Tuesday, December 24, 2019

Gawain s Knightly Status Noble Or Failure - 907 Words

Maxx Mainzer Ms. Hinshaw H Brit. Lit-Period F November 30, 2014 Gawain’s Knightly Status: Noble or Failure? Sir Gawain, nephew to the well-known King Arthur of the Round Table, is regarded as the most elite and noble of all the knights in the poem Sir Gawain and the Green Knight. Yet, like anyone else in the world, Sir Gawain is far from perfect. Gawain, a courteous knight living a life dedicated to honor, courage, and self-preservation, is tested on his chivalrous code throughout his journey; a search for the Green Knight. Throughout the tests, Gawain’s actions reveal that even the best of men can be selfish and are subject to guilt and sin. In the beginning of Sir Gawain and the Green Knight, Gawain is introduced as a courtly knight with a sense of perfection. The author does this to compare it to his failures, which are later displayed through Gawain’s acts at Morgan le Fay’s castle. Gawain is portrayed to be a chivalrous knight with honor and courage. Gawain is presented with a challenge: accept the game to cut off the Green Knight’s head, and in a test of courage and honor, set out to allow the Green Knight to return the favor to him in a year and a day. This initially shows the knightly characteristics of Gawain which presents him as noble and honorable, which allows the author to shock the audience when Gawain falls under pressure to actions that contradict the chivalrous code. The first of these actions taken by Gawain in opposition to his morals is the temptationShow MoreRelatedThe Pentangle Of Sir Gawain And The Green Knight1947 Words   |  8 PagesThe pentangle in Sir Gawain and the Gree n Knight which is displayed on the front side of Gawain’s shield, represents his knighthood and all that Gawain stands for. â€Å"In particular, Gawain s courtesy is associated with his virtue in the symbolic device of the pentangle in his shield (Morgan, p.770).† One of the points of the pentangle represents courtesy, which means a knight has to be courteous to not only women, but also men, in order to be able to be seen as reaching this pillar. Courtesy is anRead MoreSir Gawain And The Green Knight3517 Words   |  15 PagesCora Orme Kapelle Medieval Literature 16 April 2015 Sir Gawain’s Performative Identity and Antifeminist Diatribe in Sir Gawain and the Green Knight Medieval scholars continually inspect the particularities of Sir Gawain and the Green Knight (SGGK) within the context of the preexisting Gawain literary tradition, and the issue of Gawain’s sudden antifeminist diatribe repeatedly comes to the forefront of these textual investigations. Often, literary critics claim that Gawain’s antifeminist outburst

Monday, December 16, 2019

Eulogy -Robert Frost Free Essays

Robert Frost Robert Frost once debated whether the world ended in fire, or ice. It is a sad thought that the world will end without him; that the future generations will be privy to such events made for people like Robert. He was an inspirational, American poet who questioned the very core of our beliefs, he chose paths that few had took, and that is why today he is remembered today. We will write a custom essay sample on Eulogy -Robert Frost or any similar topic only for you Order Now Robert Frost was born in San Francisco on March 26, 1874. His family moved to New England when he was eleven; he became interested in reading and writing poetry during his high school years in Lawrence, Massachusetts. He earned his formal degree at the arguably the most prestigious University, Harvard. He later worked through various occupations, ranging from teacher to editor of the Lawrence Sentinel. His first professional poem, â€Å"My Butterfly†, was published on November 8, 1894, in The Independent newspaper. In a 1970 review of The Poetry of Robert Frost, the poet Daniel Hoffman describes Frost’s early work as â€Å"the Puritan ethic turned astonishingly lyrical and enabled to say out loud the sources of its own delight in the world,† and comments on Frost’s career as The American Bard: â€Å"He became a national celebrity, our nearly official Poet Laureate, and a great performer in the tradition of that earlier master of the literary vernacular, Mark Twain. † About Frost, President John F. Kennedy said, â€Å"He has bequeathed his nation a body of imperishable verse from which Americans will forever gain joy and understanding. Though his work is predominantly associated with the life and scenery of New England, and though he was a poet of traditional verse forms and metrics who remained unfalteringly detached from the poetic movements and fashions of his time, Frost is anything but a merely regional or minor poet. The author of searching and often dark medit ations on universal themes he is essentially a modern poet who spoke truthfully in all that encompasses, his work inspired psychological battles inside ourselves, his works were fused with layers of obscurity and irony. Robert Frost lived and taught for many years in Massachusetts and Vermont, and died in Boston on January 29, 1963. Two poems that debatably epitomize what Robert Frost stood for, what he believed in, how he opened the minds of many people to what is; These two poems are ‘fire and ice’, and ‘the road not taken’. The short poem ‘fire and ice’, outlines the familiar question about the destiny of the end of world, wondering if it is more likely to be devastated by fire or ice. People are on both sides of the debate, and Frost introduces the narrator to provide his personal take on the question of the end of the world. The narrator first determines that the world must end in fire after bearing in mind his personal experiences with desire and passion, the emotions of fire. Yet, after considering his experience with â€Å"ice,† or hatred, the narrator acknowledges that ice would be equally destructive. A reading will now be done of the poem: Some say the world will end in fire, Some say in ice. From what I’ve tasted of desire I hold with those who favor fire. But if it had to perish twice, I think I know enough of hate To say that for destruction ice Is also great And would suffice. Only nine lines, this miniature poem is a vivid example of Frost’s concisely ironic literary style. The poem varies between two meter lengths (either eight syllables or four syllables) and uses three collections of interwoven rhymes, based on â€Å"-ire,† â€Å"-ice,† and â€Å"-ate. † In the first two lines of the poem, Frost creates a clear dichotomy between fire and ice and the two groups of people that believe in each element. By using the term â€Å"some† instead of â€Å"I† or â€Å"an individual,† Frost emphasizes that the distinction between the two elements is a universal truth, not just an idea promoted by an individual. In addition to the unavoidable contradiction between fire and ice, these first lines also outline the prerogative that the world will end as a direct result of one of these elements. It is made unclear which element will lead to the destruction of the world, but it is noteworthy to know that these are the only two options given. The poem does not allow for any other possibilities in terms of the world’s fate, just as there are not any other opinions allowed in the black-and-white debate between fire and ice. Remarkably, the two prospects for the world’s destruction correspond directly to a common scientific debate during the time Frost wrote the poem. Much like this poem, scientists also debated the eventual end to the Earth, on one side; some believed the Earth will be destroyed by the burning magma core, incinerating the Earth to nothing, while others believed that a new Ice Age would wither all livings things on the earth’s surface. Instead of preserving a strictly scientific perspective on this debate, Frost introduces a more emotional side, associating passionate desire with fire and hatred with ice. Within this metaphorical view of the two elements, the â€Å"world† can be recognized as a metaphor for and consequently foregrounding to the audience, a relationship. Too much fire and passion can quickly consume a relationship, while cold indifference and hate can be equally destructive Although the first two lines of the poem insist that there can only be a single choice between fire and ice, the narrator further details that a combination or a concurring sequence of both elements would destroy the Earth. Furthermore, the fact that he has had personal experience with both (in the form of desire and hate) reveals that fire and ice are not mutually exclusive, as the first two lines of the poem assert. In fact, though the narrator first concludes that the world will end in fire, he ultimately admits that the world could just as easily end in ice; fire and ice, it seems, are strikingly similar. This further highlights what Frost believes in relationships. That, although a concentration of one emotion, passion or hatred can be destructive he poses that one cannot be without both of them existing. The second poem analysed will be ‘The road not taken’. The narrator comes upon a fork in the road while walking through a yellow wood. He considers both paths and concludes that each one is equally well-travelled and appealing. After choosing a path, the narrator when he will come back to the fork to choose the different path, he later realises this will possibly never happen but that he will only come to new forks (new decisions), his mind then ponders on how different his life would have been if he chose the different path, a reading will now be done. Two roads diverged in a yellow wood, And sorry I could not travel both And be one traveler, long I stood And looked down one as far as I could To where it bent in the undergrowth; Then took the other, as just as fair, And having perhaps the better claim, Because it was grassy and wanted wear; Though as for that the passing there Had worn them really about the same, And both that morning equally lay In leaves no step had trodden black. Oh, I kept the first for another day! Yet knowing how way leads on to way, I doubted if I should ever come back. I shall be telling this with a sigh Somewhere ages and ages hence: Two roads diverged in a wood, and I— I took the one less travelled by, And that has made all the difference. This poem is made up of four stanzas of five lines, each with a rhyme scheme of ABAAB. This poem is one of Frost’s most adored works and is used many times in English studies. Since its publication, many readers have analysed the poem as a nostalgic observation on life choices. The narrator decided to seize the day and express himself as an individual by choosing the road that was â€Å"less travelled by. As a result of this decision, the narrator claims that his life was essentially different, that it would have been had he chosen the well-travelled path. This reading of the poem is tremendously popular because every reader can commiserate with the narrator’s decision: having to choose between two paths without having any knowledge of where each road will lead. Moreover, the narrator†™s decision to choose the â€Å"less travelled† path demonstrates his courage. Rather than taking the safe path that others have travelled, the narrator prefers to make his own way in the world. However, when we look closer at the text of the poem, it becomes clear that such an idealistic analysis is largely inaccurate. The narrator only distinguishes the paths from one another after he has already selected one and travelled many years through life. When he first comes upon the fork in the road, the paths are described as being fundamentally identical. In terms of beauty, both paths are equally â€Å"fair,† and the overall â€Å"†¦passing there / Had worn them really about the same. † It is only as an old man that the narrator looks back on his life and decides to place such importance on this particular decision in his life. During the first three stanzas, the narrator shows no sense of remorse for his decision nor might any acknowledgement that such a decision be important to his life. Yet, as an old man, the narrator attempts to give a sense of order to his past and perhaps explain why certain things happened to him. Of course, the excuse that he took the road â€Å"less travelled by† is false, but the narrator still clings to this decision as a defining moment of his life, not only because of the path that he chose but because he had to make a choice in the first place. So now, we will remember American poet, Robert Frost for his ingenious input into such universal truths and how such knowledge can be extracted from his points of view. He is now gone from this Earth, but let us remember him, for his works, for inspiring us to take the road less taken when we come to our own cross roads, to temper our relationships with fire and ice. With these works, dear Robert has left us with enough knowledge and understanding to replace the hole that he has made. How to cite Eulogy -Robert Frost, Papers

