Monday, September 30, 2019

Using Satire to Create Awareness of Gender Roles: Egalia’s Daughters

Egalia’s Daughters and â€Å"Sultana’s Dream†Egalia’s Daughters and â€Å"Sultana’s Dream† both portray examples of what it would be like to have gender roles reversed in societies. They both criticize gender roles and show people how gender discrimination leaves the submissive gender in suppressed conditions. Poking fun at gender role reversal was one way these books helped in educating the readers. â€Å"Sultana’s Dream† has a time of setting of the early twentieth century. The author of Egalia’s Daughters is Gerd Brantenberg, born on October 27th, 1941 and is presently still alive. She was born in Oslo but grew up in Fredrikstad which is the largest city in Norway. Some of her greatest accomplishments are establishing women’s shelters, working in lesbian movements, in 1978 she created a literary Women’s Forum, her drive being to encourage all women to write and publish, and lastly she has also published ten novels and two plays. In 1983 she was awarded the Mads Wiel Nygaards Endowment. Rokeya Hossain was born in 1880 and died on December 9th, 1932. She was born into a Bengali Muslim upper-class family in the village of Pairaband. Her main accomplishments were establishing the Sakhawat Memorial Girls’ School in 1909, in 1916 she founded the Anjuman-e-Khawatin-e-Islam, and even though English was her 5th language she still wrote a book in English to show her proficiency in English to her husband. In Gerd Brantenberg’s novel she clearly shows that in her society women were put on the back burner just like the men were in her novel. Gerd was born back when women had very little rights. She lived during a time where women were stepping up and rallying against the fact that they were not allowed certain rights that men were allowed and this showed in her book. For example in Egalia’s Daughters the guys or the â€Å"menwim† have the â€Å"burning of the pehos† along with other â€Å"masculist activities. † 1 In Rokeya Hossain’s short story she is trying to relate to her readers about the inequality of her society and the dominance of one gender over another. â€Å"In ladyland men are a part of the society but are shorn of power, as women were in Rokeya’s India. They live in seclusion and look after the house and the children, again, just like the women in Rokeya’s India. † 2 Her society must have had a lot of sins and hatred along with harm because in the short story it says â€Å"this is Ladyland, free from sin and harm. 3 In â€Å"Sultana’s Dream† women became dominant when men failed to win the war against a nearby country. The women then became the dominant gender by using science and advanced technology to then win the war. At first they were taunted for being smart and into science instead of being focused on military strength like the men. In the end it paid off being smart because â€Å"they directed all of the rays of the sunlight and heat toward the enemy. The heat and light were too much for them to bear. They all ran away panic-stricken, not knowing in their bewilderment how to counteract the scorching heat. 4 This was a major turning point in the story because at that moment the men thought that there was no hope for their country which is why they went into the zenanas without protest and were locked in. The men then remained in seclusion and got used to the â€Å"purdah system†. 4 The women then â€Å"rule over the country and controlled all social matters. † 5 Since that point there had been â€Å"no more crime or sin† and that is how it remained. 5 In Egalia’s Daughters women being the dominant gender went a little differently. The women in this novel ruled from the beginning. There was never a time in their culture that males ruled before the females. Spinnerman Owlmoss explained to the boys that â€Å"the menstrual cycle in wom was precisely what bound the huwom race to life, to nature’s own great cycle and to the phases of the moon. By virtue of this endlessly recurring rhythm in her body, she was bound in a very different way, to nature, and this contact with her natural surroundings gave her an inner power and strength, which allowed her to dominate nature and the environment. In the same way that she dominated her own body by releasing an egg once a month. Wim therefore had greater control over everything; over their own bodies, over the cultivation of the soil, and over the world. 6 Therefore, the wim were in charge from the very beginning. In â€Å"Sultana’s Dream† women’s religion was â€Å"based on love and truth. † 7 The women say â€Å"we don’t take pleasure in killing a creature of god, especially a human being. † 7 They believe this works because unlike the men who were violent and fought in the war, they used science to win without hurting anyone. As far as biology goes, basically the women explained their power over the men because of the simple fact that they were smarter and that women’s brains are rather quicker than men’s. They pretty much said men are good for nothing. All of that together was their argument for why they were biologically better. In the novel, Sister Sarah explains why women are smarter than the males. She says â€Å"our good Queen liked science very much. She circulated an order that all the women in her country should be educated. Accordingly a number of girls’ schools were founded and supported by the Government. Education was spread far and wide among women. And early marriage also stopped. † This is her explanation of why the women are so much smarter than men and now are the dominant race. Religion in Egalia’s Daughters is quite different. In this novel, God is a wim instead of a manwim. Donna, who is wim and also God’s daughter who is like Jesus for Egalia, and they are the ones all Egalia are supposed to look up to. The reason wim in Egalia are more biologically dominant is because they bear the children and have the menstrual cycles. For some reason the people of Egalia felt that since they had a monthly natural cycle it connected them to nature and made them powerful, more powerful than any man. This in their thoughts made them the dominant gender as if they were the chosen ones. As far as history goes Spinnerman Owlmoss taught his class the history of the wim. Like we in our society have fore fathers they had a version of those except they were women. Those women created rules and regulations for Egalia that were always followed. In Ladyland the men and the women both had very different jobs. The men â€Å"do no skilled work† and â€Å"they look after the house and children. † 2 They â€Å"mind babies, cook, and do all sorts of domestic work. † 2 The women in Ladyland embroider; engage in scientific researches and garden. Sister Sarah says that â€Å"our noble Queen is exceedingly fond of botany; it is her ambition to convert the whole country into one grand garden. † 5 Therefore, they are never sitting still and constantly gardening and such. In the town of Egalsund, the wim and menwim had very different jobs. The menwim do nothing but sit at home and take care of their children. Once they receive â€Å"fatherhood protection† from the wim, they are to stay home and raise the children while the wim goes to work and does as she pleases. 8 The wim of course, do all the things a man would do in our society now. They were sailors too. Menwim were never sailors and hardly allowed to be either because the wim said â€Å"they’re always trouble! They never leave the us in peace and there’ll be strife and quarrelling and jealousy in the crew. † 9 The wim also hold government positions and hunt as well. In both the short story and novel the women’s jobs were viewed as more important even though staying home and taking care of the kids was a really big and important job as well. It was just not viewed that way by the women. In both Egalia’s Daughters and â€Å"Sultana’s Dream† the women/wim were very happy. They were at the top of the pecking order and they liked it that way. Women/wim ruled and things happened as they wanted it to, not the other way around. On the other hand, the men/menwim were by any means happy with their lives. The men in â€Å"Sultana’s Dream† at first protested. The men wanted to be free, but Her Royal Highness told them if their services were ever needed they would be sent for, so therefore, they should remain where they were. After that they slowly became accustom to the â€Å"purdah system. † 4 In Egalia’s Daughters at first they were accustom to the way things were. Then later on in the book, the menwim began to protest. They give speeches, burn pehos, and strip down at the menstrual games out of chicken costumes as a way of protesting. 10 Women have always been suppressed throughout history, constantly having to fight for their rights. Women in history have always been taken advantage of and also been able to be rough housed a lot easier than men because of their gentle nature. Therefore, these fictional books are related in the sense that in these books, the men’s roles are actually what women’s roles have been all along throughout history. Women are the ones that have always been raped and beaten but in the novel Egalia’s Daughters the boys are actually the ones that are terrorized. Is satire an effective way of drawing attention to gender inequality? Yes, it is because it makes things appear even more ridiculous which in turn makes it more entertaining to read. For example if both books had it where women’s and men’s roles were normal, the books would have been boring and lacked in attention grabbers. But since it was a bizarre setting, it makes you immediately more interested and it puts a twist on things so that it captures your attention. . Brantenberg, Gerd. Egalia's Daughters: A Satire of the Sexes, translated by Louis Mackay. (California: Seal Press, 1977), 218. 2. Jahan, Roshan. â€Å"‘Sultana's Dream': Purdah Revisited,† in Rokeya Sakhawat Hossain, Sultana's Dream and Selections from the Secluded Ones. Edited and translated by Roushan Jahan. (New York: The Feminist Press, 1988), 4. 3. Jahan, Roshan. â€Å"‘Sultana's Dream': Purdah Revisited,† in Rokeya Sakhawat Hossain, Sultana's Dream and Selections from the Secluded Ones. Edited and translated by Roushan Jahan. (New York: The Feminist Press, 1988), 8. 4. Jahan, Roshan. â€Å"‘Sultana's Dream': Purdah Revisited,† in Rokeya Sakhawat Hossain, Sultana's Dream and Selections from the Secluded Ones. Edited and translated by Roushan Jahan. (New York: The Feminist Press, 1988), 14. 5. Jahan, Roshan. â€Å"‘Sultana's Dream': Purdah Revisited,† in Rokeya Sakhawat Hossain, Sultana's Dream and Selections from the Secluded Ones. Edited and translated by Roushan Jahan. (New York: The Feminist Press, 1988), 15. 6. Brantenberg, Gerd. Egalia's Daughters: A Satire of the Sexes, translated by Louis Mackay. (California: Seal Press, 1977), 168. 7. Jahan, Roshan. ‘Sultana's Dream': Purdah Revisited,† in Rokeya Sakhawat Hossain, Sultana's Dream and Selections from the Secluded Ones. Edited and translated by Roushan Jahan. (New York: The Feminist Press, 1988), 16. 8. Brantenberg, Gerd. Egalia's Daughters: A Satire of the Sexes, translated by Louis Mackay. (California: Seal Press, 1977), 37. 9. Brantenberg, Gerd. Egalia' s Daughters: A Satire of the Sexes, translated by Louis Mackay. (California: Seal Press, 1977), 72. 10. Brantenberg, Gerd. Egalia's Daughters: A Satire of the Sexes, translated by Louis Mackay. (California: Seal Press, 1977), 251.

