.

Tuesday, April 2, 2019

African Insurgency Groups: Causes and Responses

Afri base insurgence Groups Ca gives and ResponsesDaniel SilbersteinIn response to a spate of violent attacks from the Kenyan dandy to the coast President Uhuru Kenyatta has decreed that they go out non flinch in fight against terrorists, specific completelyy against the Al-Shabaab militant group headquartered in Somalia. His publicly declargon position of a robust, aggressive, and continued response against what he refers to as an, extremist caliphate intent on asserting dominance in the region, is certain to be met with both solidarity and criticism amongst Kenyans, Afri bases, and the world-wide familiarity. Nigeria, home to Africas largest economy ( check to an April BBC report) a cargon finds itself on the brink of a larger contrast. Flanked by militant insurgency, attributed broadly speaking to the Boko Haram, in the north and the new capital of piracy on its gray shores. The reverbe balancens of these conflicts atomic number 18 uncertain. But, in order to forese e, and perhaps assuage, the consequences of this campaign, and to limit the devastation we atomic number 18 same(p)ly to witness, it is paramount that inter soilal interjections adapt and correlations be drawn betwixt this procession contention and contemporary conflicts that define modern warf ar.Firstly, this should non be perceived as merely a symptom of the popularized narrative of another(prenominal)(prenominal) Afri sack affliction. This is to say that, historic all in ally, aggressions were relatively limited in regional scope. This does not downplay the reprehensible past conflicts in Africa the horrors of genocide such as Rwanda, Darfur, etc. and entrenched prolonged warf are such as Mali, parliamentary Republic of Congo, etc. This is simply, and necessarily, to illustrate that the ramifications of warfare in Africa is rapidly sui panel a global hazard.The overwhelming contribution to this crises so far? M unmatchedy, and kind of literally tons of it. A 2009 WS J article by Dambisa Moyo estimated over $1 trillion in fact. So, while the hopes of assisting in curtailing violence and degradation in the region arrest existed for decades, through extraneous aid and, military and governmental partnerships, it is apparent that the structures in buttocks for facilitation and carry offment have fai guide to meet expectations. The stream governance of aid in Africa has become almost farcical. Broad strokes of care have missed the label at best and have been actively harmful at worst. Much of the governmental fixtures that have grown from the influx of poorly distributed aid have actually stifled the genuine distribute of their respective constituencies. Political institutions have propagated mostly as middle-men, profiteering from the flow of aid. In 2013, Transparency International placed all but five sub-Saharan nations on the bottom half of its corruption rankings list. A new execute of put to death is imperative to foster safe and aug ment economic outgrowth. A discourse about the patronage of wealthy nations in intelligent intervention and investment is becoming more and more vital.That being said, undeterred by turmoil Africa is on the verge of a new day. Racked between geo-political vestiges of imperialism and penetrable as capability prey to an aloof globalized economy, the region has desperately been want for a foothold of stability since the end of WW2. Despite a gridlock of corruption, sectarist violence, and humanitarian disasters, this century is poised to see Afri croupe nations propelled into an elevated global status, both politically and economically. Countries like Botswana, Angola, and galore(postnominal) others are experiencing an enormous growth in their middle-class sectors, which according to The Economist is projected to equal Indias middle-class sometime in 2015. While not the equivalent of the western sandwich standard for middle-class this, consumer base provide exponentially increas e the marketability and wreak of Africas economic bids. The consequences of increased economic pertinence is apparent throughout. A budding group of billionaires speckle the continent, twenty-nine in fact according to Forbes in March. This is up from twenty alone one year earlier. Granted, m both(prenominal) are South Afri sack or hail from Northern Africa, countries not normally framed with Sub-Saharan Africa, but the proximity itself imparts salience. While operational and profi panel large rake of workes formulate, along with a stable middle-class, m all Afri loafer nations governments are beginning to politically mature. Even pockets of success from more wide-awake aid programs exist, curiously with micro-grants and loans to ground-level Afri bunghole entrepreneurs, demining initiatives, and the proliferation of educational opportunities.Considering Africas historical failures, and a perhaps tenuous grip upon a wave of rapid growth, what are the right arranges to best assistant oneself peace and stability? The necessity of foreign aid and intervention still exists. Reevaluating the distribution and access of aid, and developing wise intervention strategies to comply with measurable outcomes is the whole hope for these nations to surmount the order of adversity that haunts the continent.Invariably, it seems to me, certain criteria mustiness be met before a nation erect hope to flourish security and stability, transparency and accountability, and the development of business and infrastructure. While