Sunday, December 8, 2019

Darren Heath Essay Example For Students

Darren Heath Essay Simon, a character in the novel Lord of the Flies written byWilliam Golding is brave, helpful, shy, dependable, and quiet. Simon is brave. Simon demonstrates himself to be brave over and overthroughout the novel. He shows this bravery by going into the jungle,numerous times, by himself and having no way of defending himself ifanything happens. He also leaves the group (in chapter seven) and goesand tells Piggy that the group will not be back by dark, this is done allby himself again with no way of defending himself if anything shouldhappen. Simon also proves himself to be brave by facing the Lord of theFlies and telling that it was only a pig head on a stick. Simon continuesto demonstrate that he is brave numerous times throughout the novel. Simon is helpful. He shows his ability to help his fellow man bybeing the only one who helps Ralph build the shelters. Also, instead offighting with the group (in chapter seven) he leaves to go and tell Piggythat the group will not be back by dark. Definitely, these actions showthat Simon is helpful. Simon is also shy. He clearly demonstrates this throughout the novel. He does not like to speak in front of people on the island. Also, he isusually by himself and likes to be alone. He continues to demonstrate thathe is shy by wanting to be alone. Simon is very dependable. He defiantly demonstrates this by being theone who was working on the shelters, usually by himself, and never givingup even though nobody else, but Ralph, helps him. Also he is there whensomeone needs something done, and volunteers to do the job. Defiantly, heshows that he is dependable and wants to help others. Simon is quiet. He shows that he is quiet throughout the novel by notspeaking in front of the group, and when he does he speak he speaks veryquietly and shyly. He never yells or challenges anyone. He also goes intothe jungle and does not talk or do anything. This all shows that Simon isquiet. Simon is a very complex character with a number of differentpersonality traits. He is clearly complex by demonstrating himself to bebrave, helpful, shy, dependably, and quiet. These traits are in contrast tothe traits found in most of the other characters in the novel. This maybethe reason why the other boys killed him.

Sunday, December 1, 2019

OMD GEESE Essay Research Paper Running Head free essay sample

OMD GEESE Essay, Research Paper Runing Head: OMD GEESE ORGANIZATIONAL MANAGEMENT DEVELOPMENT GEESE GROUP # 97 Anita Clark OMD # 97 Dr. Betsy Summerfield October 14, 1999 Lessons about teamwork can be learned from geese. As each goose flaps its wings it creates upheaval for the birds that follow. By winging in a V formation, the whole flock adds greater winging scope than if each bird flew entirely. When a goose falls out of formation, it instantly feels the retarding force and opposition of winging entirely. It rapidly moves back into formation to take advantage of the raising power of the bird instantly in forepart of it. When the lead goose tyres, it rotates back into the formation and another goose flies to the point place. While winging in formation, geese honk to promote those up front to maintain up their velocity. When a goose gets ill or wounded, two geese bead out of formation and follow it down to assist and protect it. We will write a custom essay sample on OMD GEESE Essay Research Paper Running Head or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page They stay with it until it dies or is able to wing once more. They launch out with another formation or catch up with the flock ( Lessons on Teamwork from Geese, 1999 ) . Bluefield College has a alone flock of geese that meet every Thursday dark in the Science edifice on the 2nd floor in room # 222. These peculiar geese honk in every category and are trying to go a squad. OMD # 97 members are a premier illustration of how group intercession can be transformed into a squad. Team edifice creates a civilization that enables communicating, trust and committedness. Critical accomplishments for squad success are factors such as communicating and appreciating differences. Communication and appreciating differences When a group of people becomes genuinely effectual and execute to their possible, each one should possess a constitutional assurance for each other. Understanding how ends can be served by a group attempt is of import. During passage from a group to a squad, communicating accomplishments need to be developed. Talking and listening are important signifiers of communicating. The failing in our group is non speaking. Our geese honk about prep, documents and trials. They fall out of formation when they do non listen or seek to understand what is happening and go disquieted when questioned about their presentations. The group is affected when peculiar members: engage in distractions ( composing, reading, flicking through books, banging book screens, zipping and unzipping notebooks ) ; verbally assail personalities ; make non take part in squad determinations ; make non take the procedure earnestly ; and offer putdowns at every chance. These actions weaken the squad. Listening of others thoughts and sentiments are good to larning and growing. Open communicating helps a squad to raising and construct self-awareness for single squad members. Many of the squad members have opened his or her lines of communicating and begun advancement toward the squad ends. Learning to pass on and appreciating squad members are uninterrupted battles for everyone. Group members are non cognizant they are mutualist on each other # 8217 ; s accomplishments, capablenesss and have a alone agreement of gifts, endowments and resources ( LOTFG, 1999 ) . If these members had any goose sense , they would recognize by remaining in squad formation, they can larn from one another. When squad members portion common ends, they reach their finish quicker by going on the impulse of one another. Working together within the squad has a big impact on public presentation. Bettering relationships between members enables the squad to accomplish their ends. Each member has their ain strength and failings but it is up to the squad to develop the positive traits and transform the negatives traits into positive 1s. Trying to understand the strengths and qualities of each group member takes clip and forbearance. Questioning other members about their values, beliefs and undertakings besides encourage team growing. It is of import for all squad members to hold a voice in what is accomplished each hebdomad. Everyone has alone parts to the squad and members should admit that diverseness is valuable. Diversity helps to do a squad strong and flexible ( Teamworks Module, 1999 ) . Assortment in OMD # 97 is portrayed through accomplishments of a secretary, clerk, safety director, block builder, physical healer, buying agent, two freelance workers and two bankers. We are different, yet similar in our ends and aims. Effective squads build on the experience of others and dispute members to alter their behaviours. Groups frequently have a hard clip admiting and deciding struggles. The better the dealingss among group members, the greater the force per unit area to avoid or minimise struggle. Personality struggles are evident in our geese. Certain members want to be in control and non work as a group. They merely care about voicing their thoughts and beliefs. Some battle to be unbeatable and criticize others for holding better classs. Classs are a large factor in this category and they should no n be. Everyone should assist one another alternatively of seeking to surpass the other. Even the lead goose in formation rotates back into the V and gives another goose a opportunity to be in charge. In OMD # 97, several members do non desire to give up the lead. The ends of the group should be constructing on one another alternatively of working against each other. Interaction within the squad gives everyone a opportunity to voice his or her sentiments. Differences of sentiment frequently create chances for the group to do certain that nil of import has been overlooked. Appropriate behaviour for squad members is leting a figure of different people to hold a voice in what is accomplished. It is besides of import to esteem a fellow squad member in what they have to state. Respect and trust are effectual types of communicating vital to team edifice ; without these signifiers, a squad is neither strong nor effectual. Geese communicate, interact and cognize that by going together, they reach their finish. Decision One of the keys to constructing effectual squads is to understand the strengths, accomplishments, and motives each single brings to the squad. Successful squads are mutualist and acknowledge joint parts of squad members will bring forth better solutions than single parts could. Group members committed to common ends need to understand their squad members # 8217 ; places. An effectual squad is one that accepts the strengths and failings of its members and seeks to capitalise on each member # 8217 ; s strengths. It takes ownership of the undertaking and sees that each member # 8217 ; s thoughts are accepted into the procedure. OMD # 97 has changed from a group to a squad but continuously needs work on squad edifice accomplishments. The group was come oning as a squad, but one cackly gander has become a nuisance. It is evident that this bird is out of formation and is non willing to accept aid to acquire back on path. Several solutions to this job are to overlook the squawk or turn to the issues. The goose solution would be to assist the gander catch up with the flock. The consensus of the squad is to hit the bird and acquire it over with. Mentions Lessons on Teamwork from Geese, 1999. Available hypertext transfer protocol: //www.tpa.org/geese.htm. Teamworks Module, 1999. Fixing to Join a Team, 1999. Available: hypertext transfer protocol: //www.vta.spcomm.uiuc.edu/TBG/tbgt1-ov.html. Teamworks Module, 1999. Team Building. Available hypertext transfer protocol: //www.vta.spcomm.uicu.edu/TBG/tbg-ov.html.

Tuesday, November 26, 2019

Cather in the Rye essays

Cather in the Rye essays Without a doubt, J.D. Salinger is one of the best twentieth-century America authors. He is best known for his book, Catcher in the Rye, a book about a seventeen-year-old teenager, struggling through his teenager years, falling into a depression and trying to understand the real world. The straightforward approach to his novel caused a hurricane of controversy in America. It was the first time an author, dared to tell it how it really is and tried to open Americas eyes to understand the thoughts of a typical adolescent teenager. This straightforward, simple read is nonetheless used in many schools today for its rich content of symbolism and truthfulness. This book has had a huge impact on teenagers all over the world.1 The story of J.D. Salingers life begins on January 1, 1919 in New York City. He was born into a wealthy family; his father was a Jewish cheese importer.2 Salinger attended many prep schools. This is where he was first inspired to become a writer. In his quest to become a writer he wrote many short stories, many of which were never published.3 In his later years, Salinger joined the military. He participated in World War II where he became emotionally distraught and sought psychiatric help. Mostly due to the fact that he was half Jewish and witnessed the brutally that Jews were experiencing in Germany. Ironically, he would never write about his involvement in the military or his Jewish descent.4 Upon his return home, he attended college and met his soon to be wife Sylvia. However, the marriage did not last, and after the divorce, Salinger began to seriously write. He began practicing a life of seclusion and Buddhism. He published a few stories during that time period, but his claim to fame did not occur, until after the publication of the Catcher in the Rye.5 After the publication of the Catcher in the Rye, the book drew in a wide range of recognition mostly, because of its time of release. The novel...