Sunday, September 29, 2019

Geologic Time Worksheet Axia W3D5

Associate Level Material Mary Miles Geologic Time Worksheet Use the following table to compare ways of evaluating geologic time. Your description, similarities, and differences must each be at least 50 words. |Time Evaluation Method |Description |Advantages of this Method |Disadvantages of this Method | |Relative dating |Relative dating is the process |There are a few advantages of |The disadvantage to relative | | |of estimating the order of |relative dating.One is that |dating is that an exact time | | |events but not necessarily |this is an estimate of the age |cannot be given to a rock | | |determining when the events |of a structure. Meaning that |structure or fossil. This method| | |occurred.When looking at rocks |there is room for error. This |is only an estimate and because | | |and fossils the deeper the |method is good if weathering or |of that the true time in which a| | |structure or fossil the older it|erosion is prevalent. Because |rock structure or fossil was | | |is.D uring this process there is|some of the rock structure is |started or deposited cannot be | | |not exact age or date that is |missing or interrupted exact age|determined. | | |given to a rock or fossil only |would not be able to be found. | | | |an estimate of when it stated or| | | | |was alive. | | |Absolute dating |Absolute dating is a process in |The advantage to absolute dating|The disadvantage of absolute | | |which geologists or other earth |is that an exact age can be |dating is not every rock | | |scientists determine the |determined for a rock structure |structure or fossil’s exact age | | |specific age of a rock |or fossil. This is beneficial to|cannot be determined.Depending | | |structure, fossil or other |scientists to help determine the|on where a fossil is found or | | |scientific site or structure. |age of the earth and the rock |what mineral make up the rock | | |Absolute dating allows a |structures it contains. |structure will determine if | | |numerical ag e to be determined | |absolute dating would be | | |for a fossil or strata. |appropriate. | In the following space, explain the role of fossils in developing the Geologic column. Your explanation must be between 200 and 300 words. The geologic column is the putting together all known strata and matching them up in chronological order. Fossils are an important factor when developing the Geologic column. Depending on if there are any fossils present in a sediment layer and if there are determining what the fossil is can help determine which eon all strata stated to form in.The geologic column is divided to several different time frames. These time frames are referred to as eons, eras, periods and epochs. Most of the Earth’s existence can be separated into three eons. Each eon in earth’s existence lasted at least a hundred million years. The first two eons that earth existed fossils were very rare or hard to find. Those two eons are referred to as the Archean eon and the Proterozoic. The most recent area is referred to as the Phanerozoic eon. The Phanerozoic eon is the most recent eon and is the only eon that contains a lot of fossils.Significant changes happened to the fossil assembly during the three eras that took place during the Phanerozoic eon. The three eras of the Phanerozic eon are Paleozoic, Mesozoic, and Cenozoic. These eras have been divided by significant extinction events. The era that is very important is the Paleozoic. This is because during this time was the first appearance of hard bodied animals that fossilize much better then soft bodied organisms. Reference: Murck, B. W. , Skinner, B. J. , & Mackenzie, D. (2010). Visualizing geology (2nd ed. ). Hoboken, NJ: Wiley.

