increase of temperature will and can affect these crops. Thus climate change is leaving already poverty stricken areas like India and northern Africa to await their drastic fate. Although low and middle income countries are only responsible for a small percentage of greenhouse gas emissions, the adverse health effects associated with climate change will fall disproportionately on the lower income countries; this inequity will further exacerbate global health disparities. The greatest social peril of climate change is how it affects health issues, especially those in poverty stricken areas. The changing of temperatures will further effect the ecology of diseases such as yellow fever, malaria, and dengue fever; socially the people most at risk are the elderly, very young, and the poor (McMichael). Millions of people below the poverty line and those in rural areas represent high risk populations who are exposed to myriad health risks, including poor sanitation, pollution, malnutrition, and a constant shortage of clean drinking water (Dhiman). Climate change is already taking a toll on the economical standings of poverty stricken countries; proceeding with the vicious cycle of social destruction, climate change seems to have no weakness. For instance, the summer of 2010 was the hottest summer on record in India, with temperatures reaching a record average of 122 degrees Fahrenheit. The effects were limitless: crops perish, livestock were killed, and thousands of people were hospitalized or killed (Burke). A study of 12 globally urban areas noted a 2. 80 ââ¬â 5. 08 percent increase in mortality rate for each one degree increase above 29 degrees Celsius (Hajat). India has the highest amount of people living and suffering with AIDS; climate change affects the research and possible solutions of fighting off AIDS and other diseases. With limited resources such as water available not only would it be hard to make vaccines and cures it opens up an unprecedented amount of possible deaths. When looking at the corporate businesses and the undoing of the human habitat; the United Nations has sanctioned many organizations to track climate change such as the UNEP, the World Meteorological Organization and the IPCC. Since the mid-eighties, these agencies have monitored the changes, yet have failed o convey the significance. Studies done by these agencies have concluded that the last fifty years are attributable to human activities and big corporations which lead to the changing in the compositions of the atmosphere throughout the 21st century (Saltori). These activities that are mentioned are those by means of businesses that grew into national conglomerates. Concurrent with business growth, the greenhouse gas emissions have grown seventy percent from 1970 to 2004 (Lehner). Recent studies have shown that 122 corporations produce eighty percent of greenhouse gases (IPCC). The climate is going to drastically change the world forever, but at whose expense? What exactly does the political eminence of these companies have to do with climate change and poverty? The answer lies in yet another vicious never ending cycle. Corporations employ millions of people enabling the stimulation of the economy. The people in return purchase and live off of the money from the corporations. However, not only are people living off the companies, but they are also contributing to and enabling to the production of greenhouse gas emissions. Globally, we as a civilization have become accustomed to these conglomerates to survive, or so we ruminate. Poverty stricken areas lack these 122 multinational companies, yet they still feel their wrath. There is, however, undoubtedly a silver lining; the businesses and their bringing of our destruction may also be the key to our survival. We know that these 122 companies have in a way sealed our fate; yet they also bring many more attributes to the table. These companies are capable of stimulating the economy, advancing technology and are accomplished enough to lead the world to better health conditions. The UN established an adaption fund to help developing countries cope with climate change. With all these efforts only eighty million dollars was raised, which was miniscule to the actual amount needed. The United Nations and their sanctions also developed a refugee program for these underdeveloped countries; becoming a refugee country is harder than conquering world peace. They developed a three level program to help these countries with rules and regulations in place that become more drastic at each level. This program has developed these strict rules, so as to not have a recurrence of the refugees after World War II. The revenue from the businesses would easily be able to help the disadvantages they have created. Once these sanctions made from the UN and conglomerates can realize that they are the bringer of destruction and also the possible savior, the world may be able to breathe more easily. These companies are reporting constant growth in income. The companyââ¬â¢s net worth is constantly on the rise while the poverty stricken areas are in need of help and rendered useless to the businesses devastating effects on climate change. The abundance of revenue would be a great help if donated to those sanctions created by the UN. In todayââ¬â¢s world we face a harsh time ahead. Poverty stricken areas are more economically, socially and politically unprepared. The world is changing and it is for the worse. Climate change is affecting every national resource we as a global community need to survive. Underdeveloped countries are limited to their amount of resources and depend on those to survive. With the climate in the rise the production of many fruits, vegetables, grains and every countryââ¬â¢s staples are all at risk. Countriesââ¬â¢ livestock are included under the climate changeââ¬â¢s pressure. The changing of the weather affects not only the heat, but also the rain fall from droughts to monsoonsââ¬â¢ and floods and leads to unstable clean drinking water supplies. Poverty stricken areas are not able to produce certain health vaccines; climate change and the changing of waterfall seriously hinder their abilities to create more vaccines and provide accurate health care. Many viruses and illnesses ââ¬Å"power countriesâ⬠have and are able to treat and even cure are not as easily treatable in those underdeveloped countries. The most devastating aspect is realizing how the companies we take for granted are leading us to our doom. Producing eighty percent of greenhouse gases is unimaginable. What is more mind-boggling is that these 122 conglomerates hold the key to our salvation. These companies have the power, the wealth and time to fix their undoing and help right their wrongs. Millions of people are at risk to the effects of climate change. Going ââ¬Å"greenâ⬠is a simple yet wonderful way to help save our planet however, our efforts are useless to those in severely poverty stricken areas. The time to make awareness is now; the time to stand up is now; the time to act is now!