Friday, November 22, 2019

Sarah Parker Remond, African American Abolitionist

Sarah Parker Remond, African American Abolitionist Known for: African American abolitionist, women’s rights advocate Dates: June 6, 1826 – December 13, 1894 About Sarah Parker Remond Sarah Parker Remond was born in 1826 in Salem, Massachusetts.   Her maternal grandfather, Cornelius Lenox, fought in the American Revolution. Sarah Remond’s mother, Nancy Lenox Remond, was a baker who married John Remond.   John was a Curaà §aon immigrant and hairdresser who became a citizen of the United States in 1811, and he became active in the Massachusetts Anti-Slavery Society in the 1830s.   Nancy and John Remond had at least eight children. Family Activism Sarah Remond had six sisters. Her older brother, Charles Lenox Remond, became an antislavery lecturer, and influenced Nancy, Caroline and Sarah, among the sisters, to become active in anti-slavery work.   They belonged to the Salem Female Anti-Slavery Society, founded by black women including Sarah’s mother in 1832. The Society hosted prominent abolitionist speakers, including William Lloyd Garrison and Wendell Williams. The Remond children attended public schools in Salem, and experienced discrimination because of their color.   Sarah was refused admission to Salem’s high school. The family moved to Newport, Rhode Island, where the daughters attended a private school for African American children. In 1841, the family returned to Salem. Sarah’s much-older brother Charles attended the 1840 World Anti-Slavery Convention in London with others including William Lloyd Garrison, and was among the American delegates who sat in the gallery to protest the refusal of the convention to seat women delegates including Lucretia Mott and Elizabeth Cady Stanton.   Charles lectured in England and Ireland, and in 1842, when Sarah was sixteen, she lectured with her brother in Groton, Massachusetts. Sarahs Activism When Sarah attended a performance of the opera Don Pasquale at the Howard Athenaeum in Boston in 1853 with some friends, they refused to leave a section reserved for whites only.   A policeman came to eject her, and she fell down some stairs.   She then sued in a civil suit, winning five hundred dollars and an end to segregated seating at the hall. Sarah Remond met Charlotte Forten in 1854 when Charlotte’s family sent her to Salem where the schools had become integrated. In 1856, Sarah was thirty, and was appointed an agent touring New York to lecture on behalf of the American Anti-Slavery Society with Charles Remond, Abby Kelley and her husband Stephen Foster, Wendell Phillips, Aaron Powell, and Susan B. Anthony. Living in England In 1859 she was in Liverpool, England, lecturing in Scotland, England and Ireland for two years.   Her lectures were quite popular. She included in her lectures references to the sexual oppression of women who were enslaved, and how such behavior was in the economic interest of the enslavers. She visited William and Ellen Craft while in London. When she tried to get a visa from the American legate to visit France, he claimed that under the Dred Scott decision, she was not a citizen and thus he could not grant her a visa. The next year, she enrolled in college in London, continuing her lectures during school holidays. She remained in England during the American Civil War, participating in efforts to persuade the British not to support the Confederacy.   Great Britain was officially neutral, but many feared that their connection to the cotton trade would mean they’d support the Confederate insurrection. She supported the blockade that the United States put up to prevent goods reaching or leaving the rebelling states. She became active in the Ladies’ London Emancipation Society. At the end of the war, she raised funds in Great Britain to support the Freedman’s Aid Association in the United States. As the Civil War was ending, Great Britain faced a rebellion in Jamaica, and Remond wrote in opposition to British harsh measures to end the rebellion, and accused the British of acting like the United States. Return to the United States Remond returned to the United States, where she joined with the American Equal Rights Association to work for equal suffrage for women and African Americans. Europe and Her Later Life She returned to England in 1867, and from there traveled to Switzerland and then moved to Florence, Italy.   Not much is known of her life in Italy.   She married in 1877; her husband was Lorenzo Pintor, an Italian man, but the marriage apparently did not last long. She may have studied medicine. Frederick Douglass refers to a visit with the Remonds, probably including Sarah and two of her sisters, Caroline and Maritche, who also moved to Italy in 1885.   She died in Rome in 1894 and was buried there in the Protestant cemetery.

Thursday, November 21, 2019

Play with Alexander Hamilton, John Adams, and Abigil Adams Essay

Play with Alexander Hamilton, John Adams, and Abigil Adams - Essay Example At any rate, I am an American, as are many of you. We’re here today talk about America, world events, and to get the impressions and thoughts and ideas of people who are historically significant to America. On my right, is one of those historically significant people, Samuel Adams. Thank you, and thank ye all for that warm welcome. I am humbled. And knowing what I do about modern day round tables, I have to admit that I was just a little bit reluctant to be here, but I have reconciled myself that it is a good thing. A necessary thing. Thank you, Mr. Adams. We are all certainly glad for your decision to be here. Seated to my left is the former First Lady, Abigail Adams, wife of the second president of the United States, John Adams. Mrs. Adams, welcome, and I want to thank you for agreeing to be here today. Mrs. Adams, you’re probably even better known for your writing of letters during the American Revolutionary War; they stand out as both great writing in American history, and as one of the earliest collection of thoughts on women’s rights. And we’ll talk with you a little more about that in a few minutes here. But, again, thank you for joining us. And seated in the middle, between Mrs. Adams and Mr. Adams, is Alexander Hamilton. Mr. Hamilton might best be known for his duel with Aaron Burr, during which he was mortally wounded; but before that, he served with the Continental Congress militia under General George Washington, and later served in the president’s cabinet. An accomplished lawyer, and a signature on the United States Constitution. Welcome, Mr. Hamilton. Not a chance, haven’t you heard, you’re emancipated? Good Gawd, woman, have you seen what they’re wearing these days? There you sit buttoned up to the neck, and you was the one that started all this stuff. Are you a material girl? That’s untrue, Alex. I advocated for women’s rights, not women’s

Tuesday, November 19, 2019

Principles of tax income law Essay Example | Topics and Well Written Essays - 2750 words

Principles of tax income law - Essay Example In John’s case, he is an employee of a real estate agent but he is carrying out personalised investment activities. This can be seen with the purchase of the motel in order to sell it out as a kindergarten later. A purchase of this kind can be considered as an investment carried out with the intention to make a profit. In terms of the bigger picture, John’s investment activity can be considered as a business activity in ordinary usage since he invests money in order to derive a profit. Receipts or profits created through business activities are treated as ordinary income for most circumstances3 4. In cases where there may be payment complications or where receipts cannot be created from proceeds of business, income may not be seen as ordinary5. However, in John’s case, if the real estate sold out it would have produced a simple income receipt that would have been considered as ordinary income. The onset of the flood and the clearing up of the land can further be considered as business activities on John’s part in order to add value to his property. The assessment that John’s land carried underground hot water reservoirs merely added even more value to his land. John is now being offered money based on the value addition on the motel site he purchased. The value addition activities of John can be seen as business activities analogous to any other value addition properties carried out by any other business. As long as there is â€Å"sufficient connection† between John’s income derived from the sale of land and value addition on the land, John’s income will be categorised as ordinary income according to FCT v Consolidated Press Holdings Ltd (No 2)6 7. A scrutiny of John’s circumstances reveals that he purchased land with a view to make profit and his final transaction with Green Energy results in profit. Such income is considered ordinary income for taxation purposes. Problem Question 1B The capital ga ins tax (CGT) applies to any forms of capital gains made when an asset is disposed off except for certain exemptions. Most exemptions related to CGT in Australia are based on items of personal use as well as exemptions to promote certain business activities. Moreover, the CGT enforced in Australia provides for rollovers under certain circumstances. The contention behind CGT is to tax income that falls within the capital gain category so that it cannot be drained off for other purposes. Assessments for CGT rely on considering any net gains as part of the taxable income structure for a single tax year8. The net gains may result from the sale of owned assets or from any other forms of disposal of assets. Any form of assets held by an individual for a period of one year or more are given a fifty percent discount when considering the CGT on disposal9. CGT was introduced to Australia in 1985 and any assets held by a person before this are exempt from CGT. Assets acquired by a person in or after 1985 are considered alone in CGT deductions10. In the case of Kimberly, her assets were mostly formed well after 1985 so CGT applies to most of her assets except those that are exempt under current CGT laws. In addition to this observation, it is noteworthy that up to 1999, CGT applied after an assessment of the consumer price index (CPI). Under this scheme, changes in the price of an asset due to consumption