Saturday, September 28, 2019

Energy Drinks

Introduction Sir Isaac Newton was right when he saidâ€Å"what goes up must come down† . This rings true when talking about energy drinks. These products promise to provide heightened awareness, more energy, more endurance some even reference to the consumer you will have wings. So when consuming these products what are you really drinking? Do they provide the energy boost they promise? Are they harmful? Should the FDA do more investigating into the safety of these so-called energy drinks?These are questions I had going into this as a consumer of energy drinks myself, I was interested in how harmful they are too the consumer. In this paper I hope to provide a better insight to a product that is popular and in demand; but little is known about. What Are You Drinking? Energy drinks contain most of the same major ingredients caffeine, taurine, glucronolactone, niacin and panax ginseng just to list a few. Let’s start with caffeine it is a central nervous system stimulant th at has the effect of temporarily warding off drowsiness and restoring alertness.As of studies done by (Lovett, Richard) 90% of adults consume caffeine daily in different ways. Most of the energy from these drinks comes from the sugar and caffeine not the unnecessary extras (Suzanne Farrell MS, RD). Taurine another main ingredient is actually an amino acid that is found in the human body it is a natural substance that our bodily systems encounter every day. However in these energy drinks it is a synthetic element.Then there is Ginseng is known as an adaptogen, which means it increases resistance to physical, chemical, and biological stress and builds energy and general vitality. These are just a couple of the things in what seems to be in a lot of the energy drinks. The rest of the scientific sounding ingredients came up to be not relevant to the effects these drinks promise. |Beverage  (250 ml) |Caffeine   content | |Cocaine energy drink |280mg |Full Throttle |144mg | |Monster |160mg | |Impulse |88 mg | |Red Bull |80 mg | |Naughty Boy |80mg | |'V' |78 mg | |Coca-Cola |48. 75 mg | Do These Drinks Provide The Effects They Promise?Most drinks provide some combination of B vitamins (which help convert sugar to energy and help regulate red blood cells, which deliver oxygen), amino acids (e. g. , taurine), antioxidants(milk thisle, vitamin C), and stimulants, ranging from the reliable (caffeine, guarana) to the alleged (horny goat weed). Yes, they do. Smit and colleagues found that energy drinks, as compared to placebo, had energizing effects among 18 to 55 year old participants, with effects being strongest 30 to 60 minutes after consumption and sustained at least 90 minutes. Caffeine was found to be the primary constituent responsible for these effects. Although there is no human requirement for caffeine, even low doses of caffeine (12. 5 to 100 mg) improve cognitive performance and mood (Smit HJ).Because this is still such an understudied topic it is ha rd to say that these drinks provide the effect they promise. The fact is caffeine affects everyone different due to age, size, tolerance, consumption and lack of sleep all these things contribute to how these drinks will affect you. Are They Harmful? This question was the one I was most interested in there is so much controversy around this question. Many energy drinks have a very high percentage of carbohydrates that can make it more difficult for food and nutrients to be absorbed into the bloodstream from the intestines. In some cases, gastrointestinal problems and distress are a possibility.When an energy drink has a high sugar content, it can have a laxative effect, as well as causing a sudden â€Å"crash† when the sugar leaves the bloodstream and the energy high disappears. Researchers found that within four hours of drinking various energy drinks, the 15 participants' blood pressure rates increased approximately 10 percent for the systolic rate, 8 percent for the diasto lic rate and heart rates increased 11 percent (Wayne state university study). When given to test rats in an experimental laboratory, it was found that the taurine caused anxiety, irritability, high sensitivity to noise, and self-mutilations. However, this data does not mean that the same effects will occur in humans the differences between rats and people are obviously substantial.That to me seems sort of scary. The Australian Consumers' Association advises that while energy drinks may be scientifically safe, young people especially need to be aware of their contents. Research shows that children and young people who consume energy drinks may suffer sleep problems, bed-wetting and anxiety. Children who consume two or more cans of energy drinks a day may become irritable and anxious. Women who are pregnant are advised to avoid energy drinks (especially during the first three months of pregnancy), as high amounts of caffeine can increase the risk of miscarriage, difficult birth and de livery of low-weight babies. (Australian Consumers Association)Drinking these drinks while consuming alcohol can also be very harmful there have been reports of young people dying, possibly as a result of mixing of alcohol and energy drinks. Also Since the absorption of nutrients is slower; there is a large chance that the fluid absorption rate of the body is also slower. Difficulty in natural re-hydration of the body during workouts can cause danger to the person’s health. Athletes, who lose great quantities of fluids during games and practices, should be aware of this circumstance for they are one of the target markets of energy drinks. Should The FDA Do More Investigating As To The Safety Of Energy Drinks? Regulation of foods and drugs in the United States falls under the guidance of the Food and Drug Administration under the Federal Food, Drug, and Cosmetic Act (FDCA).Functional foods, like energy drinks, may be regulated as foods, dietary supplements, drugs, medical food s or food for special dietary use. Though energy drinks have many of the same qualities as soft drinks, which are regulated as foods, they are regulated differently because the functional beverage industry is part of the trend of â€Å"nutraceutical foods† that occupies the gray area between food and dietary supplements. Dietary supplements are generally characterized as foods, despite their drug-like properties and their lack of testing on the market. The U. S. Food and Drug Administration have not conducted any serious investigations into the safety of energy drinks.As dietary supplements, energy drinks are subject to much less stringent regulations than other foodstuffs. However certain nations limit the locations that can sell energy drinks. Other countries require warning labels on individual cans of energy drinks. Still other countries have issued national statements regarding their safety. Some countries, such as Canada, have not yet approved certain energy drinks for sale. So shouldn’t the FDA take a closer look as to how these drinks are labeled and marketed and shouldn’t there be more investigating as to its effects on their consumer. Conclusion As a consumer of at least two if not more monster energy drinks a day I found the information was good to know.I do think that the FDA needs to make it where they do inform the consumer of the risks on the label especially because these drinks are very popular in teens. After all that I found I find it interesting that the public is so misinformed about all the ingredients in these drinks because really the caffeine is what is giving them the boost not all the scientific sounding ingredients. I think that it is most important for consumers to know that when taking in such high levels of caffeine you will go up but you must come down. Bibliography Lovett, Richard (24 September 2005). â€Å"Coffee: The demon drink? † (Fee required). New Scientist (2518). http://www. newscientist. com /article. ns? id=mg18725181. 700. Retrieved 2009-08-03.Suzanne Farrell, MS, RD, a spokeswoman for the American Dietetic Association. Webmd. com Smit HJ, Rogers PJ: Effects of low doses of caffeine on cognitive performance, mood and thirst in low and higher caffeine consumers. Psychopharmacology 2000, 152:167-173. William J. McGuire, the Communication-Persuasion Model and Health-Risk Labeling, in Product Labeling and Health Risks Bichler A, Swenson A, Harris MA: A combination of caffeine and taurine has no effect on short term memory but induces changes in heart rate and mean arterial blood pressure. Amino Acids 2006 http://www. naturalhealthontheweb. com Australian Drug Foundation's Druginfo Clearinghouse. ttp://www. redbull. com/faq/index. html. http://www. safefoodonline. com/news/n_190302. asp Monster energy [http://www. monsterenergy. com/product/energy. php www. fda. gov wellnessandnutrition. com edrinks. net Smit HJ, Rogers PJ: Effects of low doses of caffeine on cognitive per formance, mood and thirst in low and higher caffeine consumers. Psychopharmacology 2000, 152:167-173. http://www. naturalhealthontheweb. com Australian Drug Foundation's Druginfo Clearinghouse. http://www. redbull. com/faq/index. html. http://www. safefoodonline. com/news/n_190302. asp Monster energy [http://www. monsterenergy. com/product/energy. php] www. fda. gov

