diff --git a/Application_examples/Authentication.mp b/Application_examples/Authentication.mp
index b34f8d87df6f4197b63ec13c434803e682036922..6e63aa1a1d0af1df7eaa03080efe379f464d1eb2 100644
--- a/Application_examples/Authentication.mp
+++ b/Application_examples/Authentication.mp
@@ -1,5 +1,11 @@
 /* Model of Authentication
 
+Author credits:
+
+Created by K.Giammarco on 05/16/2017
+Modified by K.Giammarco on 08/07/2017 for capitalization of state events
+Modified by K.Giammarco on 08/07/2017 for ENSURE constraints
+
 Purpose:
 
 This model demonstrates how to correctly model a user authentication 
@@ -16,9 +22,7 @@ Description:
 A demonstration that shows how to reject unwanted behaviors with ENSURE 
 constraints.
   
-  created by K.Giammarco on 05/16/2017
-  modified by K.Giammarco on 08/07/2017 for capitalization of state events
-  modified by K.Giammarco on 08/07/2017 for ENSURE constraints
+  
 
 References:
 
diff --git a/Application_examples/Autonomous_Car.mp b/Application_examples/Autonomous_Car.mp
index ec159023d5c1e2b5b2c7b20e08dfd46c9656abff..cb83f7c8c1c70167c88f3180829dc191189a882b 100644
--- a/Application_examples/Autonomous_Car.mp
+++ b/Application_examples/Autonomous_Car.mp
@@ -1,5 +1,9 @@
 /* Model of Autonomous Car
 
+Author credits:
+
+Created by G. Kaminski, November 2015
+
 Purpose:
 
 This model applies COORDINATE statements to link the content under the 
@@ -13,13 +17,13 @@ Description:
 
 A model of an autonomous car that was used to support a failure mode
 analysis of autonomous automobile technology (student project). 
-Created by G. Kaminski, November 2015
 
 References:
 
 Search terms:
 
-Instructions: Try running with the COORDINATE statements commented out or removed. 
+Instructions: 
+Try running with the COORDINATE statements commented out or removed. 
 Watch the differences in the traces. (Note: scope does not change this model)
 
 ==========================================================*/
diff --git a/Application_examples/Beginner_Use_of_MP.mp b/Application_examples/Beginner_Use_of_MP.mp
index ae55d386ec34c3e68a72a03ed9a485ce4219064c..28296afe37d081751e38ae275444167a50130fb8 100644
--- a/Application_examples/Beginner_Use_of_MP.mp
+++ b/Application_examples/Beginner_Use_of_MP.mp
@@ -1,5 +1,9 @@
 /* Model of Beginner Use of MP
 
+Author credits:
+
+Created by K.Giammarco 2021-02-08
+
 Purpose:
 
 This model uses its traces to provide an example of how to use MP as a 
@@ -12,7 +16,6 @@ more relevant to their specific goals.
 Description:
 
 A Simple Model of Beginner MP-Firebird Use
-created by K.Giammarco 2021-02-08
 
 This model provides an orientation for those just getting started using 
 MP-Firebird.  This text editor pane allows you to compose and edit code 
diff --git a/Application_examples/CargoScreening.mp b/Application_examples/CargoScreening.mp
index 961c41b5cd83daa86696784cc4f4f99e40626a26..a14019ad9f058d5a0339b4f654d4faf82bd793fa 100644
--- a/Application_examples/CargoScreening.mp
+++ b/Application_examples/CargoScreening.mp
@@ -1,5 +1,15 @@
 /* Model of Cargo Screening
 
+Author credits:
+
+May 6, 2011, draft written by Mikhail Auguston, NPS, Monterey, CA
+source:  
+Department of Homeland Security 
+Office of Inspector General 
+CBP's Container Security Initiative Has 
+Proactive Management and Oversight but Future Direction Is Uncertain 
+OIG-10-52 February 2010 
+
 Purpose:
 
 This model demonstrates using composite statements under roots to make a long chain of 
@@ -11,13 +21,6 @@ several more.
 Description:
 
 Cargo Screening process model
-May 6, 2011, draft written by Mikhail Auguston, NPS, Monterey, CA
-source:  
-Department of Homeland Security 
-Office of Inspector General 
-CBP's Container Security Initiative Has 
-Proactive Management and Oversight but Future Direction Is Uncertain 
-OIG-10-52 February 2010 
 