Saturday, November 16, 2019

Hubspot Case Essay Example for Free

Hubspot Case Essay The problem in this case is that Hubspot needed to make a transition from its initial start-up structure (organizational structure, target customers and pricing strategy) in order grow, and the dilemma was how to best approach this change. Hubspot faced three main issues for this: a) identify target customers, b) modify their pricing model and c) how to develop the growth strategy. Hubspot was good at building a community, e.g. over 300000 unique visitor in 2008, and thousands of freeware subscriptions in 2009. Nonetheless they had a diverse universe of customers, from small business owners (Ollies) to marketing professionals (Marys), different type of business ranging B2B or B2C, and size (over or under 25 employees). Table C shows there was a potential market evenly distributed among B2B and B2C. For Hubsport, the decision to identify a target customer was difficult. This is seen when contrasting exhibits 6 where 73% of customers were Ollies and exhibit 5 which indicated that Marys accounted for 68% of new customers from Sep-Dec 2008. Although the B2B customers were important for Ollies and Marys, there was an interesting growth of Marys in B2C. Thus a segmentation of customer was required to better assess their different needs. At the end of 2008, Hubspots’s products responded to the main two customers (Ollies and Marys), still its pricing model was similar for both, where Marys paid a slightly higher monthly amount as its software package included more features (exhibit 7). This was something Hubspot needed to analyze as Ollie and Marys had various pros and cons as customers. Ollies represented a lower cost to acquire ($1000) and where quick to sign in, but cancel subscription early, while Marys cost more to acquire ($5000) and took longer to sign in, by stayed for longer using the product. Assuming no churn rate an Ollie had to maintain subscription for 2 months and Marys had to maintain subscription for 9 months, to pay off their acquiring cost. The previous  scenario meant that HubSpot’s 2008 projections including the 100 paying customers from 2007 made the current pricing model not viable to support the high cost of Marys (see appendix 1). Another issued faced was the Hubsport was still a small company, seen in that it only had few engineers to build the software therefore it was hard to catch up with the sales team. Thus the product vs customer vs pricing situation presented an optimization and planning issue to keep the company growing. The previous two points require a growth strategy. At the same time it made the owners question their vision, i.e. to inbound or outbound. The strategy for growth had to clarify which customer to target, how to roll-out the respective products, whether to keep it a SaaS, and the transition into a new pricing structure to maintain current customer and capture more value from new ones. The objective of our proposed solutions is to keep Hubspot as the software-to-have for inbound marketing and grow financially from a start-up to an established business. For this we set out the following actions: Hubspot’s culture and vision should be maintained. Web 2.0 is continuing evolving as more businesses are using the various channels and HubSpot can differentiate itself as the inbound marketing which weighs more than outbound marketing (inbound represents 37% marketing budget while outbound 30%). HubSpot has the expertise to create traffic and analyze and qualify leads filling the respective demand of Ollies and Marys. At the same time we differentiate from our two main competitors by proving a lower price (Eloqua is more expensive) and focusing on inbound marketing (Marketo is a mix of inbound and outbound). Our conclusions are founded by overlaying HubSpot’s competitive field (exhibit 3) with customers’ needs a) traffic creation and b) leads analysis and qualifications, in line with HubSpot’s main strengths, as seen in appendix 2. Thus the company should not consider outbound as an alternative. As showed in appendix 4, our two segmented customers have showed different needs in terms of product features and consumption behavior. Based on the current churn out rate, we can estimate consumer lifetime value of Ollies is $4,750 and Marys $10,500 (see calculation in appendix 3). Therefore, according to our segmentation strategy, we propose following product bundles by differentiating product price and product features: 1) Product pricing: As Ollies have a shorter customer life and less marketing budget, we suggest keeping current up-front fee and a lower monthly fee. As suggestion, up-front $500 and monthly fee in the range of $150 to $250. As Marys have a longer customer life and lower price sensitivity we suggest increasing both up-front and monthly fee. As suggestion up-front $600 and monthly fee in the range of $600 to $750. Meanwhile, Marys are interested in deeper analytics, we suggest additional fee for each service of deeper analytics. As CMS system helps lower churn rate, we suggest initial fee of $300 covering 6 hours consulting to encourage both of them to use such service. 2) Product features: As Ollies prefer quick and simple solutions, we suggest tailor-made product focusing on generating leads. As Marys have a high demand of analytics, we suggest tailor-made product with more sophisticated tools to meet the needs of deeper analytics. As frequent log-in helps lower churn rate, we suggest to provide service update on a regular basis to encourage a continuous use of our service. After clearly identifying the segmentation of consumer and differentiation of products, we need ensure market-centered organizations that are capable of translating strategy into actions: 1) Engineering: To invest on product development and innovation to continuously provide with relevant service to enhance our competitive advantage of generating leads as well as analytics . 2) Sales force: To divide sales force to separately serve Maryer Ollies by providing Maryer with long-term, more sophisticated support, providing Ollies with quick simple service. 3) Marketing: To continue make a buzz for inbound marketing to create inbound marketing community rather than a simple business Finally the strategy has to be sensitive to our current customers, Appendix 5 indicates a tentative layout of the plan. Starting with the internal reorganization, then gradually change the product offering for consumers.

Thursday, November 14, 2019

New England Weather :: essays research papers

In the New England area, the weather is very unpredictable due to the following reasons. New England sits right in the middle of the Jet Stream, a weather pattern that remains fairly consistent as it guides the weather for the entire United States. To the north of the Jet Stream, you have very cold Arctic air, and to the south of it, you have the warm moist Gulf air. These two factors help to create a very unstable atmosphere that can change the forecast of the weather at anytime.   Ã‚  Ã‚  Ã‚  Ã‚   Many New England states lie along bodies of water. This can also create an irregular weather environment because the warm air off the water can turn snow to rain in the winter, and a warm sunny day to a very chilly one in the summer. Elevation can also become a problem with weather forecasters due to the fact that the elevations of the New England states are all different. So at any one time, it can be snowing in New Hampshire, Raining in Massachusetts, cloudy in Rhode Island and Foggy in Connecticut. The randomness of such weather is the reason why, in New England if you do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦ do not like the weather outside, wait Five minutes and it will change†¦

Monday, November 11, 2019

Education in Private and Public Schools Essay

Over the past years, there has been lots of interest among the policy makers to compare private and public elementary and secondary schools in the United States. In a sense, both private and public schools follow the same general goals set out in 1979. These goals as Sizer pointed out are expected to serve equally well both the American’s public and private elementary and high school (p. 349). These goals according to Sizer aimed to develop the students’ fundamental scholastic capacity and to make them competitive and responsible individual. Both the private and public are expected to come up with this end, and to touch most aspects of an adolescent’s existence, mind, body, values and career. Generally, as reported by Teresa Mendez in her article said that private schools had performed very satisfactory during the latest Standardized Test for scoring higher than public school. This report summarized the concept that private schools are getting more professional in performing their jobs. This report is very significant since America has set educational policies that are common for both public and private schools. Sizer had stated in his book â€Å"What High School Is† that despite America’s multi-diverse culture and decentralized school government, most schools across America are common in terms of vision or goals related to academic achievements of students. However, as one will look into Sizer’s discussion of similar circumstances and scenario inside a high school in California, he or she can notice some problems regarding students’ attitude and behavior inside and outside the classroom. In particular Sizer portrayed this concept through Mark who is a student who is bored and uninterested with school requirements. On the other hand, there are teachers and staffs who are busy with work and mindful of responsibility at home. These two parties are both elements that comprise education and yet, it seems that the academic goals or vision are not emphasized. This is because; Mark being a recipient of the knowledge appeared to be passive and stubborn since knowledge is somehow undesirable on his view, while teachers and staff are not good mover or instruments of those knowledge. This concept presented by Sizer is common in America, and he seems trying to reconcile the educational goals with proper implementation by adapting some changes in terms of school policy. To better understand this, it is important to analyze the school system in America and how it tries to meet the present needs of the educational system of America, as well as its impact to the existing scenario in most schools. Given the same objective, we can expect less difference although we may expect much similarity between public and private high school education. But studies conducted by the National Center for Education Statistic showed that there are many differences in the public and private education. They explained that although the central goal of education is the same with public and private but both can freely choose objectives and goals related to what has been set up by the government (p. 7). This means that, each school has freedom to set objectives and goal, yet, all of them should match the overall goals of the central government. These goals are directed towards the fundamental academic achievements, career and economic competence, citizenship and civil responsibility, aesthetic awareness and cultural diversity of the students (Sizer, p. 349 – 350). In general, education in America as they view it should cater to the growth and development of individual for the country’s fundamental advancement whether in public or in private schools. It is evident in most schools in America that even though, private and public schools follow through same principles in terms of educational system, and yet, they are differ in many ways from curriculum to policies. The findings of the study done by the National Center for Education Statistic reveals that majority of the public school have curriculum with emphasis on basic literacy and reading skills as their most important goal, while private schools chose to put priority on religious development of their students (p. 8). However, other results of analysis and studies of NCES showed that faculties in public schools are more professional than those in the private school as public school uses a full range of professional living requirements. The article published by the NCES entitled â€Å"Teacher Professionalization and Teacher Commitment: A Multilevel Analysis† noted that teachers in public school are required to have a substantive training in areas of specialization, complete accredited training program, and passage of examination (p. 25). Whereas teachers in private schools, the report appears to be less professional on many ways (p. 25). The report also cited that there is more turnover of teachers in private schools than in public schools. This indicates that public school have more stable teaching force than the private school as public school teachers are receiving much higher salaries which is one of the important factor for teacher to stay in their work. Aside from that, the article noted that private school teachers receive inferior salaries that cause high turn over on the part of private schools. Thus, the report shows that despite the privileges and benefits received by teachers in public school, these teachers have shown lesser commitment as compared to teachers in private schools. In comparison, neophyte teachers from private and public school have greater commitment than those in senior level or those teachers receiving higher salary (p. 26-27). Other factors associated with increase in commitment in teachers according to study are: high-end-of career salary and individual autonomy for teachers. The professionalization and commitment of teachers affect so much the credibility of education imparted to students. Policies implemented in the school system certainly affect the general performance of the school. The goal which the school is heading have influenced not only on the teachers but among the student as well. Roelande Hofman said that studies have shown that private schools have a positive effect on academic achievement (p. 119). Hofman pointed out that private school have the freedom to the kind of students they want to enroll and kick out students who display behavior that violates their own set of rules. Because of this autonomy, it gives the private school authority to reject or to accept students which the public school had only limited autonomy (p. 19). On students and parents preference, private school seemed to attract more because of selection policy. Hofman noted that in public school, the diversity of students’ background as the individual characteristic of students home environment affect with the school. It means that the behavior and conduct of students in school affects the general performance of the school in the areas of character and conduct as Sizer has portrayed in his book, many of the students seemed to have lost appetite to seriously search and acquire knowledge through schooling. In fact, students’ activities inside the campus appeared to be unmonitored by the school authorities as students can transact illegal drugs inside the school premises. Whereas in private school, students activities are daily monitored and any unacceptable manner or any violation of the given rules would easily be met with either warning or punishment. The issue is that the student feels more responsible to study well as they carry in themselves the pride that they there among other students like them who are truly sincere in their study. In general, it appears that though the teachers in the public school have a much better salaries and benefit systems and are more stable in their position compared to their peers in the private schools, yet private school teachers are more committed in their work than teachers in the public school. Second, the policy and goals and vision seem to work well in the private school despite of the fact that teachers in the public school are more professional and more trained and more fitted to work because of the specialization in the field they are handling. Third, that despite of the fact that teachers in private school are less qualified in the position given the requirements required for a public school teacher, yet private school appeared to be preferential choice of parents and students for one more reason disciplined. The similarities between public and private have been quite obvious in the levels of commitment of female teachers than their male counterpart. Both the public and private teachers reflect that female teachers are slightly committed than their male counter part. The article cited that those who are more experienced teachers have less commitment than those new ones which is the same with the private schools. Aside from this, there was not much given similarities between the public and private school. In fact, some authors were even exaggerated to express that what is between public and private are distinct difference in all aspect. Thus, the similarities given were limited only in comparison of male and female teacher in the public as well as in the private school.