Friday, September 27, 2019

I did attachment. For all my decument. I want you to do for me just Essay - 2

I did attachment. For all my decument. I want you to do for me just part (3) And (4) - Essay Example A precise example of which would be a scenario where we needed to work as a group and deliver a study related on the biggest effect of early childhood education. Clearly, there are a lot of benefits of which, two of both that immediately came to mind would be economic and social. Two people from the group strongly believed in each and they argued about which had more impact on society. In the situation, no one seems to give way for the other to lay down their points and instantly rested on a conclusion to prove their points. This fighting resulted to a delayed work done, decreased the chances of learning from the two options, and marred a peer to peer relationship. For me, the most important part of the process of resolving a conflict would not be the solution one reaches, instead, would be the process of opening one’s mind to new learning that is different from what one initially had in mind. An example of which would be when we had to promote and ignite people to contribute to a charity event in a sustainable manner which our school was partnering with. Some people believed that the message to be reflected on communication materials would be that â€Å"these unfortunate people need their help†. On the other hand, some came up with an interesting slant by reversing the message which is â€Å"every person’s need to do something meaningful and fulfilling†. This conflict was solved by merging the two equally important messages. Part 4. I have interviewed teachers and at the same time administrators of the school. Some of the conflicts that we’ve all experienced in the workplace would be the amount each person thinks he or she is doing as compared to others, getting appreciation, communicating action plans for certain goals, willingness to consider non-traditional way of doing things, and providing constructive criticisms. People reacted to these conflicts,

Thursday, September 26, 2019

Political change in the age of revolutions in France Essay

Political change in the age of revolutions in France - Essay Example In the end, though, the dynasty that Napoleon hoped to found and the empire he set up both proved fragile. His unconditional abdication in 1814 was not the end of the story. He returned to France just under a year later from Elba where he had lived in pensioned exile, and the restored Bourbon regime vowed out at a touch. However, the battle of Waterloo in June 1815 ended Napoleon's illustrious history. The regime installed in 1815 was still there, although somewhat shaken forty years later. This owed much to the salutary fear of revolution. In all the major continental states the restoration era, as the years after 1815 have been termed, was a great period for policemen, conspirators and plotters alike. Secret societies were widespread, undeterred by failure after failure. Class struggles proliferated. This period showed, however, that there was no subversive threat that could not be quashed easily enough. Incorrectly, liberalism and nationalism were usually considered to be inseparable; this was to be proven terribly wrong in later times, but in so far as a few people did seek to change by revolution before 1848, it is largely true that they wanted to do so by espousing both the political principles of the French Revolution - government by representation, popular sovereignty, individual and press freedom - and those of nationality. To the west of the Rhine, where the writ of the Holy Alliance, as was referred the big three conservative powers (Russia, Austria and Prussia), did not run, the story was different; there legitimism was to last for a short period. The very reinstitution of the Bourbon dynasty in 1814 had itself been a bargain with the principle of legitimacy. Louis XVIII was supposed to have ascended to power like any other French King, but he...The man was Napoleon Bonaparte, the republic's former general and this time the First Consul of the new regime and soon to be France's first Emperor. In 1799, Napoleon Bonaparte had a great personal reputation and popularity. No one but the beaten politicians much regretted it when Bonaparte swept them aside and assumed power.After 1852 France was ruled by an emperor who again bore the name of Napoleon. He was the nephew of the first Napoleon. He had been elected president of the Second Republic, whose constitution he then rejected by a coup d’etat. Th e name Napoleon was itself terrifyingly portentous. It evoked a program of international reconstruction, in short, a revolution. Napoleon III – the second was legal fiction, a son of Napoleon I who had actually never ruled – stood for the destruction of the anti-French settlement of 1815 and, hence, of the Austrian domination which supported it up in Germany and Italy. He declared the rhetoric of nationalism with less reticence than most rulers and appears to have believed in it. With diplomacy and arms, Napoleon III forwarded the work of two great diplomatic technicians, Cavour and Bismarck, the prime ministers of Sardinia and of Prussia, respectively. Cavour died in 1861, and debate still persists over what was the extent of his real aims, but by 1871 his successors had established a united Italy under the former King of Sardinia, who was thus rewarded for the loss of Savoy, the ancestral duchy of his house.