Friday, April 17, 2020
Management system free essay sample
This document describes the high level design for the CHART/EORS Intranet Mapping Application and the CHART Internet Mapping Application. The purpose of this design is to show the high-level technical approach to meeting the requirements defined in system requirements specification. This serves to identify the architecture of the system and high-level interactions between major system components. 1. 2 Objectives Identify and describe the software architecture for the system. Provide high-level approaches to various technical challenges. Provide a guide for future development efforts, such as detailed design and coding. 1. 3 Scope This high level design encompasses the approach for meeting the requirements as defined in the documents CHART/EORS Intranet Mapping System Requirement Specification and CHART Internet Mapping System Requirement Specification. 2. System Architecture 2. 1 Overview The following diagram shows the system architecture used by CHART mapping applications. The system design utilizes web based multi-tier system architecture. The data storage is managed at the data tier by the databases. We will write a custom essay sample on Management system or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The main business logics are hosted in the two applications in the web server. Because mapping is an area that there are many requirements related to client side interactions with the graphic content of the application, application logics are partitioned based on the most appropriate location to execute them. Some are located on the client browsers to provide instantaneous feedback to the user. The general system operation flow involves the following: 1. Data updates from various sources such as the CHART II CORBA events, EORS data inputs, device and event editing modules are stored in the databases. When a mapping application receives a mapping request, it sends the image map generation request to the ArcIMS map server. The ArcIMS server retrieves the map data from the databases and creates a rendering of the map and saves it as a raster image file. The mapping application generates HTML pages embedded with the image and sends it to the browser client. 3. For the CHART Intranet mapping client, the application also generates the dynamic content in VML format, which encodes the device and event information in vector format. This enables the application to update the dynamic data without having to reload the whole map image. This avoids the heavy load on the map server when the application scales up. 4. When the images and VML data arrives at the client browser, the client displays the map to the user. The user can interact with this data on the client. 2. 2 SQL Server and ArcSDE ArcSDE from ESRI allows managing of geographic information in commercial databases such as SQL Server, Oracle, DB2 and Informix. ArcSDE provides functionalities to efficiently store and retrieve spatial information using spatial indexing mechanisms. Managing the spatial servers is the ArcIMS Application Server, which monitors each spatial serverââ¬â¢s activity and brokers map requests to the least busy spatial server. The detailed interaction of a map request is as the following: When the ASP. Net page receives a map request, it parses it and uses the ActiveX Connector object model to construct a map request. The connector then sends the map request in ArcXML format to the Application Server. The Application Server then finds the least busy spatial server and forwards the map request to it. The spatial server performs the query against the ArcSDE database, retrieves the data and renders them into a raster image file. The location of the file is then sent back to the connector and the ASP. Net page writes it back to the client as HTML page with the image embedded in it. 2. 4 Web Server (IIS) . Net Framework and ASP. Net The web server hosts and publishes content to the client browser. In the case of the CHART mapping applications, most of the content is dynamic content generated by ASP. Net modules. When IIS recognizes a page being an ASP. Net module (an aspx extension), it passes the request to the . Net Framework to load the module and handle the request. The ASP. Net pages are then loaded into memory and executed. The . Net Framework provides many utilities such as garbage collection, tracing, just-in-time compilation that manages the execution of ASP. Net modules. The ASP. Net page modules are where the CHART mapping application logic is coded. The web server also provides security via the Secured Socket Layer (SSL), allowing interactions between the userââ¬â¢s browser and the web server to be encrypted when necessary. Network Level Security Network layer security will be managed by the network security configurations like firewall and RSA secure ID. 2. 5. 2 Secured Socket Layer (SSL) MDOT has a certificate server to provide digital certificates for the SSL configuration. The server name must remain consistent with the certificate. All links shall use the same server name, otherwise, if the server is referred using an IP address or a local server name, etc. , the user will see an alert indicating the certificate is in-consistent with the resource. IIS supports the configuration of one folder in the web application requiring SSL while other portion does not. The session information remains consistent between SSL portion of the web site and the non-SSL portion. 2. 5. 3 Enterprise User Enters Read-Only View Many of the CHART mapping functionalities are for display and reviewing data, i. e. a read-only view. The design allows enterprise viewers and CHART users to access the read-only portion of the web site without having to input user name and password. This also enables CHART users to reach the viewing area without having to enter their login information again. When system receives a user request to enter the secured area, the system checks whether the current session has been authenticated. If not, system displays login screen. The user shall enter their CHART user name and password. Upon receipt of the user name and password, the system checks it against the CHART II databaseââ¬â¢s user tables. If they are authenticated, the system stores the user information in the session. The session will be managed in the server until the configured timeout expires. All subsequent requests from the same user session will inherit the same authorization information for the user. 2. 5. 4 CHART User Enters Editing Area Other applications, like future versions of CHART II and CHART Lite, can launch the map editing URL via the HTTPS protocol. The user name and password can be sent via https request. The system verifies their authentication information against the CHART II user database using an OLEDB/ODBC connection. If the authentication information is correct, the system will store this information in the session. The user will be redirected to the map page. If the authentication is rejected, the user request will be redirected to the login screen to reenter the authentication information. Associating a CHART user with an op-center/default map view area: Based on CHART II R1B3 database design, users are not associated with an op-center; rather, the user specifies an op-center during logon. In order to display a default map view area based on an op-center, an external application launching the CHART mapping application will also need to pass in the operation center name to initialize the map to the associated extent. Passing user name and password in URL request: The mapping site shall have a module that verifies the user name and password, then forward the page to the map page, hence avoiding showing the password on URL address box. At the current time, without the full integration with CHART II and CHART Lite, the system will expect plain text user name and password. In the future, an encryption/decryption algorithms agreed between the systems can be added to achieve higher security. 2. 5. 5 EORS Security Currently, the EORS security has not been implemented. EORS functions will be hard-coded with security configuration. 3. Network Configuration The design above depicts CHART network configuration as the Internal network, a Demilitarization Zone (DMZ) network for hosting the web server and connecting out to the external Internet network. There will be two firewalls, one between the Internet and the DMZ network and another one between the DMZ network and the internal network. The map server and database servers are to be hosted in the internal network for maximum security. The initial configuration calls for two physical computers to host the map servers and database servers. In the future, if the system needs to scale up, additional physical servers can be added. The Intranet web server can optionally be hosted on the load-balanced virtual server too. 3. 