Saturday, November 9, 2019

Intelligent Campus Using Rfid

chapter 1 introduction 1. 1GENERAL With the increasing denial of time and space the RFID technology is gaining momentum day by day. RFID is a source of identification of individuals and unique products. The budding technology RFID proves to threaten even the cloning technique, through the chip insertion. New ways of improving the existing RFID technology are being found and implemented. This advancement of RFID technology is looked beyond the security purposes. 1. 2 PRESENT SCENARIO Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of unique serial number) of an object wirelessly, using radio waves. RFID technologies are grouped under the more generic Automatic Identification and Data Capture (AIDC). The RFID technology is used only in security, tagging goods, inventory purposes. Since the RFID technology is not well established in India, the introduction of new methodology in the field of RFID will indeed enhance the use of RFID technology in various areas of science and technology. . 3 PROBLEM An individual should be allocated to maintain registers in all places and appointment of staffs for coordinating with students in all occasions. The ID card can be duplicated even thought it has some other advancement which will be used in rare occasions. 1. 4 SOLUTION The best solution to the above problem is to develop a single RFID tag that can be used inside the college campus. Each and every RFID tag holds a particular number and it is integrated with the id cards of each and every individuals. The RFID tag reader can be fixed anywhere in campus and it is used to collect the information about the tag location. The collected data can be sent to centralized server to handle that information. Another added advantage is that the ID cards can’t be duplicated. This has several advantages and it is a time saving one for the institution, students and staff members. 1. 5 HARDWARE AND SOFTWARE REQUIRED The hardware required is: 1) Personal computer. 2) RS 232. 3) Reader. 4) Power supply unit. 5) IR transmitter and receiver pair. 6) Buzzer. 7) LCD. 8) Tags. The software required is: 1) AVR studio 3. 5. 2) Visual studio 6. 0. 1. 6 BLOCK DIAGRAM Figure 1. 1 block diagram of intelligent campus using RFID CHAPTER 2 RFID system 2. 1 INTRODUCTION Radio Frequency Identification or RFID refers to the set of technologies that use radio waves for identifying objects or people. The RFID system is used to identify individual objects or things in the environment which can be monitored through use of wireless technology. RFID is a generic term for technologies that use radio waves to remotely store and retrieve data. In other words, it is a combined term with RF and ID where RF means a wireless communication technology and ID means identification information of tag. So it is said that RFID is theoretically a wireless networking technology to transmit identification information stored at an electronic memory space. 2. 2 COMPONENTS OF RFID SYSTEM: ? An RFID device (transponder or tag), that contains data about an item. ? An antenna used to transmit the RF signals between the reader and the RFID devices. ? An RF transceiver that generates the RF signals. A reader that receives RF transmissions from an RFID device and passes the data to the host system for processing. Figure 2. 1: RFID SYSTEM 2. 3 GENERIC RFID TAG ARCHITECTURE The tag contains circuit to both rectify DC power from the incoming RF signal as well as to detect and extract the information modulated on the signal. The antenna load is a controlled resistance that changes the impedance of the dipole, enabling the backscatter. The tag IC is mounted on a carrier known as a strap and subsequently bonded to the antenna to form the fully assembled tag. The chip itself is very small, enabled by modem CMOS technology. The mounting of the die on a carrier has been made very inexpensive and capable of large volume by either flip-flop or by other innovative technique such as the Alien Technologies Fluidic self Assembly process. [pic] Figure 2. 2: Basic Tag IC Architecture 2. 4 Components of a tag The major components of the tag are 1) Microchip. 2) Antenna. 2. 4. 1 Microchip Microchip is electronic equipment consisting of a small crystal of silicon semiconductor fabricated to carry out a number of electronic functions in an integrated circuit. The microchip used in a HF tag is a contact less read/ write passive RFID device that is optimized for 13. 56 MHz RF carrier signal. The device needs an external LC resonant circuit for wireless communication with the interrogator. The device is powered remotely by rectifying an RF signal that is transmitted from the interrogator and transmits or updates its contents from memory-based on commands from interrogator. 2. 4. 2 Antenna The antenna emits the radio signal to activate the tag and reading and writing data to it. Antennas are the conduits between the tag and the transceiver, which controls the system data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built in a door frame to receive tag data from persons or things. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continuously. If constant interrogation is not required, the field can be activated by the sensor device. 2. 5 rfid readers RFID reader is like any other device that can be connected to a PC Or might be in built like an external or internal modem. The RFID reader can be powered by a power source using an adapter †Reader† or †Interrogator†, a device that is able to locate and activate tags so that the information that has been programmed onto the tag is transmitted back to the reader and subsequently to interface computing systems. The information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc. Not only do reader locate activate and receive transmissions from RFID tags, a reader has the ability of sending data back to read/write capable tag in order to append or replace data. Readers exist that can also scan bar codes in environments where both bar codes and RFID are used. 2. 6 COMPONENTS OF A READER The reader has the following main components: ? Transmitter and Receiver ? Microprocessor ? Memory ? I/O channels for external sensors, actuators and annunciators ? Controller ? Communication interface ? Power. [pic] Figure 2. 3: BLOCK diagram of a reader 2. 6. 1 TRANSMITTER The reader’s transmitter is used to transmit AC power and the clock cycle via antennas to the tags in its read zone. This is part of the transceiver unit, the component responsible for sending the reader signal to the surrounding environment and receiving tag responses back via the reader antennas. The antenna ports of reader are connecting to its transceiver component. One reader antenna can be attached to each such antenna port. Receiver receives analog signals from the tag via the reader antenna. It then sends the signals to reader microprocessor, where it is converted to its equivalent digital form. 2. 6. 2 MICROPROCESSOR This component is responsible for implementing the reader protocol to communicate with compatible tags. It performs decoding and error checking of the analog signal from the receiver. In addition, the microprocessor might contain custom logic for doing low level filtering and processing of read tag data. 2. 6. 3 MEMORY Memory is used for storing data such as the reader configuration parameters and list of tag reads. Depending on the memory size, however, a limit applies as to how many such tag reads can be stored at one time. If the connection remains down for an extended period with the reader reading tags during this downtime, this limit might be exceeded an part of the stored data lost. 2. 6. 4 I/O channels Readers do not have to be turned on for reading tags at all time. A sensor of some sort, such as a motion or light sensor, detects the presence of tagged objects in the readers read zone. This sensor can then set the reader on to read this tag. Similarly, this component also allows the reader to provide local output depending on some condition via an annunciators or an actuator. 2. 6. 6 CONTROLLER A controller is an entity that allows an external entity, either a human or a computer program, to communicate with and control a reader’s function and to control annunciators and actuators associated with the reader. . 6. 7 COMMUNICATION INTERFACE The communication interface component provides the communication instructions to a reader that allows it to interact with external entities, via a controller to transfers its stored data and to accept commands and send back the corresponding responses. 2. 6. 8 POWER This component supplies power to the reader component. The power sources g enerally provided to this component through a power cord connected to an appropriate external electrical outlet. 2. 7 COMMUNICATION BETWEEN A READER AND A TAG Depending on the tag type, the communication between the reader and a tag can be one of the following: †¢ Modulated backscatter †¢ Transmitter type †¢ Transponder type The area between a reader antenna and one full wave length of the RF wave emitted by the antenna is called near field. The area beyond one full wavelength of the RF wave emitted from a reader antenna is called far field. Passive rfid systems operating in LF and HF use near field communication, whereas those in UHF and microwave frequencies use far field communication. The signal strength in near field communication attenuates as the cube of the distance from the reader antenna. In far field, it attenuates as square of the distance from the reader antenna. 2. 7. 1 MODULATED BACK SCATTER Modulated backscatter communication applies to passive as well as to semi active tags. In This type of communication, the reader sends out a continuous wave (CW) RF signal containing ac power and clock signal to the tag at carrier frequency. Through physical coupling, the antennas supplies power to the microchip. About 1. 2v are generally necessary to energize the tag microchip for reading microchips. For writing, the microchip usually needs to draw about 2. 2v from the reader signal. The microchip now modulates or breaks up the input signal in to a sequence of on and off patterns that represents its data and transmits it back. When the reader receives this modulated signal, it decodes the pattern and obtains the data. Thus, in modulated backscatter communication, the reader always â€Å"talks† first, followed by the tag. A tag using this scheme cannot communicate at all in the absence of a reader because it depends totally on the reader’s power to transmit its data. pic] Figure 2. 4: backscatter communication 2. 7. 2 TRANSMITTER TYPE This type of communication applies to active tags only. In this type of communication, the tag broadcasts its message to the environment in regular intervals irrespective of the presence or absence of a reader. Therefore, in this type of communication, the tag always â€Å"talks† first rather than the reader. [pic] Figure 2. 5: T RANSMITTER communication 3. 4. 3 TRANSPONDER TYPE In this type of communication, the tag goes to a â€Å"sleep† or in to dormant stage in the absence of interrogation from a reader. In this stage, the tag might periodically send a message to check any reader is listening to it. When a reader receives such a query message, it can instruct the tag to â€Å"wake up† or end the dormant stage. When the tag receives this command from the reader, it exits its current state and starts to act as a transmitter tag again. The tag data is sent only the reader specially asks. [pic] Figure 2. 6: TRANSPONDER communication chapter 3 microcontroller 3. 1 INTRODUCTION The hardware includes the following components: ? Atmega162 (micro controller). ? Power supply. ? In system programming. ? Buzzer. Liquid crystal display. ? Reset. ? Max 232. 3. 2 Hardware details of ATMEGA162 controller Utilizes the AVR – RSIC architecture. 3. 2. 1 Features ? High-performance and Low-power Advanced RISC Architecture. ? Most single clock execution. ? 32 x 8 general purpose working registers. ? Fully static operation. ? On chip 2 cycle multiplier. ? Up to 16 MIPS throughput at 16 MHz. ? 131 powerful instructions. 3. 2. 2 Non-volatile Program and Data Memories ? 16K Bytes of In-System Self-programmable Flash. ? Endurance: 10,000 Write/Erase Cycles. ? 512 Bytes EEPROM. ? 1K Bytes Internal SRAM. Up to 64K Bytes Optional External Memory Space. ? Programming Lock for Flash program and EEPROM data Security. 3. 2. 3 Peripheral Features ? Two 8-bit Timer/Counters with Separate Modes. ? Two 16-bit Timer/Counters with Separate Compare Modes, and Capture Modes. ? Real Time Counter with Separate Oscillator. ? Six PWM Channels. ? Dual Programmable Serial USARTs. ? Master/Slave SPI Serial Interface. ? Programmable Watchdog Timer with Separate On-chip Oscillator. ? On-chip Analog Comparator. ? External and internal interrupt sources. 3. 2. 4 SPECIFICATION ? Low power high speed CMOS process technology. Fully static operation. ? Power consumption at 4 MHz, 3v, 25c. ? Active: 3. 0 MA. 3. 2. 5 Special Microcontroller Features ? Power-on Reset and Programmable Brown-out Detection. ? Internal Calibrated RC Oscillator. ? External and Internal Interrupt Sources. ? Five Sleep Modes: Idle, Power-save, Power-down, Standby, and Extended Standby. 3. 2. 6 I/O and Packages ? 35 Programmable I/O Lines. ? 40-pin PDIP, 44-lead TQFP, and 44-pad MLF. 3. 2. 7 Operating Voltages ? 1. 8 – 5. 5V for ATmega162V. ? 2. 7 – 5. 5V for ATmega162. 3. 2. 8 Speed Grades ? 0 – 8 MHz for ATmega162V. ? 0 – 16 MHz for ATmega162. 3. ATMEGA162 architectural overview The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. . 3. 