Location, location, location Essay Example | Topics and Well Written Essays - 500 words

Location, location, location - Essay Example are universal factors that influence the location of a business, including availability of raw materials, transportation costs, land, labor, safety, waste disposal, government regulation, and proximity to market (Pellebarg and Wever, 2008). However, technological developments have made some of these factors less significant in determining the location. For a company that specializes in software, the choice of location would largely depend upon the availability of a skilled labor force, educational resources, and connectivity to the global network, recreational opportunities, and proximity to computer-manufacturing industries, government regulations, and communication system. In North America, the three strategic locations would be the United States (California, Texas, or New York), Canada (Toronto, Ottawa, or Vancouver), and Mexico (Mexico City, Acapulco, or Monterrey). These three locations meet the ideal conditions that a software company requires to operate optimally and become successful (Brun, 2007). The three locations seem to fulfill requirements that make a software company, including close proximity to computer-manufacturing industries and their subsidiaries, available and sound connectivity to the global network, vast educational resources, and a well-endowed communication system that encompasses the globe. The US has numerous educational resources that specialize on software development, include excellent institutions and research centers such as the Microsoft, Google, and Yahoo laboratories. Additionally, the US has a large high-skill labor force that the software company needs. Furthermore, the US is home to the largest computer-manufacturing industries, including Dell Inc headquartered in Texas, Apple Inc headquartered in California, Hewlett-Packard Company subsidiary, and Toshiba America Inc subsidiary, among others (Pellebarg and Wever, 2008). The technological advancement in the country will also be an added advantage for the company. Canada

Wednesday, September 25, 2019

Case study Essay Example | Topics and Well Written Essays - 500 words - 22

Case study - Essay Example r, it is a popular belief amongst experts from the industry that GE should bring change – change in people handling and change in the approach to work at GE. The million dollar question then arises: What is GE doing wrong despite such huge training investments and what area does it need to concentrate on to improve the current working attitude of its people. These questions can only be answered by exploring the approach that GE’s CEO Mr. Jeffrey R. Immelt has adopted to deal with his employees. G.E has a centralized organizational structure. The article mentions that executive recruiter Peter Crist says companies that once poached GE talent now look beyond it to alternatives such as Danaher (DHR), United Technologies (UTX), and even Tyco (TYC), which are viewed as "decentralized, sophisticated, and young." Jeff Immelt practices a democratic style of leadership and the leadership theory that he follows is a traits theory. The quote that best supports the approach says: ‘within GE, the talk is about the new traits leaders will need to thrive, a subject thats reviewed every five years. "We are working on 21st century attributes," explains Chief Learning Officer Susan Peters.’ The above quote shows that human traits are given more importance and Immelt strongly believes that there are some common traits shared by all leaders and that these can be learnt at the Crotonville Management Center. Moreover, the dinner weekends that Immelt organizes and the focus that he has started to give to his employees also support that he practices a democratic form of leadership. Immelt seems to be making both programmed and non programmed decisions as on one side he is only following the old and timed practices of GE’s human resource management, but on the other side he is experimenting with his new ideas of bonding with his employees. Instead of bringing out a change in how employees are trained he believes that what GE has been doing is in the best interest of its

Tuesday, September 24, 2019

Dilemma in Field Work Essay Example | Topics and Well Written Essays - 750 words

Dilemma in Field Work - Essay Example If Cash accepts, Jordan should try and collect the required data from the area Cash was assigned and try to compare them with the Cash’s computed data. If the date comparison seems to be correct, Cash should steal be reported to the head of the department to be fired from the project. Citing article 2b of the Principles of Professional Responsibility; that is, given that the project was to have direct public application policy formulation, Cash had neglected his duty to the project as well as to the public. Article 2b states that â€Å"an anthropologist should not knowingly falsify or color his findings"(Cassell & Jacobs, pp. 34). If Cash is not fired because of the similarity on the data collected by him and those collected by Jordan, Jordan should develop arrange for database verification in Cash’s region. Two students should be hired who will interview all information reported by Cash. These interviews results will be stored in a separate file until the completion of the projects field portion. At the analysis time, the data collected by Cash will be compared to that collected by the students in the same region. If there would be a difference in the two data, this will be an indication of falsified data by Cash. The student’s data will be used to replace Cash’s one and he would be requested to return all the payment made to him which he won’t reject as there is enough evidence to support that. Once the situation had developed, Smith had little recourses. The direct argument with the adviser was not the best option. Chances were high that he may just laugh at Smith knowing that there was no proof to support that. The adviser is one of the staffs in the university, getting of support for Smith from the department could be tough. This is because this will portray the department as having being involved in plagiarism.  

Monday, September 23, 2019

Property Rights Essay Example | Topics and Well Written Essays - 1000 words

Property Rights - Essay Example The land subject to eminent domain is to be given to a private entity for an economic project. The problem presented by those who criticize the ruling in this case is that private entities and corporations might use this to influence the government in acquiring lands. This will give them an undue advantage against individual citizens with respect to property rights. According to John Locke, the moment a person is born, he has the right to preservation. He has the right to enjoy and use nature for their subsistence. "God, who hath given the world to men in common, hath also given them reason to make use of it to the best advantage of life and convenience." Locke said. As such, According to Lock, since God gave the world to men for its use and enjoyment, there must be some way in which people could take them and own them. Because without taking them and owning it, how could people use it This is the basis of individual property rights. However, the property rights of a person are not absolute or unconditional. It may be subject to conditions and it may be limited in favor of the state, the general welfare of the people or for public order. For example, the government may regulate transactions involving properties. These regulations may take the form of contract laws, professional regulations law, or even labor law. Another example of limitation o... Because the government is task to protect and promote the general welfare of its people, to successfully do this, it needs money to spend. And a bulk of the money used by the government comes from taxes. Without the power to impose taxes, the government will not be able to acquire money and by taxation, individuals are required to part with a portion of their property in favor of the government. Hence it is a limitation to their property rights. The Power of Eminent Domain Another form of limitation on the individual's property rights is eminent domain. In eminent domain, the government is authorized to take a person's property, even against his will, as long as such taking is for a public use and the person is paid just compensation. The Problem with This Case Usually, this is exercised by the government when it builds infrastructures such as bridges, school buildings and the like, mostly government owned. However in this case, it was exercised by a corporation for economic development. While it is true that the economic project will reap benefits for the whole city such as jobs and revenues in the form of taxes, such is only incidental. Ultimately, whatever revenue that the corporation will receive will go to the private persons who own it. This, I believe, would cause an alarming precedence. Because of this ruling, the private entities are now allowed, in a way, to exercise eminent domain. All it has to do is to apply to the city, present the number of jobs that it could offer the possible revenues that it could earn the city and they can get delegation of that power. They can force individuals to sell them any property they like. In my opinion, this would threaten the individual's property rights. Exercise of eminent