these guidelines are by no means exclusive of one another, nor strictly chronological in implementation. However, some semblance of this order is indispensable, especially considering the familiar detachment of government policies to the populations they consider. The regression of the security situation, especially Nigeria and Kenya the rising stars of self-reliance, threatens to derail these upwardly mobile countries by the rattling palpa ble potential of a conflict whose scope give the bounce well exceed some(prenominal) in Afri give the bounce history. The most significant distinction of this rising conflict are the attachs to a well-funded and ambitious international terrorist culture. Though parole is inherently faulty when evaluating extremist groups, links between African insurgency groups and effectualations like Al Qaeda and (if not already, certainly soon) ISIS are all but assured.In light of emerging conflicts with borderless extremist organizations, and new appoint wealth, African defense budgets have soared 65% since 2004, according to The Economist, greater than any other region in that time frame. Almost without fail, since the onset of the snappy War era, ballooning defense budgets are ofttimes indicative of impend crises, not only in basis of violence but in the cessation of civil liberties and international instability. To ameliorate this the sale of materiel must follow a strict and discr iminatory guideline. This is why the international club must be cohesive and cognizant, even apprehensive, as Kenya and Nigeria embark on their very own War on Terror. Unfortunately, the profit brink for manufacturing in the lucrative arms market is quickly establishing a place in Africa. The same Economist article divulged that four major European arms manufacturers have set up African subsidiaries this year. These leave behind no doubt become economic boons but they carry with them the response time of war.One of McNamaras lessons becomes relevant, Proportionality should be a guideline in war, indeed both in the manner in which it is waged and in the prevention of collectless aggression. Problems arise with inflated military spending, the accessibility of war and the plainlyification of expenditures compels nations to treat every problem like a check with the hammers of automatic rifles. This is the often overlooked criticism of sack warfare. They are often more precise, sinless, and less apt to error than manned machines. A drone pi corporation in Nevada, overseen by hordes of high-ranking officials and lawyers, is less vulnerable to un make waterd survival instincts and rash decisions. However, accessibility draws us into conflict. When the fear of casualty counts are not smeared on news broadcasts, a sense of invulnerability obfuscates wisdom. In the face of a ravenous enemy it is understandable, though undesirable, that one seeks safety behind the acquisition of arms and muzzle flashes.Some strides have been do in anticipation of incautious military action. The U.N.s Forward intervention Brigade and African Union Peacekeepers have had success in presenting a unified front the term coalition should be repressed these days to avoid negative connotations. These organizations as well lend some transparency to unilateral trading trading operations and a more honest assessment of the aftermath of military operations. ostensiblyly these method s of waging war are by no means faultless, it is a standard in the right direction. Mutual policing forget be fundamental in preventing atrocity.Andrew Muzonzini, the lead for Zimbabwes external intelligence agency offers a advanced insight in a Business Insider Article that is in line with the appropriate set out, Ahead of time, we should seek to understand (the Islamic State) modus operandi if we are to ge solid ground and predict challenges ahead. This conclusion, hopefully shared amongst the milieu of African politics, go out (hopefully) be indicative of a circumspect and deliberate course of action to repel extremist behavior. A strong internal defense approach combined with precisely defined and rigidly tailored tactical excursions, targeting only locally substantiated objectives, should be the tenets of this nascent conflict. The global community chooses to facilitate such equitable actions. More valuable than financial guard, more accurate than high-tech weaponry, we must impart the lessons of an ineffective and prolonged conflict. The manner in which we defend ourselves should not be so broad as to give up us from the world at large. Africas Muslim populations safety must be assured. Sovereign nations must not be disaffected. And perhaps in the end Africa may edify the global community on how to maintain morality when confronting monsters.What is Online Examination remains?What is Online Examination establishment?Online mental tests, sometimes referred as e- testings, are the mental testings conducted through the internet or in an intranet (if within the Organization) for a contrary panorama(s). Most of the interrogative sentences issue takes as the prospect finish the trial runination, when there is an upshot processing module as well admit with the frame.They can be utilise to efficiently evaluate the expectation thoroughly through a fully modify carcass that not only pull rounds lot of time but also gives fast results.F or students they give writing according to their whatchamacallit and time and there is no use up of use extra thing like paper, pen etc.These trial runinations are conducted