1 features OF ATMEGA162 The 16K bytes of In-System Programmable Flash with Read-While-Write capabilities, 512 bytes EEPROM, 1K bytes SRAM, an external memory interface, 35 general purpose I/O lines, 32 general purpose working registers, a JTAG interface for Boundary-scan, On-chip Debugging support and programming, four flexible Timer/Counters with compare modes, internal and external interrupts, two serial programmable USARTs, a programmable Watchdog Timer with Internal Oscillator, an SPI serial port, and five software selectable power saving modes. The fast-access Register File contains 32 x 8-bit general purpose working registers with a single clock cycle access time. This allows single-cycle Arithmetic Logic Unit (ALU) operation. In a typical ALU operation, two operands are output from the Register File, the operation is executed, and the result is stored back in the Register File – in one clock cycle. Six of the 32 registers can be used as three 16-bit indirect addresses register pointers for Data Space addressing – enabling efficient address calculations. One of these address pointers can also be used as an address pointer for look up tables in Flash Program memory. These added function registers are the 16-bit X-, Y-, and Z-register, described later in this section. The ALU supports arithmetic and logic operations between registers or between a constant and a register. Single register operations can also be executed in the ALU. After an arithmetic operation, the Status Register is updated to reflect information about the result of the operation. [pic] Figure 3. 1: BLOCK Diagram. Program flow is provided by conditional and unconditional jump and call instructions, able to directly address the whole address space. Most AVR instructions have a single 16-bit word format. Every program memory address contains a 16 or 32-bit instruction. [pic] Figure 3. 2: BLOCK Diagram of the AVR Architecture Program Flash memory space is divided in two sections, the Boot Program section and the Application Program section. Both sections have dedicated Lock bits for write and read/write protection. The SPM instruction that writes into the Application Flash memory section must reside in the Boot Program section. During interrupts and subroutine calls, the return address Program Counter (PC) is stored on the Stack. The Stack is effectively allocated in the general data SRAM, and consequently the Stack size is only limited by the total SRAM size and the usage of the SRAM. All user programs must initialize the SP in the reset routine (before subroutines or interrupts are executed). [pic] Figure 3. 3: Data Memory Map 3. 3. 2 ALU – Arithmetic Logic Unit The high-performance AVR ALU operates in direct connection with all the 32 general purpose working registers. Within a single clock cycle, arithmetic operations between general purpose registers or between a register and an immediate are executed. The ALU operations are divided into three main categories – arithmetic, logical, and bit-functions. 3. 3. 3 Status Register The Status Register contains information about the result of the most recently executed arithmetic instruction. This information can be used for altering program flow in order to perform conditional operations. Status Register format [pic] Bit 7 – I: Global Interrupt Enable: The Global Interrupt Enable bit must be set for the interrupts to be enabled. The individual interrupt enable control is then performed in separate control registers. If the Global Interrupt Enable Register is cleared, none of the interrupts are enabled independent of the individual interrupt enable settings. The I-bit is cleared by hardware after an interrupt has occurred, and is set by the RETI instruction to enable subsequent interrupts. Bit 6 – T: Bit Copy Storage: The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T bit as source or destination for the operated bit. Bit 5 – H: Half Carry Flag: The Half Carry Flag H indicates a half carry in some arithmetic operations. Half Carry is useful in BCD arithmetic. Bit 4 – S: Sign Bit, S = N. V: The S-bit is always an exclusive or between the Negative Flag N and the Two’s Complement Overflow Flag V. Bit 3 – V: Two’s Complement Overflow Flag: The Two’s Complement Overflow Flag V supports two’s complement arithmetic. Bit 2 – N: Negative Flag: The Negative Flag N indicates a negative result in an arithmetic or logic operation. Bit 1 – Z: Zero Flag: The Zero Flag Z indicates a zero result in an arithmetic or logic operation. Bit 0 – C: Carry Flag: The Carry Flag C indicates a carry in an arithmetic or logic operation. 3. 3. 4 Stack Pointer The Stack is mainly used for storing temporary data, for storing local variables and for storing return addresses after interrupts and subroutine calls. The Stack Pointer Register always points to the top of the Stack. The Stack Pointer points to the data SRAM Stack area where the Subroutine and Interrupt Stacks are located. This Stack space in the data SRAM must be defined by the program before any subroutine calls are executed or interrupts are enabled. Stack Pointer FORMAT pic] The Stack Pointer is incremented by one when data is popped from the Stack with the POP instruction, and it is incremented by two when data is popped from the Stack with return from subroutine RET or return from interrupt RETI. The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The number of bits actually used is implementation dependent. 3. 3. 5 Reset and Interrupt Handling The AVR provi des several different interrupt sources. These interrupts and the separate Reset Vector each have a separate program vector in the program memory space. All interrupts are assigned individual enable bits which must be written logic one together with the Global Interrupt Enable bit in the Status Register in order to enable the interrupt. There are basically two types of interrupts. The first type is triggered by an event that sets the Interrupt Flag. For these interrupts, the Program Counter is vectored to the actual Interrupt Vector in order to execute the interrupt handling routine, and hardware clears the corresponding Interrupt Flag. Interrupt Flags can also be cleared by writing a logic one to the flag bit position(s) to be cleared. If an interrupt condition occurs while the corresponding interrupt enable bit is cleared, the Interrupt Flag will be set and remembered until the interrupt is enabled, or the flag is cleared by software. The second type of interrupts will trigger as long as the interrupt condition is present. These interrupts do not necessarily have Interrupt Flags. If the interrupt condition disappears before the interrupt is enabled, the interrupt will not be triggered. 3. 3. 6 In-System Reprogrammable Flash Program Memory The ATmega162 contains 16K bytes On-chip In-System Reprogrammable Flash memory for program storage. Since all AVR instructions are 16 or 32 bits wide, the Flash is organized as 8K x 16. For software security, the Flash Program memory space is divided into two sections, Boot Program section and Application Program section. [pic] Figure 3. 4 Programmable Memory Map The Flash memory has an endurance of at least 10,000 write/erase cycles. The ATmega162 Program Counter (PC) is 13 bits wide, thus addressing the 8K program memory locations. 3. 4 EEPROM Data Memory The ATmega162 contains 512 bytes of data EEPROM memory. It is organized as a separate data space, in which single bytes can be read and written. The EEPROM has an endurance of at least 100,000 write/erase cycles. The access between the EEPROM and the CPU is described in the following, specifying the EEPROM Address Registers, the EEPROM Data Register, and the EEPROM Control Register. 3. 4. 1 EEPROM Read/Write Access The EEPROM Access Registers are accessible in the I/O space. A self timing function, however, lets the user software detect when the next byte can be written. If the user code contains instructions that write the EEPROM, some precautions must be taken. In heavily filtered power supplies, VCC is likely to rise or fall slowly on Power-up/down. This causes the device for some period of time to run at a voltage lower than specified as minimum for the clock frequency used. In order to prevent unintentional EEPROM writes, a specific write procedure must be followed. The EEPROM Address Register [pic] Bits 15. 9 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bits 8. 0 – EEAR8. 0: EEPROM Address The EEPROM Address Registers – EEARH and EEARL specify the EEPROM address in the 512 bytes EEPROM space. The EEPROM data bytes are addressed linearly between 0 and 511. The initial value of EEAR is undefined. A proper value must be written before the EEPROM may be accessed. The EEPROM Data Register –EEDR [pic] Bits 7. 0 – EEDR7. 0: EEPROM Data For the EEPROM write operation, the EEDR Register contains the data to be written to the EEPROM in the address given by the EEAR Register. For the EEPROM read operation, the EEDR contains the data read out from the EEPROM at the address given by EEAR. The EEPROM Control Register – EECR [pic] Bits 7. 4 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bit 3 – EERIE: EEPROM Ready Interrupt Enable Writing EERIE to one enables the EEPROM Ready Interrupt if the I bit in SREG is set. Writing EERIE to zero disables the interrupt. The EEPROM Ready interrupt generates a constant interrupt when EEWE is cleared. Bit 2 – EEMWE: EEPROM Master Write Enable The EEMWE bit determines whether setting EEWE to one cause the EEPROM to be written. When EEMWE is set, setting EEWE within four clock cycles will write data to the EEPROM at the selected address. If EEMWE is zero, setting EEWE will have no effect. When EEMWE has been written to one by software, hardware clears the bit to zero after four clock cycles. See the description of the EEWE bit for an EEPROM write procedure. Bit 1 – EEWE: EEPROM Write Enable The EEPROM Write Enable signal EEWE is the write strobe to the EEPROM. When address and data are correctly set up, the EEWE bit must be written to one to write the value into the EEPROM. The EEMWE bit must be written to one before a logical one is written to EEWE; otherwise no EEPROM write takes place. The following procedure should be followed when writing the EEPROM (the order of steps 3 and 4 is not essential): 1. Wait until EEWE becomes zero. 2. Wait until SPMEN in SPMCR becomes zero. 3. Write new EEPROM address to EEAR (optional). 4. Write new EEPROM data to EEDR (optional). 5. Write a logical one to the EEMWE bit while writing a zero to EEWE in EECR. 6. Within four clock cycles after setting EEMWE, write a logical one to EEWE. The EEPROM can not be programmed during a CPU write to the Flash memory. The software must check that the Flash programming is completed before initiating a new EEPROM write. Step 2 is only relevant if the software contains a Boot Loader allowing the CPU to program the Flash. If the Flash is never being updated by the CPU, step 2 can be omitted. Caution: An interrupt between step 5 and step 6 will make the write cycle fail, since the EEPROM Master Write Enable will time-out. If an interrupt routine accessing the EEPROM is interrupting another EEPROM access, the EEAR or EEDR Register will be modified, causing the interrupted EEPROM access to fail. It is recommended to have the Global Interrupt Flag cleared during all the steps to avoid these problems. When the write access time has elapsed, the EEWE bit is cleared by hardware. The user software can poll this bit and wait for a zero before writing the next byte. When EEWE has been set, the CPU is halted for two cycles before the next instruction is executed. Bit 0 – EERE: EEPROM Read Enable The EEPROM Read Enable Signal EERE is the read strobe to the EEPROM. When the correct address is set up in the EEAR Register, the EERE bit must be written to a logic one to trigger the EEPROM read. The EEPROM read access takes one instruction, and the requested data is available immediately. When the EEPROM is read, the CPU is halted for four cycles before the next instruction is executed. The user should poll the EEWE bit before starting the read operation. If a write operation is in progress, it is neither possible to read the EEPROM, nor to change the EEAR Register. 3. 5 Timing External memory devices have various timing requirements. It is important to consider the timing specification of the external memory device before selecting the wait-state. The most important parameters are the access time for the external memory in conjunction with the set-up requirement of the ATmega162. [pic] Figure 3. 5: External Data Memory Cycles without Wait-state. 3. 6 Crystal Oscillator XTAL1 and XTAL2 are input and output, respectively, of an inverting amplifier which can be configured for use as an On-chip Oscillator. Either a quartz crystal or a ceramic resonator may be used. C1 and C2 should always be equal for both crystals and resonators. The optimal value of the capacitors depends on the crystal or resonator in use, the amount of stray capacitance, and the electromagnetic noise of the environment. The Oscillator can operate in four different modes, each optimized for a specific frequency range. [pic] Figure 3. 6: Crystal Oscillator Connections 3. 6. 1 Low-frequency Crystal Oscillator The Low-frequency Crystal Oscillator must be selected by setting the CKSEL Fuses to â€Å"0100†, â€Å"0101†, â€Å"0110† or â€Å"0111†. The crystal should be connected as shown in Figure. If CKSEL equals â€Å"0110† or â€Å"0111†, the internal capacitors on XTAL1 and XTAL2 are enabled, thereby removing the need for external capacitors. The internal capacitors have a nominal value of 10 pF. When this Oscillator is selected, start-up times are determined by the SUT Fuses (real time-out from Reset) and CKSEL0 (number of clock cycles) as shown in below tables [pic] Table 4. 1 Start-up DELAYS from Reset when Low-frequency Crystal Oscillator is selected . 7 Watchdog Timer If the Watchdog Timer is not needed in the application, this module should be turned off. If the Watchdog Timer is enabled, it will be enabled in all sleep modes, and hence, always consume power. In the deeper sleep modes, this will contribute significantly to the total current consumption. Chapter 4 Intelligent campus using rfid 4. 1 INTRODUCTION This project describes about the efficient used of RFID technology around us, it also describes about the use of both hardware and software. In addition we also focus on monitoring every individual inside the campus. 4. 2 Basic setup [pic]Figure 4. 1 basic setup The basic external setup for the project is shown in figure 8. 1. The HF reader is connected to microcontroller through RS-232 cable and the IR pairs are connected to the port pins of microcontroller. The microcontroller is then connected to the host computer (server) through RS-232 cable. The detailed explanation of the blocks are given below 4. 