Sunday, September 22, 2019

General Mills Financial Analysis Essay Example for Free

General Mills Financial Analysis Essay From ready-to-eat cereal to convenient meals to wholesome snacks, General Mills is one of the biggest food products manufacturers and competes in growing food categories that are on-trend with consumer tastes around the world. The company markets many well-known brands, such as Haagen Daazs, Yoplait, Betty Crocker, Totinos, and Cheerios, among others. Main rivals include Kellogg, Kraft, Conagra Foods, and Sara Lee. General Mills sells its products in three segments: U.S. retail (63% of net sales), International (25% of net sales), and Bakeries and Foodservices (12% of net sales). In addition, General Mills sells cereals and ice cream through its Cereal Partners Worldwide and Haagen Daazs Japan joint ventures. General Mills continues building its presence in developed markets and increasing presence in emerging markets worldwide by investing in established brands while also developing new products. The company’s goal is to generate balanced, long term growth. Profitable performance through the past years General Mills has shown a strong profitable performance during the past years. The company has achieved during the last 3 years an average RoE of 28% supported by strong efficiency, financial leverage, and a moderate profitability ratio given the nature of the business. This has resulted in a positive trend of the share price that delivered 3 year returns of 44% from 2009. The upward trend in RoE that peaked in 2011 reaching 30.6% reversed in 2012 that closed with a RoE of 24.5%. The RoE drop of c. 600 bps in 2012 compared to 2011 is explained by a reduction in profitability that was affected by high input-cost inflation primarily in food ingredients and energy that was not fully transferred to customers (370 bps Gross Profit Margin drop). Performance was also affected by restructuring actions (60 bps impact on profitability) taken to improve organizational effectiveness to drive future growth. General Mills managed to continue improving efficiency as the increase in sales (3 Years CAGR of 6.7%) outpaced the average assets growth (3 Years CAGR of 5.8%), reachin g in 2012 the highest efficiency ratio (83.8%) of the past 3 years. Efficiency improvement was primarily supported by inventory reduction efforts that, coupled with increase in accounts payable derived from shifts in timing of payments, reduced the cash conversion cycle to 43 days. It is worth noting that during fiscal 2012 the balance sheet had an important growth as a result of the acquisition of the international Yoplait business, including goodwill and other intangible assets of $2.3 bn USD. Sales growth also benefited from the acquisition and will be discussed in the next section. General Mills runs a leveraged operation where, in average, the total assets are 3 times shareholders equity. Leverage ratio has decreased since 2010 as retained earnings have increased at a faster pace than assets driven by strong business performance. A slight revamp in the leverage ratio during fiscal 2012 was mainly driven by an increase in other comprehensive losses related to pensions and postemployment activity, and foreign currency translation that offset retained earnings for the same period. Sustainable growth while generating strong levels of cash flows General Mills has shown a strong, sustainable growth throughout the last years. Net sales increase has been driven by a moderate average growth in the US Retail segment (3.8%), coupled with the expansion in the International business (13.4%). The big year on year increase of 12% in fiscal 2012 is driven by the acquisition of the international Yoplait yogurt business that contributed 7 points of sales growth, while underlying business grew 5%. It is important to note that sales growth has been mainly driven by volume growth with a slight component of net price increase and a favorable mix. Segment Operating Profit has also maintained a sustainable growth. The slowdown during fiscal 2012 and drop of Gross Profit Margin is driven by high input-cost inflation as previously mentioned. Despite high costs, the company managed to increase segment operating profit to exceed $3bn for the first time in the company’s history. General Mills has managed to generate strong levels of cash flowacross the years. Over the most recent 5 years, the company operations have generated almost $10bn USD in cash. A significant portion of this cash has been returned to stockholders through dividends and shares repurchase. In addition, this cash is used to fund Capital expenditure. In the most recent year, the company operations generated $2.4bn of cash compared to $1.5bn in the prior year. The major increase is driven by a favorable change in working capital supported by inventory reduction efforts, prepaid expenses, and other current assets. Cash used by investing activities had a significant increase in fiscal 2012 that is mainly explained by the acquisition of international Yoplait ($1bn USD). General Mills invested in fiscal 2012 c. $700m USD in land, buildings and equipment, similar to previous years. Cash used by financing activities includes a constant payment of dividends and purchase of treasury stock in the last years. In addition, General Mills has been actively managing their cost of funds by issuing / pre-paying long term debt and commercial paper as convenient. General Mills performance has outpaced main competitors in the recent years General Mills strong performance is accentuated when benchmarked against Kellog Co, another of the key food producers. Both companies present similar profitability with General Mills having a lower gross profit margin compensated by lower marketing investment and general expenses. Nevertheless, General Mills has managed to grow sales and has delivered higher returns at a faster pace than Kellog. In addition, General Mills produces higher levels of free cash flow and has grown dividends per share faster. Finally, Kellog has a heavy debt load while General Mills has lower leverage ratio. Solid position to face a challenging, uncertain future In a nutshell, General Mills has shown a strong performance in the recent years and has outperformed his competitors mainly in compound growth rates and value creation. A challenging future lies ahead with uncertain economic environment and increase in commodity costs. Pricing strategy to maintain margin while not impacting market share will play a key variable in the company’s performance. Strong brands, innovations, expansion in diversified markets, and solid cash position and moderate leverage should support General Mills to face these challenges and continue creating value in the following years.