1. 1 Map Server Load Balancing The design achieves load balancing by a combination of Windows 2000 Advanced Server Network Load Balancing (NLB) Service and the ArcIMS Application Server. The system utilizes two physical server computers. The two servers are configured with NLB. NLB works on the TCP/IP level. Any incoming traffic from web server to the virtual server IP address is load balanced between the two application servers by NLB. ArcIMS Application Server operates at the application level, monitoring each spatial serverââ¬â¢s load and operation. When a spatial server is busy, it directs the map request to idling spatial server(s). Each physical map server hosts one ArcIMS Application Server and two ArcIMS Spatial Server instances. An application server failure forces NLB to direct new connections to the remaining application server. When the failed server is recovered, new client connections should once again be shared between the two servers. The two spatial server instances are ââ¬Å"cross registeredâ⬠to the application servers. As shown in the diagram, Spatial Server A1 and A2 are registered to Application Server B and A correspondingly. This arrangement ensures that when a spatial server is down, the application server can still utilize the spatial server from the other server to serve the map request and the application server continue to function. Also, this configuration also allows ArcIMS to load balance at the Spatial Server level as opposed to just the network traffic level, which is what NLB provides. This configuration can withstand an Application Server failure, a Spatial Server failure, a simultaneous Application/Spatial Server failure or hardware failure of one of the physical map servers. Using two map servers with network load balancing should provide high-availability load balanced ArcIMS web site. 3. 1. 2 Database Load Balancing By running two SQL Server and ArcSDE instances with NLB to balance the load, the system can achieve high availability at the database server layer. The database servers are completely independent and share no hardware components. This type of availability is achievable with the standard edition of SQL Server. The two database servers are setup with Transactional replication. One of the two SQL Servers is configured as the publisher and the other one as a subscriber. All the data modification such as insert, delete and update will be performed on the publisher and changes are replicated to the subscriber. Transactional replication can provide very low latency to Subscribers. Subscribers receiving data using a push subscription usually receive changes from the Publisher within one minute or sooner, provided that the network link and adequate processing resources are available (latency of a few seconds can often be achieved). When the web server and map server requests use the virtual IP address on the load-balanced group of database servers, they are directed to the database server with the least amount of load. If one of the database servers goes down due to hardware failure, NLB detects that this server is down and no longer directs database requests to this machine. The remaining machine handles the database requests and apart from a slight drop in performance the users are unaware that a database server has failed. When the hardware is fixed the offending machine can be brought back online. One limitation exists for this design. It happens when the publisher database is down. In this situation the data updates cannot be committed until the publisher database comes back. But at the same time, all read access from the Internet and Intranet server could still be directed to the secondary server. In the case when the publisher data is going to be down for extended time period, system configuration need to allow system administrator to change the configuration so that the replica will serve as the main database. Compared with clustering solution, this system design provides the maximum database availability and performance benefit. The databases that need to be replicated would include: 1. Background map database. Background map data does not change often. A snapshot replication is sufficient for replicating data updates in one database to the other. 2. CHART/EORS Spatial Database CHART/EORS spatial database stores CHART and EORS device and event information with spatial data. They are dynamically updated throughout the day. Transactional replication will be setup to ensure that data change in one database gets replicated to the other one. 3. SDE metadata. In general, the system can continue to provide access of map and data to both the Internet and Intranet users in the case of failure of any one component in the system. The only exception is that when the publisher database is down, the new data cannot be updated into the system. Users will get delayed information. 3. 1. 3 DMZ Configuration CHART is currently implementing a Demilitarization Zone (DMZ) network to enhance the network security. This entails creating a separate network for the web server computer(s) and separating it from the internal network with a firewall. In an ideal world, the DMZ would have no physical connection to the internal network. This would require two separate map server setups to serve the Internet and Intranet users. The recommended way to implement is to disallow any access from the DMZ to the internal network, but allow access from the internal network to the DMZ. In other words, allow out-bound connections. On each of the ArcIMS server computers, mount a network drive to a shared drive on the Web server. Each ArcIMS spatial server would write the output raster image files to the location on the web server to be delivered to the Internet client browsers. 4. Database Organization To reduce the dependency and operation interference between the spatial data and the attribute data, the EORS spatial database and CHART spatial database will be created as two SQL Server databases. To reduce the performance overhead when joining data between the spatial and attribute data, the EORS spatial database will reside on the same database server(s) as the EORS database. Map Display Mechanism CHART Intranet mapping application requires that changes in event and device data be reflected on all map clients in a near-real-time fashion (within 5 seconds). To do so via the traditional raster map publishing mechanism will result in all clients retrieving updated map every 5 seconds or at least when event/device status update requires a new map to be generated. When there is large number of users of the system, it will result in a high map server load in a concentrated short time period. To resolve this issue, the project team reviewed various technical approaches and summarizes their advantages and disadvantages as the following: 5. 1. 1 Raster (JPEG, GIF or PNG) Image This is a popular approach that utilizes the basic image display functionality of web browsers. It utilizes the server processing power efficiently. The disadvantages are that the images have limited client side intelligence, leaving most of the computation concentrated on the server. Itââ¬â¢s capability of handling large number of concurrent map requests is limited. Generally, one map server can support 4-8 requests per second. For CHARTââ¬â¢s situation, when an event changes status, if a new map image needs to be generated, it would be about 40 requests per second (200 users at 5 second update interval). Many servers will be required to support the load. With the license fee involved with using GIF format, we will not use GIF for map publishing. Compared with JPG format, PNG graphics do not have the ââ¬Å"bleedingâ⬠effect inherent with the JPEG compression algorithm. With the map displaying lines rather than continuous tone images, it is much cleaner. PNG also results in a smaller file, which translates into faster download times for client. The only JPG advantage is server side image generation times. It is recommended to utilize PNG for the Intranet application to produce highest quality images for standardized IE browser while utilizing JPG for the Internet to allow for support of as many browsers as possible. Also, the reduction in image processing time should deliver better web image generation performance. 