as open-book quality mental testinginations. Candidate is given a limited time to answer the suspenses and after the time expiry the answer paper is disabled automatically and answers is sent to the examiner. The examiner testament evaluate answers, either through automatise process or manually and the results will be sent to the candidate through email or made available in the meshing site.Today umpteen organizations are conducting online examinations worldwide successfully and issue results online. on that point are advantages and disadvantages in online examinations. The main advantage is that it can be conducted for remote candidates and military rank of answers can be fully automated for Multiple excerpt heads and other essay type wonders can be evaluated manually or through automated or ganization, depending on the nature of the questions and the requirements. Also online examinations can be conducted at any time and does not incur higher equal as traditional exam scenario as there is no paper work involved(eg printing exam papers, prepare paper admissions etc) , there is no invigilators, also no need of arrangement of exam centers. When comparing with traditional exam scenario the cost for an online examination will be almost vigour after the online exam strategy is establishment and if maintenance cost is not considered.The disadvantage of the e-examination is the inability of invigilating. There are methodologies apply in these examinations, when registering candidates and manifestation of questions, so that to test candidates k at a timeledge and skills. However with a limited time, candidate is not capable of totally depend on the reference materials or a supporting person.AIM OF THE designThe aim of this project is to develop an online examination arra ngement by applying software engineering principles and best practices. The formation will be built utilise popular burnt umber/J2EE net technologies and framework available for wind vane development. The system will be knowing to be scalable, secure and robust.The online examination system will help in speeding up the process of conducting examination. T distributivelyers will be able to shape examinations by composing a set of questions. The questions can be quadruple choice questions or single (text) answer question. The system will have the ability to automatically process the results of examination found on the question informationbase. The system will have intelligent capabilities to mark the text based answers not only when there is an exact match, but it will also pull in similar answers by finding the synonyms of the words employ in the answer. The system will also provide manual override distinction where in the instructor can manually mark or modify the res ult for an exam. The system will also have the capability to fasten on the examination from last free point, i.e., a student can wear the examination in the middle and can start again at any other time. When the student will start the same examination again, the exam will start from the same point where it was stopped.The system will present a easy to use interface for Teachers, Students and Administrators. Once logged in, students will be able to see the examinations due and can take the examination.CHAPTER 2 BACKGROUND RESEARCH AND ANALYSISEVALUATION OF testingINATION SYSTEM authorship -Based ExaminationPaper -based examination are carrried out on unflinching days and according to a fixed schedule. Therefore, the absentees rarely have another chance to take up the exam again. Moreover, they involve a lot of paper work (e.g. printing of exam papers, arranging answer sheets, etc ). The evaluation of these exam is also very tedious job,after the students complete their exams, t heteacher has to mark each paper manually and then consolidate the result. This process is very sticky and takes a lot of time and hard work. weave- Based ExaminationWith the offset of online examinations, the World Wide Web opens up the possibility of giving the exams online.The online examination system helps in speeding up the process of conducting examination. Teachers will be able to create examinations by composing a set of questions.The system will have intelligent capabilities to mark the text based answers not only when there is an exact match, but it will also recognize similar answers by finding the synonyms of the words use in the answer. The system will also provide manual override feature where in the teacher can manually mark or update the result for an exam.The system will also have the capability to resume the examination from last save point, i.e., a student can stop the examination in the middle and can start again at any other time. When the student will start the same examination again, the exam will start from the same point where it was stopped.The system will present a easy to use interface for Teachers, Students and Administrators. Once logged in, students will be able to see the examinations due and can take the examination.TECHNOLOGIES RESEARCHWeb activitys are either dish lie or presentation oriented. A presentation oriented web application involves generally mark up languages (e.g. XML and hypertext mark-up language) with dynamic contents responding to requests. On the other hand, a service oriented web applications implements the endpoint of the web service. Below is an abbreviation on Postgres, hole up, squinch and wicket gate used to implement my project.POSTGRESPostgreSQL is an object- relative database solicitude