Saturday, September 21, 2019

NORM Management Process Cycle

NORM Management Process Cycle Naturally Occurring Radioactive Material (NORM) at ADNCO, Management Procedure and Measurements Ahmed AL Azeezi Contents Introduction: Literature review: Methodology Findings: Conclusion and Recommendation Figure 1: Penetration power of ionizing radiation Figure 2: NORM exposure routes Figure 3: NORM Management Process Cycle, enhanced (more details) chart Figure 4: Norm Program strategy Figure 5:900 series mini monitor probe type 44A Table 1 : Units of Radioactivity and Radiation Levels Table 2: Types of Radiation Table 3: NORM Area Classification for Non-Classified workers Introduction: Nowadays, Oil GAS industry is having a lot on challenges because of the complexity of this industry and the interaction with the other aspects such as the earth cosmic properties. However, one of the most important aspect for the oil gas is Naturally Occurring Radioactive Material (NORM). These materials are having a negative effect on the humane body and the environment which required to have a strict procedure to control such materials in production of the oil until handing these the concentered NORMs during the transportation from one point to another. In this report, I will be covering the definition of the NORMs and how it can be detected on the process side with a real measurement example. Also, if these materials are present, how can we mitigate these effect of exposure to the radioactive materials? According of the ADNCO Code of practice (COPV2-09). Literature review: NORMs are covering all the naturally occurring radionuclides and presenting at different concentrations in the earth crust. Moreover, these materials can be enhanced in the concentration due to the process accumulation which is associated with the recovery of oil and gas such as separators reflux pumps. This enhancement process of NORMs called TENORM (Technologically-Enhanced Naturally Occurring Radioactive Materials). The sludge, pipe scales and drilling mud are an examples of materials which can contained the elevated levels of NORMs. There are two main types of NORM contamination at Oil GAS industry which are Radium and Radon (Rn-222) contaminations. The Radium is existing in water and low specific activity scale. Moreover, the radon is usually found on natural gas production wells. Furthermore, there are two systems of measuring of radioactivity and radiation levels, which are international system (SI) and the traditional US unites with its conversion factors between them as shown in the below table: Application SI units US units-Old system Conversion Factors Radioactivity Becquerel (Bq) Picocuire (pCi) 1Bq=27pCi Concentration Becquerel/Gram (Bq/g) Picocurie/gram (pCi/g) 1Bq/g=27pCi/g Surface Activity Bq/100 cm2 Disintegrations per minute/ 100cm2 (dpm/100cm2 ) 1Bq/100cm2= 60dpm/100cm2 Exposure Coulomb/kilogram (C/Kg) Roentgen (R) 1C/KG= 3876R Dose Equivalent Sievert (Sv) Rem 1sev=100Rem Table 1 : Units of Radioactivity and Radiation Levels NORM can be divided in three types of radiation as shown below: Radiation types Definition Health Hazards Controls Alpha Particles (ÃŽ ±) -Ra-226 -U-238 -Po-210 -Pb-210 Radiation is made up of heavy, charged penetrate that cannot penetrate very fare, even in air Internal health hazards through inhalation, ingestion and absorption exposure routes skin Beta particles(ÃŽ ²) -Ran-228 -Pb-210 -Bi-210 Radiation consists of lighter charged particles than alpha particles that travel faster and are thus more penetrating than alpha radiation. Internal health hazards through inhalation, ingestion and absorption exposure routes Shielded by thin layer of metal or plastic Gamma rays (Y) -Ra-226 -Pb-210 Radiation consists of high energy rays and is very penetrating External health hazard to human bodies Shielded by thick layers of led or other dense materials including meter of concrete or several meters of water. Table 2: Types of Radiation Figure 1: Penetration power of ionizing radiation On the other hand, the health effect of these NORMs are vary with four factors which are: Total amount of energy absorbed Exposure duration Dose rate Particular organ exposed. The exposure to the NORM is not comparable with the man-made sources such as the X-Ray. A chronic exposure to these NORM without using any PPE (personal protection equipment) which is adequate to the existing radiation increases the likelihood of gaining cancer. During oil gas processing stage, the TENORM will be accumulated on two different forms as shown below: NORM in Scale Radium, one of the naturally occurring nuclides in the uranium decay series co-precipitates with strontium, barium or calcium as sulphates or carbonates and deposit on the internal surfaces of the oil and gas facilities. The formation of the scales eventually effects the integrity of the equipment, vessels and pipelines and consequentially reduces the capacity of the process facility. NORM in Sludge and Scrapings Radionuclides, mainly radium are found in sludge, produced sand and produced water. Other nuclides such as lead 210 and polonium 210 can also be found in pipeline scrapings and the sludge accumulation in lower level of the tank of gas oil separators, dehydration vessels and pipeline scrapings. Figure: 2 illustrate the NORM exposure routes to the human body as shown below. Figure 2: NORM exposure routes Referring to ADNOC COPV2-09, the NORM management process cycle has been developed and illustrated as shown below chart: Figure 3: NORM Management Process Cycle, enhanced (more details) chart The NORM management process cycle is giving a workflow how can we handle these materials if it is detected on the Oil Gas process, which basically is having an actions and controls to eliminate the effect of these radioactive to the workers, public and the environment and make it As Low As Reasonably Achievable (ALARA). Thus, before implementing the management process cycle, NORM Management Strategy was establish to make the process cycle more effective and it is consist of five keys area as follow : NORM Survey and Monitoring Workers protection and Training Control of NORM contaminated equipment Control of NORM Waste Development of NORM Management procedure. Figure 4: Norm Program strategy For any newly finished oil / gas producer well, the initial (baseline) survey shall be conducted for NORM and if the result is positive more controls and actions shall be implemented through the NORM management process cycle. Radiation Protection officer (RPO) shall be certified and having adequate competency to locate assess the radioactive on-site. The normal duties of workers don’t include exposure to NORM radiation. They are considered as members of the public. The ADNOC limit on effective dose received by any employee, shall be not exceeding the 50mSv in any single year during with a 100mSv over the 5 years. Otherwise, the worker with more dose than 50mSv/year shall be consider as classified radiation workers. Those workers shall have a periodic medical surveillance in order to insure the fitness and health. Moreover, the location/equipment can be classified in to three zones depending on the dosing values as shown below table: Dose ( µSv/Hr) Definition Requirements Unrestricted Area -Normal Work Permits -Basic Approved PPE -Good Hygiene 0.5 – 1.5 NORM supervised Area -Work to be supervised by PRO -Use NORM applicable PPE(according to standard EN 149 FFP3) -Control public access by PRO -Demarcation with warning NORM sign -Train workers -Monitor NORM levels before and after work completion -inform HSE focal points -Permit to work required 1.5 – 4.5 NORM Controlled Area (restricted) -Stop the work -inform line manager and PRO for further instruction -Control worker access b PRO -Demarcation with warning NORM sign -if dose rate exceed 4.5 µSv/hr, workers exposure must be controlled below the annual exposure of doe rate of 20  µSv. Table 3: NORM Area Classification for Non-Classified workers Methodology Hence, the NORM measurement can done through two types, either by field or laboratory measurements and both of have its own requirements and conditions. However, in this report, the field measurement will be carrying for a gamma radiation in different locations. So, the instrument was used for this measurement is the 900 series mini monitor probe type 44A in counts per seconds-cps. This meter is a very sensitive gamma rays and it is detecting the radiation as a number not level concentration. The methodology of the survey as presented below steps: Carry out initial survey beyond the site boundary to measure background radiation levels in cps using contamination meter as mention above. Hold the probe close to the surface to be surveyed, moving slowly over the area noting any response from the contamination meter and compare the background levels. If the measured radiation levels are found twice the back ground levels, measure dose-rate ( µSv/h) at a distance of 1 meter from the contaminated equipment using the dose rate mete. Measure NORM at different positions of potential NORM contaminated equipment at three different heights and average of the three readings at each height. When surveying cylindrical shape, the inside of the pipe should always be checked by placing the probe a few centimeters inside each end and record the results. Figure 5:900 series mini monitor probe type 44A Findings: The process of measuring the NORM was done by a expert third party (M/s Aberdeen Radiation Protection Services) in different locations at upstream of the oil and gas well producer, but the below table is showing only the risky data which required to have a more analysis on the amount of the gamma radiation emitted at these points. Area 1 Plant No1 Location Value of measurement Produced water pump pipe work. 100 cps Max. External surface of empty storage tank 30 cps Inside this tank adjacent to manhole entrance 200 cps External surface of base of Separator V0311 200-300 cps External surface of base of Separator V0312 140 cps Open drain Grill 30 cps Area 1, 12 well inlet at manifold Background reading, No radiation External surface test separator 110 cps All the reading are in counts per second and most of them are above 100 counts which is reflecting that it is required to have more analysis by using external dose rate meter to know the exact concentration and exposure dose to surrounding which can be emitted. Moreover, the laboratory measurement shall be one of the option to have more details by using the radiometric analysis device. Conclusion and Recommendation To sum up, the naturally occurring radioactive material are associated with oil and gas industry which shall be controlled in order to reduce the negative effect on the workers, public environment. The process of evaluating the NORM (specially the baseline) is very critical and it can be led to catastrophe condition if the outcomes are not reflecting the actual situations. This finding of Gamma rays in our case are indicating there is an industrial hygiene issue to the worker which required to have more control on the PPE and exposure duration. However, these reading are located mostly on oil separation side (upstream), however, the downstream, gas processing industry is very important point to be assessed which was missed during the third party assessment at upstream feed. In order to reduce the amount of exposure, the worker shall be following the ADNOC COPV2-09 as a guidelines such as monitoring, workers protection requirements and transport of NORM contaminated equipment. Moreover, the Gamma elements will be moving from the upstream to downstream which will be reaching the gas processing units. So, it is recommended to have regular inspection for the radioactive materials specially the glycol unit will observed most of the moisture on the process which can be containing the radiation elements. Reference: Heath Safety and Environmental Management Manual Of Codes of Practice, Volume 2: Environmental protection, ADNCO-COPV2-09†Guideline on management of naturally occurring radioactive material (NORM)†. CRP-HSE-10-39, â€Å"ADCO NORM Management Procedure†