 Error found: the original flowchart does not specify what happens if 
 selection_has_not_been_accepted, I've added PhysicalExamination
diff --git a/Application_examples/Commercial_Flight b/Application_examples/Commercial_Flight
index 2087a0e6f218c5fcb29850a111b633ce0f9e777d..f2c1297053366a3c37f47c83f4223929b4344cd5 100644
--- a/Application_examples/Commercial_Flight
+++ b/Application_examples/Commercial_Flight
@@ -1,5 +1,9 @@
 /* Model of Commercial Flight
 
+Author credits:
+
+Model of a commercial flight, November 27, 2013
+
 Purpose:
 
 This example shows a system with many roots performing multiple actions, 
@@ -10,8 +14,6 @@ improve their models, and when to use COORDINATE instead.
 
 Description:
 
-Model of a commercial flight, November 27, 2013
-
 This model demonstrates the interlacing of root events as Phases 
 and as Actors.  The commented out code at the bottom represents
 a simulation of COORDINATE statements with SHARE ALL statements before
diff --git a/Application_examples/Cycle_Pattern.mp b/Application_examples/Cycle_Pattern.mp
index c2f79ec893c3cf6a548f40a9c73be020069bcd36..af67ec442d1ddcc9770fe3f781663626ea8bab7a 100644
--- a/Application_examples/Cycle_Pattern.mp
+++ b/Application_examples/Cycle_Pattern.mp
@@ -1,13 +1,23 @@
 /* Model of Cycle Pattern
  
+Author credits:
+
+Created 2018-03-10 by K.Giammarco 
+
 Purpose:
 
-This model uses say statements to add commentary to the traces 
+This model uses IF and say statements to add 
+commentary to the traces. Normally, when looking 
+at a model, a user must create the "story" for 
+each trace internally, or write it down somewhere. 
+With say statements, the story can be incorporated 
+into the model and sometimes automatically built, 
+depending on the model. Users may reference this 
+model when looking to use say or IF statements to 
+add the story to their traces.
 
 Description:
 
-created 2018-03-10 by K.Giammarco 
-
 The model below describes a cycle in terms of a 
 series of one or more steps, each step either 
 moving the system "forward" or "backward" as the 
@@ -18,11 +28,6 @@ and "under", "increase" and "decrease", etc., or
 discinyms (discipline-specific synonyms) as they 
 may appear in the preferred domain taxonomy.
 
-Run the model for scopes 2, and 3 and inspect 
-the different possible patterns for Cycle.  
-Running at scope 1 will generate zero traces because
-of the ENSURE constraint on line 29.
-
 References:
 
 Cycle_ISP Model for Systems Journal Article
@@ -32,6 +37,11 @@ Search terms:
 
 Instructions:
 
+Run the model for scopes 2 and 3 and inspect 
+the different possible patterns for Cycle.  
+Running at scope 1 will generate zero traces because
+of the ENSURE constraint on line 29.
+
 ==========================================================*/
 
 SCHEMA Cycle_ISP_v2
diff --git a/Application_examples/Dining_Philosophers.mp b/Application_examples/Dining_Philosophers.mp
index c467e09c694067ae8707c7cf38b2045eebaf2992..9af95970424e1d95a07168ec4f03bd320b459f5b 100644
--- a/Application_examples/Dining_Philosophers.mp
+++ b/Application_examples/Dining_Philosophers.mp
@@ -1,7 +1,17 @@
 /* Model of Dining Philosophers
 
+Author credits:
+
+
+
 Purpose:
 
+This model demonstrates using COORDINATE, ENSURE, and IF statements 
+to come up with an answer to a sort of riddle. The logic and problem 
+solving potential of Monterey Phoenix is showcased through its ability 
+to come up with exhaustive solutions to multiple variations of a complex 
+puzzle with some code and constraints.
+
 Description:
 
 Example 17, Dining_Philosophers.mp
diff --git a/Application_examples/Elevator.mp b/Application_examples/Elevator.mp
index 6f85993589c4dfe6618a301f67e522a4b74fe2a5..265d564aa96399568db702d4e351866800e6b3e1 100644
--- a/Application_examples/Elevator.mp
+++ b/Application_examples/Elevator.mp
@@ -1,13 +1,23 @@
 /* Model of Elevator
 
+Author credits:
+
+Created by K.Giammarco circa 2011
+
 Purpose:
 