system (ORDBMS) based on POSTGRES,Version 4.2 (http//s2k-ftp.CS.Berkeley.EDU8000/postgres/postgres.html), developed at the University of California at Berkeley computing device Science Department. The POST GRES project, led by Professor Michael Stonebraker, was sponsored by the Defense Advanced Research pop the questions billet (DARPA),the Army Research Office (ARO), the National Science Foundation (NSF), and ESL, Inc.PostgreSQL is an open-source descendant of this original Berkeley code. It provides SQL92/SQL99language support and other modern features.POSTGRES pioneered many of the object- relative concepts now becoming available in somecommercial databases. Traditional relational database management systems (RDBMS) support a data determine consisting of a exhibition of named relations, containing attributes of a specific type. In topical commercial systems, possible types include floating point numbers, integers, character strings, money,and dates. It is commonly recognized that this model is incapable for future data processing applications. The relational model successfully replaced foregoing models in part because of its simplicity. However, as mentioned, this simplicity often makes the implementation of certainapplications very difficult. Postgres offers substantial additional power by incorporating the following additional concepts in such a way that exploiters can easily extend the system inheritance data types functionsOther features provide additional power and tractabilityconstraintstriggersrules motion integrityThese features put Postgres into the category of databases referred to as object-relational.SPRING bouncing FeaturesSpring is a layered coffee/J2EE application platform, based on code published inExpert One-on-One J2EE practice and ontogenyby Rod Johnson (Wrox, 2002).Spring includesThe most complete lightweight container, providing centralized, automated phase and wiring of your application objects. The container isnon-invasive, capable of assembling a tangled system from a set of loosely-coupled components (POJOs) in a consistent and filmy fashion. The container brings agility and leverage, and improves application testability and scalability by allowing software components to be first developed and tested in isolation, then scaled up for deployment in any environment (J2SE or J2EE).A common stimulus generalisation layer for transaction management, allowing for pluggable transaction managers, and making it easy to demarcate transactions without dealing with low-level issues. Generic strategies for JTA and a single JDBC DataSource are included. In contrast to plain JTA or EJB CMT, Springs transaction support is not tied to J2EE environments.A JDBC abstraction layerthat offers a meaningful exception hierarchy (no more pulling vendor codes out of SQLException), simplifies error handling, and greatly reduces the amount of code youll need to write. Youll never need to write another finally block to use JDBC again. The JDBC-oriented exceptions comply to Springs generic wine DAO exception hierarchy.Integration with Toplink, hole up, JDO, and iBATIS SQL Maps in terms of alter autochthonic holders, DAO impl ementation support, and transaction strategies. First-class Hibernate support with lots of IoC convenience features, addressing many typical Hibernate integration issues. altogether of these comply to Springs generic transaction and DAO exception hierarchies.AOP functionality, fully integrated into Spring configuration management. You can AOP-enable any object managed by Spring, adding aspects such as declarative transaction management. With Spring, you can have declarative transaction management without EJB even without JTA, if youre utilize a single database in Tomcat or another web container without JTA support.A flexible MVC web application framework, built on union Spring functionality. This framework is highly configurable via strategy interfaces, and accommodates multiple posture technologies like JSP, Velocity, Tiles, iText, and POI. Note that a Spring middle tier can easily be combined with a web tier based on any other web MVC framework, like Struts, WebWork, or Tapest ry.HIBERNATEHibernate is popular open source object relational chromosome mapping hammer for Java platform. It provides powerful, ultra-high performance object/relational labor and question service for Java. Hibernate lets you develop persistent classes following common Java diction including association, inheritance, polymorphism, composition and the Java collections framework. The Hibernate Query Language, designed as a minimal object-oriented extension to SQL, provides an elegant bridge between the object and relational worlds. Hibernate also allows you to express queries apply native SQL or Java-based Criteria and pattern queries. Hibernate is now the most popular object/relational mapping solution for Java.Hibernate maps the Java classes to the database tables. It also provides the data query and convalescence facilities that significantly reduces the development time. Hibernate is not the best solutions for data centrical applications that only uses the stored-procedu res to implement the business logic in database. It is most efficacious with object-oriented domain modes and business logic in the Java-based middle-tier. Hibernate allows transparent labor that enables the applications to switch any database. Hibernate can be used in Java Swing applications, Java Servlet-based applications, or J2EE applications victimization EJB session beans.Features of