5. 1. 2 XML Based Vector Graphics 5. 1. 2. 1 Vector Markup Language (VML) VML is a XML based W3C standard in describing vector graphics. Basically, it encodes the vector coordinates of points, lines and polygons in XML format. The support of VML is included in Internet Explorer 5. 0 and later. There is no download needed to display VML encoded vector graphics. It also has built-in support for style sheet and scripting. This makes it possible to modify the display properties and positions of the vector graphics using the JavaScript on the client-side browser. Using this functionality, we can dynamically update the display of devices and events. 5. 1. 2. 2 Scalable Vector Graphics (SVG) Scalable Vector Graphics is another XML-based W3C standard format for vector graphics. Compared with VML, it requires Java or ActiveX based plug-in to be displayed. Also, based on review of the plug-ins (SVG Viewer by Adobe), there is not as much support for scripting as for VML. 5. 1. 3 ArcIMS Java Viewer ArcIMS includes a Java Viewer, which provides a Java Applet that can be customized to a certain extent to display vector encoded GIS data on the client side. It requires a download to the client. The Java Viewer reads vector data from ArcIMS feature server encoded using an ESRI proprietary compression format, which makes it difficult to implement special features such as WSMS offsetted road networks because they need to be offset dynamically based on map scale. 5. 1. 4 MapObjects Java MapObjects Java from ESRI provides a set of Java-based objects for GIS functionalities. It has an extensive set of functionality that can satisfy the requirements. But, it requires a license fee of $100/seat, or comparable server-based licensing. It also requires a download to client machine to run it. 5. 1. 5 Summary Based on the research above, the project team recommends the following design: Use raster map for background map display (background data with SHA grid map are often large amount of data, suitable for server side processing) Use XML data format to transport the device and event data from server to browser client. Use JavaScript to create and update the VML vector data elements to display the dynamic layers including all the CHART/EORS devices and events. The diagram above illustrates the map display mechanism: 1. Map server reads the spatial data from background database and sends the published map image to the client browser to be displayed as background. 2. Device and event information is broadcasted from the CHART II system in the form of CORBA events. 3. CORBA event listener receives the event broadcast and saves the data into CHART spatial database. 4. CHART/EORS device and event data are published in XML format to the client. Client browser parses the XML into a XML Document Object Model (DOM) using the XML parser. 5. The client browser then iterate through the DOM tree structure and create corresponding VML elements based on the XML device and event data. The VML elements are displayed on the top of the background raster map image. 6. At a pre-configured interval, the browser client retrieves update of device and event data from the IIS server in XML format and update the VML display based on the updated information. Automated Refresh of Device and Event Data CHART/EORS device and event information needs to be updated at a pre-configured interval. They should be updated separate from the background map to reduce the load on the map server. The technical approach to achieve this will be to use a hidden frame to send the request to retrieve updated device and event data and receive the response. The response will package the data in XML file to be parsed into a document object model (DOM) and display the data on map. The request can be to retrieve all data or only retrieve data newer than last retrieval. When the new device/event is received and it requires changing the display of the device/events, the style assignment for the elements can be changed to update the device and event display. The VML elements will be sent using real-world coordinates (Maryland State Plane 1983). After the data has been retrieved to the client side, the VML map layers can be dynamically projected using the ââ¬Å"local coordinate spaceâ⬠. When user zooms or pan the map, the VML will be projected using the updated coordinates to fit the new map extent without going back to the server to retrieve new data set. 5. 3 Inter-Frame Client Script Synchronization The map page has a few frames and the browser loads them asynchronously. Scripts in one frame may call scripts in another frame that may not have been loaded. The approach to resolve this is to add client-side exception handling and verification routine to ensure that the script is called always after the frame is loaded. 5. 4 Assigning and Editing Event Location The dynamic nature of VML elements in the browser allows adding and modifying VML elements by scripting. When the user clicks or drags the mouse on the map, client-side script manages the transformation of screen coordinates and real-world map coordinates. The coordinates are sent back to the serverââ¬â¢s secured URL where the information is extracted and saved to the database. 5. 5 Scalability The CHART mapping application serves not only the Intranet users, but also Internet browser clients. During emergency situations, the load on both the Internet and Intranet servers could get extremely high. The system must be able to scale up to serve large amount of users. The technical approach to solve this issue involves two main facets. As described in the network configuration section, the system will employ network load balancing and allows adding additional hardware in the future. The system should also be able to utilize the caching feature of IIS and ASP. Net to scale up without significantly increase hardware investment. ASP. Net allows caching configuration for individual page modules, such as whether the page is cached and how long it is cached. After the application is deployed, these caching settings can be configured on the web pages. For example, if it is determined that the Internet mapping can be up to 3 seconds late, by setting caching time to 3 seconds, all requests from the Internet will receive a cached response without creating additional load on the map and database server. Exception Management and Recovery CHART II keeps its clients updated via a push model using the CORBA Event Service. The Event Service does not guarantee delivery; therefore it is possible for event data to be lost/dropped (although in practice, this is rare). To account for this possibility, the CHART Web Event Listener will refresh its information about the status of devices and traffic events from CHART II at a configurable interval. Also, each time the Event Listener is started, it will retrieve all relevant data from CHART II. Thus, the update model becomes a push model with an occasional pull to be safe. This process will be used to recover from the following situations: 1. The Event Listener was down and did not receive new data from CHART II. 2. CHART II CORBA event(s) occasionally dropped while the Event Listener is up and running. Another likely scenario is that the CHART II server or service(s) restart. After a typical restart, the CORBA Event Service CORBA objects will be recreated with the same characteristics allowing the Event Listener to continue to automatically receive CHART II CORBA events. As the CHART II services will not be processing events during this time, no events are likely to be missed. Therefore, the Event Listener does not need to do anything special to handle a CHART II server or service(s) restart. Sometimes CHART II maintenance will require that new (and different) Event Service CORBA objects be created. This might happen during a CHART II upgrade, for example. In this case, the Event Listener will need to be restarted so that it can pick up the new objects. Since this type of maintenance does not occur often and the Event Listener restarting is fast, the restart can be handled as part of the CHART II upgrade procedures. Integration with ASP Code in EORS and CHART Web Application The CHART Intranet Mapping, replacing the existing EORS mapping application, will still be launched as a separate window by a URL string with a few parameters identifying the district, view type, etc. The impact on EORS web application should be limited to modifying the URL links. The current CHART Internet Mapping site uses ââ¬Å"includeâ⬠statement to include site navigation pages from upper level CHART web siteââ¬â¢s pages. When upgrading Internet Mapping to ASP. Net, ââ¬Å"includeâ⬠statement is no longer used. Instead, a ServerXMLHTTP request can be formulated to request the text from the included ASP page and merge them into the mapping ASP. Net pages. The limitation of this implementation would be that the ASP. Net application couldnââ¬â¢t share the session and application variables from the ASP application. Currently, there are only a couple of them, such as database connection string. The ASP. Net mapping application will maintain a separate set of application variables. 