+This demonstrates a simple model of an emergency scenario involving an 
+elevator, create from or blocks with very few constraints. This allows 
+for more variance, which leads to emergent behavior. Users should use 
+this as an example of how not constraining your model can be beneficial. 
+Constraints should only be limited to necesity, or to remove traces that 
+no longer need to be considered. When in doubt, add a constraint, and then 
+comment it out. Bring it back later if needed.
+
 Description:
 
 Elevator Model
 
-K.Giammarco circa 2011
-
 This model demonstrates the modeling of situations and consequential events
 in MP.  The pattern is:
 
diff --git a/Application_examples/FindAdvisor.mp b/Application_examples/FindAdvisor.mp
index b8d184d544992cf0599a872e97c66fffcadb41b0..85b1212233c9bad32c08516749c0dc9e2c97a72d 100644
--- a/Application_examples/FindAdvisor.mp
+++ b/Application_examples/FindAdvisor.mp
@@ -1,7 +1,17 @@
 /* Model of Find Advisor
 
+Author credits:
+
+
+
 Purpose:
 
+This models the process of a new MP user coming to use MP for a project, getting 
+assistance for the project, and sticking with MP. The model does this using only 
+roots, composites, or blocks, and COORDINATE statements. Users should inspect this 
+model when considering the process of finding a mentor, or looking to learn how to 
+use COORDINATE statements to make a model.
+
 Description:
 
 example63_Find_Advisor.mp
@@ -18,9 +28,6 @@ Because the same modeling approach can be used for human systems and technologic
 it becomes possible to have integrated behavior models containing both humans and 
 technology to study the possible interactions among them.
 
-Run for scope 1 (there is no iteration in this example, so increaasing the scope will not 
-produce more scenarios). 
-
 The "Sequence" or "Swim Lanes" layouts are the most appropriate for browsing traces here. 
 The "Sequence" mode yields views very similar to the UML or SysML Sequence Diagrams.
 
@@ -30,6 +37,9 @@ Search terms:
 
 Instructions:
 
+Run for scope 1 (there is no iteration in this example, so increaasing the scope will not 
+produce more scenarios).
+
 ==========================================================*/
 
 /*—————————————————————————————
diff --git a/Application_examples/First_Responder.mp b/Application_examples/First_Responder.mp
index 6ad4883611e687854c1f665bdb9471174e8338b0..bb5773ca70f619d8c4a8d3a95b5aec20d351d60c 100644
--- a/Application_examples/First_Responder.mp
+++ b/Application_examples/First_Responder.mp
@@ -1,15 +1,25 @@
 /* Model of Narcan Administration
 
+Author credits:
+
+Create by J. Bryant, May 2016
+
 Purpose:
 
+This model demonstrates the administration of narcan by bystanders 
+in order to determin the possible consequences of allowing or even 
+encouraging bystanders to administer medication in an overdose scenario. 
+The model accomplishes this using or blocks and COORDINATE statements. 
+Users may find this model useful when looking into COORDINATE statements, 
+or scenarios with bystanders who could possibly become involve in whatever 
+process is being modeled.
+
 Description:
 
 A first responder scenario involving the administation of a rescue 
 medication (Narcan) to an overdose victim by a First Responder or a 
 Bystander.  
 
-Create by J. Bryant, May 2016
-
 The model was developed to compare response times, but unexpected 
 scenarios emerged that was previously not considered.  Trace 6 and others
 show a double administration of Narcan by both the bystander and the first 
diff --git a/Application_examples/Knapsack_Weight_Limit.mp b/Application_examples/Knapsack_Weight_Limit.mp
index 9c09b79c969200e3887094f60fb8a32ad1f76871..2e1cb71a1752404d67f954ec86f8612811e0b2f4 100644
--- a/Application_examples/Knapsack_Weight_Limit.mp
+++ b/Application_examples/Knapsack_Weight_Limit.mp
@@ -1,30 +1,39 @@
 /* Model of Knapsack Weight Limit
 
+Author credits:
+
+
+
 Purpose:
 
+This model demonstrates using GLOBAL limits to exhaustively calculate all 
+the combinations of items that can be put into a bag to not exceed the weight 
+limit. Users can reference this model to learn about solving logic problems 
+with MP constraints.
+
 Description:
 
 Example 38 Knapsack
-
-	This is a case of well-known Knapsack Dynamic Programming Problem.
-    In general it is NP-hard and NP-complete 
-    with respect to the number N of items and to the weight limit W.
-    It has been proven that the computational complexity is O(N * W),
-    see https://en.wikipedia.org/wiki/Knapsack_problem 
-    
-    This example demonstrates MP template for performing "brute force" search
-    for all optimal solutions within the given scope 
-    (certainly not the optimal performance, but is acceptable for relatively 
-    small N,in particular, it stabilizes at scope 4).
     