HibernateHibernate 3.0 provides three full-featured query facilities Hibernate Query Language, the newly enhance Hibernate Criteria Query API, and enhanced support for queries expressed in the native SQL dialect of the database.Filters for working with temporal (historical), regional or permissioned data.Enhanced Criteria query API with full support for projection/aggregation and subselects.Runtime performance monitoring via JMX or local Java API, including a second-level cache browser.Eclipse support, including a rooms of Eclipse plug-ins for working with Hibernate 3.0, including mapping cou chor, interactive query prototyping, lineation reverse engineering tool.Hibernate is Free under LGPL Hibernate can be used to develop/package and distribute the applications for free.Hibernate is scalable Hibernate is very performant and due to its dual-layer architecture can be used in the clustered environments.Less modernizement Time Hibernate reduces the development timings as it supports inheritance, polymorphism, composition and the Java Collection framework.Automatic Key generation Hibernate supports the automatic generation of primary key for your.JDK 1.5 Enhancements The new JDK has been released as a preview earlier this year and we expect a remit migration to the new 1.5 platform throughout 2004. While Hibernate3 still runs perfectly with JDK 1.2, Hibernate3 will make use of some new JDK features. JSR 175 annotations, for example, are a perfect fit for Hibernate metadata and we will embrace them aggressively. We will also support Java generics, which basically boils do wn to allowing type safe collections.EJB3-style continuity operations EJB3 defines the create() and merge() operations, which are slightly contrary to Hibernates saveOrUpdate() and saveOrUpdateCopy() operations. Hibernate3 will support all four operations as methods of the Session interface.Hibernate XML binding enables data to be represented as XML and POJOs inter alterably.The EJB3 draft specification support for POJO persistence and annotations.WICKETFeaturesSwing-like OO Component Model Pages and Components in Wicket are real Java objects that support encapsulation, inheritance and events.Ease of Development Because Wicket is Java and hypertext mark-up language, you can leverage what you know about Java or your best-loved HTML editor to write Wicket applications.Separation of Concerns Wicket does not mix markup with Java code and adds no special syntax to your markup files. The worlds of HTML and Java are parallel and associated only by Wicket ids, which are attributes in HTML and Component properties in Java. Since Wicket HTML is just HTML and Wicket Java is just Java, coders and designers can work singly to a large degree and without relying on any special tools. cover Wicket is secure by default. URLs do not expose cranky information and all component paths are session-relative. Explicit steps must be taken to share information between sessions. There are plans for the next version of Wicket to add URL encryption to support highly secure web sites.Transparent, Scalable Clustering concentrate All Wicket applications will work on a cluster automatically and without additional work. Once bottlenecks are understood, Wicket enables tuning of rascal state replication. The next version of Wicket will support client-side models for zero-state scalability.Transparent tush Button Support Wicket supports configurable foliate version management. When substance ab drug exploiters submit a form or follow a link from a page they accessed with the bac k button in their browser, Wicket is able to revert the page object to the state it was in when the page was originally rendered. This means you can write web applications that support the back button with very lowly work.Multi-tab and multi-window support Wicket provides an easy way to write application that supports multi-window and multi-tab physical exertion allowing developer to react properly when users open new browser window or tabReusable Components Reusable components in Wicket are particularly easy to create. Not only can you extend alive components with the Java extends keyword, but you can also create Panel components which associate a group of components as a reusable unit.Simple, Flexible, Localizable reach Validation It is picayune to write and use validators in Wicket. It is also quite easy to customise and localize the display and content of validation error messages.Typesafe Sessions Wicket eliminates the need to manage HttpSession attributes by hand. Pa ge and component objects are transparently stored in the session and your application can create a custom session subclass with typesafe properties as well. All objects stored in the session can automatically go in in clustering replication.Factory Customizable Wicket is very extensible. Most operations are customizable through factories or factory methods.Detachable Models Model objects in Wicket can be very lightweight in terms of memory and network use in a cluster. When a model is used, it can attach, populating itself with information from persistent storage. When the model is no longer in use, transient information can be reset, reducing the size of the object. sharpness Components Wicket Border components enable the decoration of pages in a reusable fashion. This is especially useful for inheritance of common navigational structures or layout.Support for All Basic HTML Features Wicket supports image tags, links, forms and everything else that youre used to using in your