6. User Interface Design 6. 1 Intranet Map Site User Interface Design Here following is a high-level frame structure for the Intranet mapping site: 1. AppFrame is the highest-level frame that includes all the child frames. On the top of the page, there will be the title frame, which will host the CHART icon. Also inside the title frame will be a group of tabs, such as Traffic, Roadway Weather, Message Sign, etc. 2. ToolsFrame hosts the map navigation and other map related tools. The ToolsFrame will also host menu system that allows the user to bring up data and other detailed information. HiddenFrame will be used to submit and receive information from the server. 4. ContentFrame is further divided to a map frame on the left and a data frame on the right. The user shall be able rearrange the frame boundary to give more space to the map or data area. Data frame will display data as well as legend, layer control and other items when needed. Management system free essay sample Provide a guide for future development efforts, such as detailed design and coding. 1. 3 Scope This high level design encompasses the approach for meeting the requirements as defined in the documents CHART/EORS Intranet Mapping System Requirement Specification and CHART Internet Mapping System Requirement Specification. 2. System Architecture 2. 1 Overview The following diagram shows the system architecture used by CHART mapping applications. The system design utilizes web based multi-tier system architecture. The data storage is managed at the data tier by the databases. The main business logics are hosted in the two applications in the web server. Because mapping is an area that there are many requirements related to client side interactions with the graphic content of the application, application logics are partitioned based on the most appropriate location to execute them. Some are located on the client browsers to provide instantaneous feedback to the user. The general system operation flow involves the following: Data updates from various sources such as the CHART II CORBA events, EORS data inputs, device and event editing modules are stored in the databases. We will write a custom essay sample on Management system or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page . When a mapping application receives a mapping request, it sends the image map generation request to the ArcIMS map server. The ArcIMS server retrieves the map data from the databases and creates a rendering of the map and saves it as a raster image file. The mapping application generates HTML pages embedded with the image and sends it to the browser client. 3. For the CHART Intranet mapping client, the application also generates the dynamic content in VML format, which encodes the device and event information in vector format. This enables the application to update the dynamic data without having to reload the whole map image. This avoids the heavy load on the map server when the application scales up. 4. When the images and VML data arrives at the client browser, the client displays the map to the user. The user can interact with this data on the client. 2. 2 SQL Server and ArcSDE ArcSDE from ESRI allows managing of geographic information in commercial databases such as SQL Server, Oracle, DB2 and Informix. ArcSDE provides functionalities to efficiently store and retrieve spatial information using spatial indexing mechanisms. ArcSDE provides a set of API and administrative utilities that help manage the spatial data storage. For the CHART mapping systems, the combination of ArcSDE and SQL Server manages the spatial information in the relational database. ArcSDE adds spatial functionalities without disrupting standard SQL database capabilities. 2. 3 Map Server (ArcIMS) ArcIMS includes a few components that will play important roles in the CHART mapping application. The workhorse component that processes the data and generates maps is the spatial server. Managing the spatial servers is the ArcIMS Application Server, which monitors each spatial serverââ¬â¢s activity and brokers map requests to the least busy spatial server. The detailed interaction of a map request is as the following: When the ASP. Net page receives a map request, it parses it and uses the ActiveX Connector object model to construct a map request. The connector then sends the map request in ArcXML format to the Application Server. The Application Server then finds the least busy spatial server and forwards the map request to it. The spatial server performs the query against the ArcSDE database, retrieves the data and renders them into a raster image file. The location of the file is then sent back to the connector and the ASP. Net page writes it back to the client as HTML page with the image embedded in it. 2. 4 Web Server (IIS) . Net Framework and ASP. Net The web server hosts and publishes content to the client browser. In the case of the CHART mapping applications, most of the content is dynamic content generated by ASP. Net modules. When IIS recognizes a page being an ASP. Net module (an aspx extension), it passes the request to the . Net Framework to load the module and handle the request. The ASP. Net pages are then loaded into memory and executed. The . Net Framework provides many utilities such as garbage collection, tracing, just-in-time compilation that manages the execution of ASP. Net modules. The ASP. Net page modules are where the CHART mapping application logic is coded. The web server also provides security via the Secured Socket Layer (SSL), allowing interactions between the userââ¬â¢s browser and the web server to be encrypted when necessary. . 5 Security 2. 5. 1 Network Level Security Network layer security will be managed by the network security configurations like firewall and RSA secure ID. 2. 5. 2 Secured Socket Layer (SSL) MDOT has a certificate server to provide digital certificates for the SSL configuration. The server name must remain consistent with the certificate. All links shall use the same server name, otherwise, if the server is referred using an IP address or a local server name, etc. , the user will see an alert indicating the certificate is in-consistent with the resource. IIS supports the configuration of one folder in the web application requiring SSL while other portion does not. The session information remains consistent between SSL portion of the web site and the non-SSL portion. 2. 5. 3 Enterprise User Enters Read-Only View Many of the CHART mapping functionalities are for display and reviewing data, i. e. a read-only view. The design allows enterprise viewers and CHART users to access the read-only portion of the web site without having to input user name and password. This also enables CHART users to reach the viewing area without having to enter their login information again. When system receives a user request to enter the secured area, the system checks whether the current session has been authenticated. If not, system displays login screen. The user shall enter their CHART user name and password. Upon receipt of the user name and password, the system checks it against the CHART II databaseââ¬â¢s user tables. If they are authenticated, the system stores the user information in the session. The session will be managed in the server until the configured timeout expires. All subsequent requests from the same user session will inherit the same authorization information for the user. 2. 5. 