-	Run for scope 1 and up to 5
+This example demonstrates MP template for performing "brute force" search
+for all optimal solutions within the given scope 
+(certainly not the optimal performance, but is acceptable for relatively 
+small N, in particular, it stabilizes at scope 4).
 
 References:
 
+This is a case of well-known Knapsack Dynamic Programming Problem.
+In general it is NP-hard and NP-complete 
+with respect to the number N of items and to the weight limit W.
+It has been proven that the computational complexity is O(N * W),
+see https://en.wikipedia.org/wiki/Knapsack_problem
+
 Search terms:
 
 Instructions:
 
+Run for scope 1 and up to 5
+
 ==========================================================*/
 
 SCHEMA Knapsack
diff --git a/Application_examples/MP_Architecture_Specification.mp b/Application_examples/MP_Architecture_Specification.mp
index 8f68fed3e7ae8609d3b636096cf43741e494f232..b73e85ceb43ee69e35c95d6b3e6efc1b0efcf573 100644
--- a/Application_examples/MP_Architecture_Specification.mp
+++ b/Application_examples/MP_Architecture_Specification.mp
@@ -1,13 +1,23 @@
 /* Model of MP Architecture Specification
 
+Author credits:
+
+
+
 Purpose:
 
+This model demonstrates how a user might use an MP 
+IDE to develop an MP model. This model contains many 
+types of interactions and goes through the process of 
+making a model, so beginner and intermediate users may 
+find this model helpful for learning about the modeling 
+process or how specific MP statements (COORDINATE, IF, 
+SHARE ALL, SAY, GRAPH, etc.) can create relationships.
+
 Description:
 
 Example 28
  	MP compiler/trace generator architecture model 
-    
-    run for scope 1 or more
 
 References:
 
@@ -15,6 +25,8 @@ Search terms:
 
 Instructions:
 
+run for scope 1 or more
+
 ==========================================================*/
 
 SCHEMA MP_architecture
diff --git a/Application_examples/Manufacturing_Process.mp b/Application_examples/Manufacturing_Process.mp
index 83a252cb58b88360ca422e1d21e8bb376c5cfacd..ac44fda8c5db1aa6a84d88e0b02b4d39f72385f7 100644
--- a/Application_examples/Manufacturing_Process.mp
+++ b/Application_examples/Manufacturing_Process.mp
@@ -1,15 +1,23 @@
 /* Model of Manufacturing Process
 
+Author credits:
+
+Created by John Palmer August 2014
+
 Purpose:
 
+This model demonstrates a manufacturing system made from only standard ROOT 
+statements, or blocks, SHARE ALL statements, iteration, and scope limits. 
+This manufacturing system has several actors simultaniously performing jobs, 
+so users may look to this model for a simple way of designing a system.
+
 Description:
 
 Application of Monterey Phoenix Modeling to Manufacturing Product Systems
 An example pre-dating MP-Firebird application that was used to generate scenarios
 for separately estimating probability, time and cost of each of these scenarios.
 MP version 4 may be used to conduct such analysis with its native capabilities.
-Created by: John Palmer
-August 2014
+
 
 References:
 
@@ -59,7 +67,7 @@ ROOT 	INSPECTOR:  (* <0..3> 	Inspect
     							( Accept | Reject ) 
     				*);
 					
-		Inspect:	CheckPart ProvideAnswer;	
+		Inspect:	CheckPart ProvideAnswer;
 
 ROOT 	INSPECTOR2: (* <0..3> 	Inspect2
 								( Accept2 | Reject2 ) 
diff --git a/Application_examples/Martian_Lander.mp b/Application_examples/Martian_Lander.mp
index 8ead385cd2639e4624b7ffa839217b85165cb390..280a649f960e376254b1faefd02de1d69460b79f 100644
--- a/Application_examples/Martian_Lander.mp
+++ b/Application_examples/Martian_Lander.mp
@@ -1,18 +1,27 @@
 /* Model of Martian Lander
 
+Author credits:
+
+MP model written by M.Auguston following example 1 and Appendix B from
+Farnam Jahanian, Aloysius Ka-Lau Mok 
+"Safety analysis of timing properties in real-time systems",
+IEEE Transactions on Software Engineering
+Year: 1986, Volume SE-12, Issue 9, pp.890-904
+
 Purpose:
 
+This model demonstrates the use of COORDINATE statements to model 
+the relationships of an unlikely and unfamiliar situation, and then 
+make the situation easier to understand using charts and "comments" 
+from SAY statements. Users can reference this model for advice on 
+COORDINATE statements and using MP to add graphs and commentary to 
+traces automatically.
+
 Description:
 
 Example 45. Real time system behavior modeling.
 	Landing system for Martian Lander.
 