web application development.Programmatic Manipulation of Attributes Wicket Components can programmatically change any HTML tag attribute.Automatic Conversions Once a Form validates, the model can be updated using Wicket converters. Most universal conversions are built-in and it is easy to write new converters.Dynamic Images Wicket makes image use, sharing and generation very easy. Dynamic images can be created by simply implementing a paint method.Pageable ListView ListViews in Wicket are extremely powerful. You can nest any kind of component in a ListView row, even other ListViews. PageableListView supports navigation links for large lists. tree Component Out of the box tree component for navigating and selecting nodes.Localization HTML pages, images and resource strings can all be localized.CHAPTER-3 REQUIREMENTS AND SPECIFICATIONSThe requirement analysis stage consists in collecting and analyzing information about the part of the organization that is supported by the appli cation.This information helps us to identify the users requirements for the new system. This will enable us to define the various functionalities of the new system. The identification of the requirements is eventful as a system with incomplete functionality can lead to a project failure.3.1 DATA GATHERINGUSER IDENTIFICATIONUsers of the system can be categorized as StudentTeacherAdmin(Administrator) structural REQUIREMENTSThe system aims to be an improvement on the living one, the paper based system by Fully automated system.Less time and effort consuming.Database should be well maintained with well structured database tables.The system should be scalable. exit student and teachers to view the available exams.Allow student and teacher to view label.Allow admin to manage the user system and exam systemNON FUNCTIONAL REQUIREMENTSSecurity Each user is required to log into the system. This is done using a valid username and password. login and password should be kept secret.Reliabil ity The system would be used by more than 200 students in the Computer Science Department, which includes academic and administrative staff. The system should ensure minimum downtime and be able to handle multiple requests.Ease of Use All the user screens should be easy to use and intuitive. Contact details should be provided in order to get in touch with the administrator.Scalability It is possible to extend the current features for future use of the system.Performance The system should have a quick response time .DOMAIN REQUIREMENTSSpecific functionality provided to the Admin get laid User System Admin can create a new user. Activate/ discharge an existing user.Admin can delete and edit a user.Manage Examination Admin can edit an exam and cite exam to students. Admin can activate/deactivate any exam. Admin can also delete an exam.Specific functionality provided to the TeacherManage Examination Teacher can create a new exam, edit existing exam. arrive at questions is one o f the important functionality. Question can be textual or it can be single/multiple choice. tick Exam Teacher can do the marking of the exam either manually or it can be automated.Specific functionality provided to the Student practice Exam Student can answer the exam depute.View office Student can view the point of a question. He can also view his marks in a particular exam.PROJECT PLANNINGTask no.Task NameDuration(days)Comments1Project Proposal4Deadline 30th September 20102Requirements SpecificationsOngoing get word the users needs.3Research For technologies required by the systemOngoing check over the technologies to be used, the data structure.Identify important features which can be apply to the project implementation.4Architectural DesignOngoingDefine different layers of the system and apply appropriate technologies to each layer.5Database Design4Apply Database schema provided by the School IT support team. Add necessary tables and relationships between them to make th e application functional.6Prototype3Design Mock Interfaces of the application.7First Inspection1 spark on 10th October 20108Design Model7Class Diagrams time Diagrams9Coding Phase28It will include connections to the database server. Develop the interfaces. And implement the functionalities of the system.Deadline 10th December 201010 rivuleting5Test all the features of the web application.11Final Inspection1Start on 20th December 201012DissertationOngoing salvage the dissertation.13Dissertation Submission1Deadline 7th January 2011CHAPTER-4 SYSTEM AND DATABASE design4.1 DATABASE DESIGNTable NameDescriptionAnswerAnswer table is used to save all answer of student and right answer of teacher for each questionconfigurationConfiguration is used to save configuration information such as term condition, mark ratioExaminationExamination table is used to save examExamuserExamUser table is used to save userQuestionQuestion table is used to save questionRoleRole table is used to save role infor mationstudentexaminationStudentExamination table is used to save the students which are appoint a particular exam. One student can have many examination and one examination can belongs to many students.user_roleUserRole table is used for linking many-to-many relationship between user and role.4.2 SYSTEM FUNCTION DESIGNAt the start of the application , a accept Page is displayed. On the go away side there are three buttons namely Home, help oneself and Log in.To log into the application , the user has to press the log in button.It displays a login page.The user is prompted to enter