3 PERIPHERALS 4. 3. 1 I/O PORTS All AVR ports have true read-modify-write functionality when used as general digital I/O ports. This means that the direction of one port pin can be changed without unintentionally changing the direction of any other pin with the SBI and CBI instructions. Port A Port A is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port A, one each for the Data Register – PORT A, SIB($IB($3B), Data Direction Register – DDRA, $1A($3A) and the Port A. Input Pins – PINA, $19($39). The Port A Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port B Port B is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port B, one each for the Data Register – PORT B, $18($38), Data Direction Register – DDRB, $17($37) and the Port B Input Pins – PINB, $16($36). The Port B Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port C Port C is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port C, one each for the Data Register – PORT C, $15($35), Data Direction Register – DDRC, $14($34) and the Port C Input Pins – PINC, $13($33) The Port C Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port D Port D is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port D, one each for the Data Register – PORT D, $12($32), Data Direction Register – DDRD, $11($31) and the Port D Input Pins – PIND, $10($30). The Port D Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. 4. 4 USART (Universal Synchronous and Asynchronous serial Receiver and Transmitter): The Universal Synchronous and Asynchronous serial Receiver and Transmitter (USART) is a highly flexible serial communication device. The main features are: ? Asynchronous or Synchronous Operation ? Master or Slave Clocked Synchronous Operation ? Odd or Even Parity Generation and Parity Check Supported by Hardware ? Data Overrun Detection ? Framing Error Detection ? Three Separate Interrupts on TX Complete, TX Data Register Empty and RX Complete ? Multi-processor Communication Mode ? Double Speed Asynchronous Communication Mode The ATmega162 has two USARTs, USART0 and USART1. USART0 and USART1 have different I/O Registers. Portd0 is the receiver pin and portd1 is the transmitter pin. Here we are using IC MAX232 as a UART driver. [pic] Figure 4. 2 uart driver. 4. 4. 1 AVR UART – Compatibility The USART is fully compatible with the AVR UART regarding: ? Bit locations inside all USART Registers ? Baud Rate Generation ? Transmitter Operation ? Transmit Buffer Functionality ? Receiver Operation 4. 4. 2 USART Initialization The USART has to be initialized before any communication can take place. The initialization process normally consists of setting the baud rate, setting frame format and enabling the Transmitter or the Receiver depending on the usage. For interrupt driven USART operation, the Global Interrupt Flag should be cleared (and interrupts globally disabled) when doing the initialization. The TXC Flag can be used to check that the Transmitter has completed all transfers, and the RXC Flag can be used to check that there are no unread data in the receive buffer. 4. 5 SENSOR Sensors are the devices that are used to convert the physical parameter into signal that can be measured electrically and it can be easily given as an input to the microcontroller. The effectual sensor should have the following properties namely, ? Sensor should be sensitive to measured property. ? It should be insensitive to any other property. ? It should not influence any other property. An IR sensor is used. It uses IR LED as an IR transmitter, which emits IR rays in the wavelength of 940 nm and a phototransistor is used as IR receiver, which detects IR rays and the output comes in collector. If the receiver is receiving IR rays the output will be low otherwise output is high. The output of the receiver is given to the comparator chip LM393, which compares the receiver output with the prefixed voltage signal. The output of the comparator is given to microcontroller. [pic] Figure 4. 3 CIRCUIT DIAGRAM OF IR SENSOR 4. 5. 1 IR TRANSMITTER LED, a special type of semiconductor diode that has a pn junction acts as a transmitter. The wavelength and the color of the light depend on the band gap energy of the material forming pn junction. The materials used for a LED have a direct band gap energy corresponding to near IR, but Germanium and silicon are indirect band gap materials resulting in a non – radiative recombination. Hence does not emit light. The advantages of LED over incandescent sources are: ? Less costly Long life span ? Insensitive to vibration and shocks. 4. 5. 2 IR RECEIVER A phototransistor is used to detect the IR rays from the LED. It is a bi polar junction that is encased in a transparent case so that light can reach the base collector junction. The phototransistor works like a photodiode with a very high very high sensitivity for light, because the electrons that are gene rated by photons in the base collector junction are injected to base and amplified like a transistor. It has a slower response time than photodiode. [pic] Figure 4. 4 BLOCK DIAGRAM OF IR SENSOR 4. 5. 3COMPARATOR The comparator is a circuit which compares a signal voltage applied at one input of an op-amp with a known reference voltage at the other input. For an inverting comparator the reference voltage is applied to the (+) input and input is given to the (-) terminal. The common mode voltage range includes ground, and the differential input voltage equals power supply voltage. [pic] Figure 4. 5: PIN CONFIGURATION OF LM 393 4. 6 BUZZER It is a transducer which converts electrical signal to sound signal. Piezoelectricity is the ability of certain crystals to produce a voltage when subjected to mechanical stress. The effect is reversible (i. . ) crystals when subjected to external applied voltage can change shape by a small amount and the effect is of nanometers. [pic] Figure 4. 6 circuit diagram of buzzer 4. 7 RS-232C RS-232 stands for Recommend Standard number 232 and C is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. [pic] Fig ure: 4. 7. RS-232 CONNECTOR 4. 7. 1 DB9 INFORMATION The DB9 connection has 9 pins which are each described in the below table. The illustration below is an example of the female serial connector, which would usually be located on the connector that would connect to the computer. 9 pin connector on a DTE device (PC connection) | |Pin No |Direction of the signal | |1 |Carrier(CD) ( from DCE) incoming signal from the modem | |2 |Received data (RD) incoming data from DCE | |3 |Transmit data (TD) outgoing data to a DCE | |4 |Data terminal ready (DTR) outgoing handshake signal | |5 |Signal ground common reference voltage | |6 |Data set ready (DSR) incoming handshaking signal | |7 |Request to send (RTS) outgoing flow control signal | |8 |Clear to send (CTS) incoming flow control signal | |9 |Ring indicator (RI) (from DCE) incoming signal from a modem | Table: 4. 1: DB9 connector DTE stands for Data Terminal Equipment, and DCE stands for Data Communications Equipment. These terms are used to indicate the pin-out for the connectors on a device and the direction of the signals on the pins The RS-232 standard states that DTE devices use a 9-pin male connector, and DCE devices use a 9-pin female connector. 4. 8 LCD LCD is an output device which is used to display a character or a text through microcontroller. So, the LCD is connected in the output port pins of microcontroller. A 2 line LCD display has totally 32 pins. 32 characters can be displayed in our LCD. [pic] Figure 4. 8: 16Ãâ€"2 LCD DISPLAY The starting address for the first line is $80 and for end address is $8F and for second line the starting address is $C0 and the end address is $CF. Pin no |Pin name |I/P or O/P |External connection |Function | |1 |VSS |– |Power supply |GND | |2 |VDD |– | |+5V | |3 |VO |– | |V lcd adjustment | |4 |RS |I/p |MPU |Register select signal | |5 |R/W |I/p |MPU |Read/write select signal | | | | | |Read-1; write-2. | |6 |E |I/p MPU |Operation enable signal | |7-10 |DB0-DB3 |I/p |MPU |Lower order lines | |11-14 |DB4-DB7 |I/p |MPU |Higher order lines | |15-16 |LED,,+,, |I/p |LED backlight power supply |LED,,+,, voltage | | |LED,,-,, | | |type : 4. 2V;Max: 4. 5V | | | | | |LED,,-,, : GND | Table 4. 2 discription of lcd terminals Chapter 5 VISUAL BASIC 5. 1 INTRODUCTION The Visual Basic language is quite powerful – if one can imagine a programming task; it can probably be accomplished using Visual Basic. Once the basics of Visual Basic are understood then one becomes productive. 5. 2 About Visual Basic The â€Å"Visual† part refers to the method used to create the graphical user interface (GUI), Rather than writing numerous lines of code to describe the appearance and location of interface elements, simply add pre built objects into place on screen. The â€Å"Basic† part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more programmers. Visual Basic has evolved from the original BASIC languages and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to accomplish anything that can be accomplished using any other Windows programming language. The Visual Basic programming language is not unique to Visual Basic. The Visual Basic programming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The Visual Basic Scripting Edition (VB Script) is a widely used scripting language and a subset of the Visual Basic language. The investment one makes in learning Visual Basic will carry over to many other areas. Whether the goal is to create a small utility for an individual, a work group a large enterprise-wide system, or even distributed applications spanning the globe via the Internet, Visual Basic has the required tools. 5. 3 ADVANTAGES ? Data Access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ? ActiveXTM Technologies allow you use the functionality provided by other applications, such as Microsoft Word Processor, Microsoft Excel spreadsheet, and other Windows applications. Even applications can be automated and objects can be created using the Professional or Enterprise editions of Visual Basic. ? Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within the application, or to create Internet server applications. ? The finished application is a true. exe file that uses a Visual Basic Virtual Machine that you can freely distribute. 5. 4 Program description The front end is visual basic and this programming concept is chosen because it is more users friendly. The information or the status about the persons is displayed and the same can be stored in a database so that it can be accessed later. [pic] Figure 5. : output and database creation, checking form Chapter 6 conclusion RFID technology is a budding technology that is fast growing world wide. RFID proves to be cutting edge technology through its applications. This project moves a step ahead in RFID’s application and presents a new dimension to view through. This project proves to be entirely different and innovative of RFID technology with the existing components. Such an introduction of a new methodology in the RFID technology enhances its use and improves the present knowledge. The project â€Å"INTELLIGENT campus using RFID† will sure make a great difference in the present industrial applications of RFID. It will provide the ultimate solution for the problems that exists in various cases. This is a prototype of the proposed idea wherein the entire reason behind it is to provide a fully compact, covering larger distance. 6. 1 PROCESS EXPLANATION The various processes that take place during the working of the project are as follows: The RFID tag is a passive, high frequency device in which some unique data’s can be stared in the form of serial numbers known as ELECTRONIC PRODUCT CODE (EPC). Whenever the RFID tag comes in the field of a particular reader, the reader detects the tag and sends the detected information about the EPC to the microcontroller. ACTIVITY FLOWCHART Figure 6. 1: activity flow chart The received information will be fed into the microcontroller which compares the epc number to specific information’s about group of individuals. If the received information is already in the list, it will allow the user to enter inside the campus and also maintains a database for storing this information. The reader refreshes its data continuously checks after certain amount of time interval and when the RFID reader detects the absence of a tag it will remove the tag details from the list. The database can be created with the help of visual basic programming. [pic] Figure 6. 2: database creation of persons entering into the campus Whenever the tag enters into a specific location such as class rooms, library etc, the reader present in that location will detects the tag. Two IR transmitter – receiver pairs are used for the purpose of monitoring whether the person is entering the room or leaving the room. The IR rays interfering sequence is fed to the microcontroller and it is used for detecting the status of the person having that particular tag. The details or the status are also saved into database using visual basic coding. The databases can be shared in the network and it can be used for finding or monitoring each and every individual belonging to that campus. [pic] Figure 6. 3: database creation of persons entering into PARTICULAR LOCATION. The same can be used to find the individual location using search option. 6. 2 FUTURE ENHANCEMENTS The project could further be developed and enhanced in an effective way by suitable polarization RFID reader antennas and increasing the frequency range so that it would not only provide the solution for monitoring persons in a smaller area as mentioned in this model. The security can also be increased by replacing IR devices by some bio-metric ideas. ———————– 162- MICRO CONTROLLER LCD I/O P O R T S I/O P O R T S BUZZER IR 1 IR 2 USART USART PC RFID END CREATES A DATA BASE (In/Out) 1-2 OR 2-1 Yes No Interruption Occurred CHECHS FOR IR SIGNAL CREATES A DATA BASE (Present inside the campus) INFORMATION TRANSFER FROM RFID READER TO M162 Yes RFID TAG PRESENT No READER SIGNAL TRANSMIT START