-	MP model written by M.Auguston following example 1 and Appendix B from
-	Farnam Jahanian, Aloysius Ka-Lau Mok 
-	"Safety analysis of timing properties in real-time systems",
-	IEEE Transactions on Software Engineering
-	Year: 1986, Volume SE-12, Issue 9, pp.890-904
-
 The landing system operates in one of two modes: normal or emergency. 
 When the system is turned on (an external event), it operates in the 
 normal mode. While in the normal landing mode, the pilot can control 
@@ -45,6 +54,12 @@ START   Systems start up,
 IOINT   I/O device signals completion
 TMRINT  Timer Interrupt, occurs at least 100 ms after start of STMR
 
+References:
+
+Search terms:
+
+Instructions:
+
 Action Time in ms
 RACC 	10
 STMR 	10
@@ -57,13 +72,7 @@ IALT 	20
 CKDT 	10
 RRM 	10
 
-	run for scope 1 and up.
-
-References:
-
-Search terms:
-
-Instructions:
+Run for scope 1 and up.
 
 ==========================================================*/
 
diff --git a/Application_examples/Prisoners_Dilemma.mp b/Application_examples/Prisoners_Dilemma.mp
index ea484af4d4cdc599d94901df819e4cb32a5c5069..1bd7ee7800af23081c882f0e38bf93d07717b258 100644
--- a/Application_examples/Prisoners_Dilemma.mp
+++ b/Application_examples/Prisoners_Dilemma.mp
@@ -1,21 +1,23 @@
 /* Model of Prisoner's Dilemma
 
+Author credits:
+
+Michael Collins
+August 10, 2020.
+
 Purpose:
 
+This model demonstrates using MP to model the logic of a 
+game scenario. Users looking to model exhaustive logical 
+game scenarios may want to use this model as an example.
+
 Description:
 
 The Prisoner's Dilemma 
-Michael Collins
-August 10, 2020.
-https://en.wikipedia.org/wiki/Prisoner%27s_dilemma
-https://plato.stanford.edu/entries/prisoner-dilemma/#Symm2t2PDOrdiPayo
 
 In this case, the classic model is the output in the traces
 of the model with the payouts as documented in 
 "Game Theory and Strategy" by Philip D. Straffin
-Mathematical Association of America 1993
-isbn: 0-88385-637-9
-Chapter 12, page 73.
 
 Different in this MP model is how the payouts
 are computed.  Most models just assume the final
@@ -62,6 +64,14 @@ The total payoff is computed from the assignments above and then subtracting 2.
 
 References:
 
+https://en.wikipedia.org/wiki/Prisoner%27s_dilemma
+https://plato.stanford.edu/entries/prisoner-dilemma/#Symm2t2PDOrdiPayo
+
+"Game Theory and Strategy" by Philip D. Straffin
+Mathematical Association of America 1993
+isbn: 0-88385-637-9
+Chapter 12, page 73.
+
 Search terms:
 
 Instructions:
diff --git a/Application_examples/Railroad_Crossing_Safety.mp b/Application_examples/Railroad_Crossing_Safety.mp
index aa148fa0731158500d40a80e6489b528ef28c6b0..078eb5394349c55d0465e5c793b7644c9dc7ff6a 100644
--- a/Application_examples/Railroad_Crossing_Safety.mp
+++ b/Application_examples/Railroad_Crossing_Safety.mp
@@ -1,7 +1,18 @@
 /* Model of Railroad Crossing
 
+Author credits:
+
+
+
 Purpose:
 
+This model demonstrates using BUILD statements to add time to a model of car 
+and train interactions at a railroad crossing, in which time is a defining 
+factor of many events. Users should look to this model when in need of an 
+example of using BUILD statements to add time, COORDINATE constraint usage, 
+CHECK statements used catch unwated behavior, and SAY statement comments to 
+improve a model's clarity.
+
 Description:
 