a username and a password. Any wrong login using invalid username and password will generate error message requiring the user to try again.During the user authentication check, the system will determine the type of user (admin, student,teacher) and redirect the user to the correct page with appropriate features.ADMINPAGEIf the user logged in is admin, then Adminpage shows up. It has the following links Manage Examination Admin can manage the Examination System. It can view all the examinations created. The Admin can assign students the exams.Manage User Admin can manage the User System. This is used to manage the user data. Admin can create a new user, edit an existing , delete a user, enable / disable a user.Configuration This is used to change the configuration of the exam like terms conditions and the marks ratio. post OF ADMINCREATE USERWhen the admin opts to create a new user, he inputs the user information like firstname, lastname, e-mail , username, password, course, role in the user management system.There it is checked whether the user exists or not, and the user information entered is valid or not.If it is valid it is salve into the database.Otherwise, an error message is displayed.ACTIVATE/ muster out A USERAdmin can activate/deactivate any user.For this admin chooses a user from the user system, activate/deactivate the user.Then save it into the database. direct mental testINATIONAdmin can assign a particular exam to students.Admin can activate or deactivate any exam.TEACHER PAGEIf the user logged in is teacher, Teacherpage shows up. It has the following links Manage Examination This is used to manage the existing exams in the database. A teacher can edit exam, create questions for a particular exam, view questions of a exam and mark a exam manually.Create Question This is used to create question. A question can be textual, single choice or multiple choice. A teacher can also edit the existing questions in the database.Create Examination This is used to create a new exam.Help This is to help the teacher in creating a question.ROLE OF TEACHERCREATE EXAMWhen the teacher opts to create an exam, he inputs the exam name, duration of the exam, description of the exam, mark type into the exam system.There it is checked whether exam name exists or not, duration of the exam is valid or not.If all is valid it is saved into the data base otherwise an error message is returned back to the teacher.A teacher can also edit the existing exam in the database.CREATE QUESTIONWhen the teacher opts to create a question for an exam.He chooses the exam from the exam system and creates a question for it.In the question management system it is checked whether the question content is correct or not.If it is correct, it is saved into the database otherwise an error message is returned to the teacher.MARK MANUALLYWhen the teacher opts to mark an exam manually, he chooses the exam to be marked from the exam system.He iterates each question and marks them.Then he saves the marks into database.STUDENT PAGEIf the user logged in is a student, studentpage shows up. It has the following link View Point This is used to view the point assigned to a particular student.Answer Exam This is used to answer the exam assigned to the student.ROLE OF STUDENTVIEW MARKSA student can view his marks in any exam .ANSWER AN EXAMA student can answer any particular exam assigned to him. He can view point assigned to a question also.INTERFACE DESIGNFigure Welcome ScreenThis is the Welcome Screen of our application. On the left hand side there are three buttons Home, Help, Log in. These enable the user to get to Home Page, Help and Log in helps the user to get logged into the system.The same header and pedestrian will be applicable to every page to preserve the union and integrity of the application.We use the ApplicationContext.xml file to define some Java beans like dataSource, SessionFactory, etc so that we can retrieve them in the application. In this way we can reimplement the classes and use alternatively different implementations by just changing the configuration in the ApplicationContext.xml file.Once you have a sessionfactory, your application asks the factory for a session. Your application will use Hibernate sessions to manage the persistent objects.An application context configuration file is created for the entire application n amed applicationcontext.xmldestroy-method=close$hibernate.dialect$hibernate.show-sql$hibernate.hbm2ddl-autoI need to define a web.xml FilecontextConfigLocationclasspathapplication-context.xmlclasspathsecurity-context.xmlorg.springframework.web.context.ContextLoaderListenerDeploying the application will create a database called exam as shown below in the FigureCHAPTER 5- IMPLEMENTATION AND scrutinyAPPLICATION IMPLEMENTATIONCreate User By AdminCreateUser.java draw firstName = firstNameModel.getObject() drag lastName = lastNameModel.getObject() draw and quarter email = emailModel.getObject()String course = courseModel.getObject()ExamUser user = new ExamUser()user.setUsername(username)user.setPassword(passwordEncoder.encodePassword(password, null))user.setFirstName(firstName)user.setLastName(lastName)user.setEmail(email)user.setCourse(course)String selectedRoleName = roleModel.getObject().trim()userService.createUser(user)Manage User By AdminManageUser.javaList columns = new ArrayList( )columns.add(new PropertyColumn(new Model(ID), id) Overridepublic String getCssClass() return numeric)columns.add(new PropertyColumn(new Model(

No comments:

Post a Comment