4 CHART User Enters Editing Area Other applications, like future versions of CHART II and CHART Lite, can launch the map editing URL via the HTTPS protocol. The user name and password can be sent via https request. The system verifies their authentication information against the CHART II user database using an OLEDB/ODBC connection. If the authentication information is correct, the system will store this information in the session. The user will be redirected to the map page. If the authentication is rejected, the user request will be redirected to the login screen to reenter the authentication information. Associating a CHART user with an op-center/default map view area: Based on CHART II R1B3 database design, users are not associated with an op-center; rather, the user specifies an op-center during logon. In order to display a default map view area based on an op-center, an external application launching the CHART mapping application will also need to pass in the operation center name to initialize the map to the associated extent. Passing user name and password in URL request: The mapping site shall have a module that verifies the user name and password, then forward the page to the map page, hence avoiding showing the password on URL address box. At the current time, without the full integration with CHART II and CHART Lite, the system will expect plain text user name and password. In the future, an encryption/decryption algorithms agreed between the systems can be added to achieve higher security. 2. 5. 5 EORS Security Currently, the EORS security has not been implemented. EORS functions will be hard-coded with security configuration. 3. Network Configuration The design above depicts CHART network configuration as the Internal network, a Demilitarization Zone (DMZ) network for hosting the web server and connecting out to the external Internet network. There will be two firewalls, one between the Internet and the DMZ network and another one between the DMZ network and the internal network. The map server and database servers are to be hosted in the internal network for maximum security. The initial configuration calls for two physical computers to host the map servers and database servers. In the future, if the system needs to scale up, additional physical servers can be added. The Intranet web server can optionally be hosted on the load-balanced virtual server too. 3. 1. 1 Map Server Load Balancing The design achieves load balancing by a combination of Windows 2000 Advanced Server Network Load Balancing (NLB) Service and the ArcIMS Application Server. The system utilizes two physical server computers. The two servers are configured with NLB. NLB works on the TCP/IP level. Any incoming traffic from web server to the virtual server IP address is load balanced between the two application servers by NLB. ArcIMS Application Server operates at the application level, monitoring each spatial serverââ¬â¢s load and operation. When a spatial server is busy, it directs the map request to idling spatial server(s). Each physical map server hosts one ArcIMS Application Server and two ArcIMS Spatial Server instances. An application server failure forces NLB to direct new connections to the remaining application server. When the failed server is recovered, new client connections should once again be shared between the two servers. The two spatial server instances are ââ¬Å"cross registeredâ⬠to the application servers. As shown in the diagram, Spatial Server A1 and A2 are registered to Application Server B and A correspondingly. This arrangement ensures that when a spatial server is down, the application server can still utilize the spatial server from the other server to serve the map request and the application server continue to function. Also, this configuration also allows ArcIMS to load balance at the Spatial Server level as opposed to just the network traffic level, which is what NLB provides. This configuration can withstand an Application Server failure, a Spatial Server failure, a simultaneous Application/Spatial Server failure or hardware failure of one of the physical map servers. Using two map servers with network load balancing should provide high-availability load balanced ArcIMS web site. 3. 1. 2 Database Load Balancing By running two SQL Server and ArcSDE instances with NLB to balance the load, the system can achieve high availability at the database server layer. The database servers are completely independent and share no hardware components. This type of availability is achievable with the standard edition of SQL Server. The two database servers are setup with Transactional replication. One of the two SQL Servers is configured as the publisher and the other one as a subscriber. All the data modification such as insert, delete and update will be performed on the publisher and changes are replicated to the subscriber. Transactional replication can provide very low latency to Subscribers. Subscribers receiving data using a push subscription usually receive changes from the Publisher within one minute or sooner, provided that the network link and adequate processing resources are available (latency of a few seconds can often be achieved). When the web server and map server requests use the virtual IP address on the load-balanced group of database servers, they are directed to the database server with the least amount of load. If one of the database servers goes down due to hardware failure, NLB detects that this server is down and no longer directs database requests to this machine. The remaining machine handles the database requests and apart from a slight drop in performance the users are unaware that a database server has failed. When the hardware is fixed the offending machine can be brought back online. One limitation exists for this design. It happens when the publisher database is down. In this situation the data updates cannot be committed until the publisher database comes back. But at the same time, all read access from the Internet and Intranet server could still be directed to the secondary server. In the case when the publisher data is going to be down for extended time period, system configuration need to allow system administrator to change the configuration so that the replica will serve as the main database. Compared with clustering solution, this system design provides the maximum database availability and performance benefit. The databases that need to be replicated would include: 1. Background map database. Background map data does not change often. A snapshot replication is sufficient for replicating data updates in one database to the other. 2. CHART/EORS Spatial Database CHART/EORS spatial database stores CHART and EORS device and event information with spatial data. They are dynamically updated throughout the day. Transactional replication will be setup to ensure that data change in one database gets replicated to the other one. 3. SDE metadata. In general, the system can continue to provide access of map and data to both the Internet and Intranet users in the case of failure of any one component in the system. The only exception is that when the publisher database is down, the new data cannot be updated into the system. Users will get delayed information. 3. 1. 3 DMZ Configuration CHART is currently implementing a Demilitarization Zone (DMZ) network to enhance the network security. This entails creating a separate network for the web server computer(s) and separating it from the internal network with a firewall. In an ideal world, the DMZ would have no physical connection to the internal network. This would require two separate map server setups to serve the Internet and Intranet users. The recommended way to implement is to disallow any access from the DMZ to the internal network, but allow access from the internal network to the DMZ. In other words, allow out-bound connections. On each of the ArcIMS server computers, mount a network drive to a shared drive on the Web server. Each ArcIMS spatial server would write the output raster image files to the location on the web server to be delivered to the Internet client browsers. 4. Database Organization To reduce the dependency and operation interference between the spatial data and the attribute data, the EORS spatial database and CHART spatial database will be created as two SQL Server databases. To reduce the performance overhead when joining data between the spatial and attribute data, the EORS spatial database will reside on the same database server(s) as the EORS database. Technical Challenges 5. 1 Map Display Mechanism CHART Intranet mapping application requires that changes in event and device data be reflected on all map clients in a near-real-time fashion (within 5 seconds). To do so via the traditional raster map publishing mechanism will result in all clients retrieving updated map every 5 seconds or at least when event/device status update requires a new map to be generated. When there is large number of users of the system, it will result in a high map server load in a concentrated short time period. To resolve this issue, the project team reviewed various technical approaches and summarizes their advantages and disadvantages as the following: 5. 