 Example 27.	Timing attribute use.
diff --git a/Application_examples/Replay_Attack.mp b/Application_examples/Replay_Attack.mp
index 44ffaa9b64779d65a6a4a227700012d9801a1164..574e74beb794015ab10aaf2525d0cbe34a1a3552 100644
--- a/Application_examples/Replay_Attack.mp
+++ b/Application_examples/Replay_Attack.mp
@@ -1,7 +1,17 @@
 /* Model of Replay Attack
 
+Author credits:
+
+
+
 Purpose:
 
+This model demonstrates using COORDINATE statements 
+to form relationships in a communication system with 
+a 3rd party listening in. Users should use this model 
+as an example of possible 3rd parties in other systems, 
+and using COORDINATE statements to form relationships.
+
 Description:
 
     
diff --git a/Application_examples/Small_Package_Delivery.mp b/Application_examples/Small_Package_Delivery.mp
index ef3fb30bb9e0b620630b58f4c262cace6fe484cd..939c8032222ea89003d432d4dc514c8948763c05 100644
--- a/Application_examples/Small_Package_Delivery.mp
+++ b/Application_examples/Small_Package_Delivery.mp
@@ -1,7 +1,19 @@
 /* Model of Small Package Delivery
 
+Author credits:
+
+Non-combatant Scenario 1 authored by N. Roberts (Engility)
+MP model authored by K. Giammarco (NPS) and D. Shifflett (NPS)
+
 Purpose:
 
+This model demonstrates overusing COORDINATE and ENSURE statements to 
+create a model of a complex emergency situation that has been 
+overconstrained to the point that intended behavior has also been 
+constrained out. Users should consider this model a warning about how 
+attempting to form relationships in a complex scenario can actually 
+negatively impact a model.
+
 Description:
 
 Taken from use case description in the Skyzer IM20 Mission Model 
@@ -25,9 +37,6 @@ the family to safety.
 Depends on: range, sea states, weather, visibility, day, Night. Is it
 raining? Hailing?"
 
-Non-combatant Scenario 1 authored by N. Roberts (Engility)
-MP model authored by K. Giammarco (NPS) and D. Shifflett (NPS)
-
 This model shows only two scenarios due to overloading constraints
 (constraints that suppress entire branches of execution that a user
 intended to permit).
diff --git a/Application_examples/Spent_Fuel_Cooling_and_Cleanup.mp b/Application_examples/Spent_Fuel_Cooling_and_Cleanup.mp
index 6e599101a8b9f82c7778064d45abcc33147d6076..929cb686c28e21841a3fb50f73a51e571c449e15 100644
--- a/Application_examples/Spent_Fuel_Cooling_and_Cleanup.mp
+++ b/Application_examples/Spent_Fuel_Cooling_and_Cleanup.mp
@@ -1,17 +1,22 @@
 /* Model of Spent Fuel Cooling and Cleanup
 
-Purpose:
-
-Description:
-
-Cooling Pool
+Author credits:
 
 created by K.Giammarco 5/4/2020
 modified by K.Giammarco 5/8/2020 with D.VanBossuyt
 modified by K.Giammarco 5/13/2020 with D.VanBossuyt
 
-The purpose of this model is to identify the components of and 
-interactions among a spent nuclear fuel cooling pool and its environment.
+Purpose:
+
+This model demonstrates identifying the components of 
+and interactions among a spent nuclear fuel cooling 
+pool and its environment. Users may use this model to 
+learn about interactions in a system and using COORDINATE 
+statements to make comments on relationships.
+
+Description:
+
+Cooling Pool
 
 References:
 
diff --git a/Application_examples/Spiral_Software_Process b/Application_examples/Spiral_Software_Process
index dd1bb9f323b3afd7092645f7a2429284dcc74149..bfb3c669c2188a23d5178c05fa671de06c5ade80 100644
--- a/Application_examples/Spiral_Software_Process
+++ b/Application_examples/Spiral_Software_Process
@@ -1,7 +1,13 @@
 /* Model of Spiral Software Process
 
+Author credits:
+
+
+
 Purpose:
 
+Users may use this model to learn about SHARE ALL usage to make connections
+
 Description:
 
 Example 16, model of the spiral software process
@@ -11,14 +17,14 @@ Example 16, model of the spiral software process
     are constrained to produce designs which are copies of the 
     communication structures of these organizations."
 
-    run scope up to 5
-
 References:
 
 Search terms:
 
 Instructions:
 
+Run  for scopes up to 5
+
 ==========================================================*/
 
 SCHEMA spiral