Thursday, November 7, 2019

Free Essays on Stopping By The Woods...Robert Frost

Robert Frost ’s poem â€Å" Stopping by the Woods on a Snowy Evening† caught our eyes with his love of nature. People can really feel the nature it makes them feel like they were in the woods. In detail, he descriptively describing the setting so precisely like he was the one in the poem. Is a poem about getting away, away from the reality life: Survivor, life journey, and death? By reading these poems does it make us think even more about life and where is going to lead? In the poem of â€Å" Stopping by the Woods on a Snowy Evening†, Robert Frost illustrated and clearly explained the setting very effectively. The setting is very important tools for Frost in writing this our journey to do whatever we have to do to get the job done. The job might be a difficult and stressful but that is life we known. That is how society work these days its never a happy world.... Free Essays on Stopping By The Woods...Robert Frost Free Essays on Stopping By The Woods...Robert Frost Robert Frost ’s poem â€Å" Stopping by the Woods on a Snowy Evening† caught our eyes with his love of nature. People can really feel the nature it makes them feel like they were in the woods. In detail, he descriptively describing the setting so precisely like he was the one in the poem. Is a poem about getting away, away from the reality life: Survivor, life journey, and death? By reading these poems does it make us think even more about life and where is going to lead? In the poem of â€Å" Stopping by the Woods on a Snowy Evening†, Robert Frost illustrated and clearly explained the setting very effectively. The setting is very important tools for Frost in writing this our journey to do whatever we have to do to get the job done. The job might be a difficult and stressful but that is life we known. That is how society work these days its never a happy world....