1. 1 Raster (JPEG, GIF or PNG) Image This is a popular approach that utilizes the basic image display functionality of web browsers. It utilizes the server processing power efficiently. The disadvantages are that the images have limited client side intelligence, leaving most of the computation concentrated on the server. Itââ¬â¢s capability of handling large number of concurrent map requests is limited. Generally, one map server can support 4-8 requests per second. For CHARTââ¬â¢s situation, when an event changes status, if a new map image needs to be generated, it would be about 40 requests per second (200 users at 5 second update interval). Many servers will be required to support the load. With the license fee involved with using GIF format, we will not use GIF for map publishing. Compared with JPG format, PNG graphics do not have the ââ¬Å"bleedingâ⬠effect inherent with the JPEG compression algorithm. With the map displaying lines rather than continuous tone images, it is much cleaner. PNG also results in a smaller file, which translates into faster download times for client. The only JPG advantage is server side image generation times. It is recommended to utilize PNG for the Intranet application to produce highest quality images for standardized IE browser while utilizing JPG for the Internet to allow for support of as many browsers as possible. Also, the reduction in image processing time should deliver better web image generation performance. 5. 1. 2 XML Based Vector Graphics 5. 1. 2. 1 Vector Markup Language (VML) VML is a XML based W3C standard in describing vector graphics. Basically, it encodes the vector coordinates of points, lines and polygons in XML format. The support of VML is included in Internet Explorer 5. 0 and later. There is no download needed to display VML encoded vector graphics. It also has built-in support for style sheet and scripting. This makes it possible to modify the display properties and positions of the vector graphics using the JavaScript on the client-side browser. Using this functionality, we can dynamically update the display of devices and events. 5. 1. 2. 2 Scalable Vector Graphics (SVG) Scalable Vector Graphics is another XML-based W3C standard format for vector graphics. Compared with VML, it requires Java or ActiveX based plug-in to be displayed. Also, based on review of the plug-ins (SVG Viewer by Adobe), there is not as much support for scripting as for VML. 5. 1. 3 ArcIMS Java Viewer ArcIMS includes a Java Viewer, which provides a Java Applet that can be customized to a certain extent to display vector encoded GIS data on the client side. It requires a download to the client. The Java Viewer reads vector data from ArcIMS feature server encoded using an ESRI proprietary compression format, which makes it difficult to implement special features such as WSMS offsetted road networks because they need to be offset dynamically based on map scale. 5. 1. 4 MapObjects Java MapObjects Java from ESRI provides a set of Java-based objects for GIS functionalities. It has an extensive set of functionality that can satisfy the requirements. But, it requires a license fee of $100/seat, or comparable server-based licensing. It also requires a download to client machine to run it. 5. 1. 5 Summary Based on the research above, the project team recommends the following design: Use raster map for background map display (background data with SHA grid map are often large amount of data, suitable for server side processing) Use XML data format to transport the device and event data from server to browser client. Use JavaScript to create and update the VML vector data elements to display the dynamic layers including all the CHART/EORS devices and events. The diagram above illustrates the map display mechanism: 1. Map server reads the spatial data from background database and sends the published map image to the client browser to be displayed as background. 2. Device and event information is broadcasted from the CHART II system in the form of CORBA events. 3. CORBA event listener receives the event broadcast and saves the data into CHART spatial database. 4. CHART/EORS device and event data are published in XML format to the client. Client browser parses the XML into a XML Document Object Model (DOM) using the XML parser. 5. The client browser then iterate through the DOM tree structure and create corresponding VML elements based on the XML device and event data. The VML elements are displayed on the top of the background raster map image. 6. At a pre-configured interval, the browser client retrieves update of device and event data from the IIS server in XML format and update the VML display based on the updated information. 5. Automated Refresh of Device and Event Data CHART/EORS device and event information needs to be updated at a pre-configured interval. They should be updated separate from the background map to reduce the load on the map server. The technical approach to achieve this will be to use a hidden frame to send the request to retrieve updated device and event data and receive the response. The response will package the dat a in XML file to be parsed into a document object model (DOM) and display the data on map. The request can be to retrieve all data or only retrieve data newer than last retrieval. When the new device/event is received and it requires changing the display of the device/events, the style assignment for the elements can be changed to update the device and event display. The VML elements will be sent using real-world coordinates (Maryland State Plane 1983). After the data has been retrieved to the client side, the VML map layers can be dynamically projected using the ââ¬Å"local coordinate spaceâ⬠. When user zooms or pan the map, the VML will be projected using the updated coordinates to fit the new map extent without going back to the server to retrieve new data set. 5. 3 Inter-Frame Client Script Synchronization The map page has a few frames and the browser loads them asynchronously. Scripts in one frame may call scripts in another frame that may not have been loaded. The approach to resolve this is to add client-side exception handling and verification routine to ensure that the script is called always after the frame is loaded. 5. 4 Assigning and Editing Event Location The dynamic nature of VML elements in the browser allows adding and modifying VML elements by scripting. When the user clicks or drags the mouse on the map, client-side script manages the transformation of screen coordinates and real-world map coordinates. The coordinates are sent back to the serverââ¬â¢s secured URL where the information is extracted and saved to the database. 5. 5 Scalability The CHART mapping application serves not only the Intranet users, but also Internet browser clients. During emergency situations, the load on both the Internet and Intranet servers could get extremely high. The system must be able to scale up to serve large amount of users. The technical approach to solve this issue involves two main facets. As described in the network configuration section, the system will employ network load balancing and allows adding additional hardware in the future. The system should also be able to utilize the caching feature of IIS and ASP. Net to scale up without significantly increase hardware investment. ASP. Net allows caching configuration for individual page modules, such as whether the page is cached and how long it is cached. After the application is deployed, these caching settings can be configured on the web pages. For example, if it is determined that the Internet mapping can be up to 3 seconds late, by setting caching time to 3 seconds, all requests from the Internet will receive a cached response without creating additional load on the map and database server. . Exception Management and Recovery CHART II keeps its clients updated via a push model using the CORBA Event Service. The Event Service does not guarantee delivery; therefore it is possible for event data to be lost/dropped (although in practice, this is rare). To account for this possibility, the CHART Web Event Listener will refresh its information about the status of devices and traffic events from CHART II at a configurable interval. Also, each time the Event Listener is started, it will retrieve all relevant data from CHART II. Thus, the update model becomes a push model with an occasional pull to be safe. This process will be used to recover from the following situations: 1. The Event Listener was down and did not receive new data from CHART II. 2. CHART II CORBA event(s) occasionally dropped while the Event Listener is up and running. Another likely scenario is that the CHART II server or service(s) restart. After a typical restart, the CORBA Event Service CORBA objects will be recreated with the same characteristics allowing the Event Listener to continue to automatically receive CHART II CORBA events. As the CHART II services will not be processing events during this time, no events are likely to be missed. Therefore, the Event Listener does not need to do anything special to handle a CHART II server or service(s) restart. Sometimes CHART II maintenance will require that new (and different) Event Service CORBA objects be created. This might happen during a CHART II upgrade, for example. In this case, the Event Listener will need to be restarted so that it can pick up the new objects. Since this type of maintenance does not occur often and the Event Listener restarting is fast, the restart can be handled as part of the CHART II upgrade procedures. 5. Integration with ASP Code in EORS and CHART Web Application The CHART Intranet Mapping, replacing the existing EORS mapping application, will still be launched as a separate window by a URL string with a few parameters identifying the district, view type, etc. The impact on EORS web application should be limited to modifying the URL links. The current CHART Internet Mapping site uses ââ¬Å"includeâ⬠statement to include site navigation pages from upper level CHART web siteââ¬â¢s pages. When upgrading Internet Mapping to ASP. Net, ââ¬Å"includeâ⬠statement is no longer used. Instead, a ServerXMLHTTP request can be formulated to request the text from the included ASP page and merge them into the mapping ASP. Net pages. The limitation of this implementation would be that the ASP. Net application couldnââ¬â¢t share the session and application variables from the ASP application. Currently, there are only a couple of them, such as database connection string. The ASP. Net mapping application will maintain a separate set of application variables. 6. User Interface Design 6. 1 Intranet Map Site User Interface Design Here following is a high-level frame structure for the Intranet mapping site: 1. AppFrame is the highest-level frame that includes all the child frames. On the top of the page, there will be the title frame, which will host the CHART icon. Also inside the title frame will be a group of tabs, such as Traffic, Roadway Weather, Message Sign, etc. 2. ToolsFrame hosts the map navigation and other map related tools. The ToolsFrame will also host menu system that allows the user to bring up data and other detailed information. 3. HiddenFrame will be used to submit and receive information from the server. 4. ContentFrame is further divided to a map frame on the left and a data frame on the right. The user shall be able rearrange the frame boundary to give more space to the map or data area. Data frame will display data as well as legend, layer control and other items when needed. 5. PromptFrame will display the current tool selected and instructions for user activities. Here is a screen shot of the preliminary user interface design.
Friday, March 13, 2020
Beauty and the Beast essay
Beauty and the Beast essay Beauty and the Beast essay Beauty and the Beast essayThe scene depicts the miraculous environment surrounding Belle when the dishes prepare a lavish dinner for her. From the beginning of the scene the presence of miracle is obvious as the candle is depicted in the light following downward from the ceiling. Miraculously all the dishes jump, flow and sing preparing the dinner for Belle. Belle is apparently admired and fascinated since she has not expected such a miracle, which though is the characteristic of Disney animation films. The miracle makes Disney films attractive to children as the target audience but, on the other hand, such miracle is so strong that attracts even the adult audience.At the same time, the scene is accompanied by a song ââ¬Å"Be Our Guestâ⬠which is the ultimate manifestation of the hospitality. In such a way, the scene contributes to the formation of the positive attitude of the audience and shows how the main character of the film is absorbed by the atmosphere of hospitality. Th erefore, the scene shows that the main character turns out to be in a miraculous place, where she is surrounded by friendly dishes and all the environment, where Belle is, seems to welcome her. Such a combination of the miracle and the hospitality is very attractive for the audience. Thus, the scene conveys the traditional Disney spirit associated with the miracle that was always attractive for the audience and what the audience expects from Disney films. In such a way, the short scene is rich in thematic messages that the film conveys to the audience, while its miraculous style is the distinct feature of Disneyââ¬â¢s films.
Wednesday, February 26, 2020
Educating Rita movie Essay Example | Topics and Well Written Essays - 750 words
Educating Rita movie - Essay Example Rita became ambitious after studying literature. IV. Third Argument: Literary education provides a path for self-discovery enabling us to identify our needs and meet them. V. Fourth argument: Literary education can benefit anybody in ending ignorance. It changed Rita from an ignorant woman to a confident sophisticated woman. VI. Counter Argument: Opponents of literary education as beneficial to anyone would argue that it altered Ritaââ¬â¢s social life negatively. However, it was because of the husbandââ¬â¢s ignorance that the marriage failed to work. VII. Conclusion: In conclusion, the play Educating Rita depicts that literary education change anybodyââ¬â¢s life positively. It changes Rita from illiterate, ignorant woman, studies literature. She eventually becomes transformed into an ambitious confident woman. Everybody Can Benefit From a Literary Education Introduction Educating Rita is a play that revolves around a woman by the name Rita, who aspires to get educated and al ter her social class. In the same play is another character by the name Frank, who is Ritaââ¬â¢s tutor, educated but appears disinterested with life. Throughout the play, Rita views education as the only path towards change. This makes education one of the major themes in the play. Literature characterizes the statues of the people living in a given society. Therefore, the kind of literature written by people living in a given society can be used to study that society. In the play Educating Rita, there is clear depiction of how the society perceives different aspects of life. Therefore, literally education can help anybody understand a given society without having to live within that society. For example, through studying this play, we are able to understand the society that Rita was living in. we experience that hardships that she had to undergo in her daily life. People living in a similar society can benefit from this literally study and learn how they can deal with their chal lenges and succeed in life. This essay argues that everybody can benefit from a literary education. Literary education has great magnitude of bringing positive change in our lives. In the play, education contributes greatly in bringing change in Ritaââ¬â¢s life. Although the change may not be instant, it may take time but it can eventually alter the life of everybody who takes literature studies positively. Education molds the way we view things. In case of Rita, she starts of as an illiterate girl who barely understands anything. She is working as a hairdresser with little understanding of the world. Little by little, she becomes knowledgeable and sophisticated. Therefore, literary education is capable of benefitting everybody who undertakes it (Russell 2-6). Everybody can benefit from education since it enables us to set and achieve goals. Rita starts of as poor girl struggling financially with little education. Her main obstacle is her inability to communicate effectively. Her accent and poor mastery of language makes her feel out of place while among other students. She can barely suit in the school. However, as she continues with her education, she becomes motivated, confident, and ends up having achieved most of her goals. When she achieves in her literature studies, Rita realizes her capability and gains confidence that she could achieve in her life. Communication skill plays a major role in education. Therefore having good mastery of literary education
Subscribe to:
Posts (Atom)