Friday, September 20, 2019

Communicating With The Mentally Challenged Education Essay

Communicating With The Mentally Challenged Education Essay The purpose is to make people aware that although you try to be politically correct when communicating with the mentally challenged, mild through server, there is a definite communication channel to use. My purpose is, since I do foster care and have been given a child that is severely challenged, was to learn as much as possible as how the learning habits of the child and the best or different ways to communicate to the child knowing the child will always be challenged. For the purpose of this paper I will refer to the child as he (although it could well be a she) and since Sonic the hedge hog seems to be a favorite between both sexes, the name of the child, in order to protect the childs identity will be referred to as Sonic. Thesis statement All children must mature and the responsibility to develop all children falls upon each of us to raise the child up and yet when it comes to the mentally challenged child there must be different channels of communication between the adult and that child. These conduits allows the adult to take into account the intelligence of the child, and reach the child on their level, even if it means going down to their level. The adult talk must reflect the childs level of understanding. If more people do not take a more active interest in the life of the mentally retarded then we will not have any place to go except in an institutional living and that is not fair because we are Gods creatures. Anonymous Introduction Communicating with the mentally challenged is not only a challenge to the mentally challenged, but the adult as well. Each situation must be understood before continuing in educating the child to become a productive part of society, if that is possible. Looking at the definition of mentally challenged and to what degree the child is challenged, from borderline cases to highly severe, and a true treatment plan can be formulated to mold the child to usefulness even if that usefulness is nothing more then getting oneself to the bathroom. The mentally challenge will grow and mature the question is how much? For mentally challenged kids and adults, some things can never be learned. (Emma, 2007) Defining Mentally Challenged Mentally challenged primary depends on the I.Q. of the child along with one or more of the many psychological tests available to measure the intelligence or mental functioning of the child. Therefore, when the mental age is divided by the chronological age and multiplied by a hundred, what you get is the Intelligence Quotient or the I.Q. (De la Jara, 2007) An I.Q. above 140 is the sign of a genius. An average to very intelligent child would score of 100 120 and a dull child would score 80 90. Those children classified below 85 are classified even further. An IQ of 84-70 is considered borderline mentally challenged, while those 55-69 are mild cases and consider educable. 40-54 are Moderate cases but trainable, 25-39 are severely deficient and any IQ below 24 is classified as highly severe. Mental age refers to an age at a normal level of performance on an intelligence test, and it became a popular way of referring to mental level as measured by the Binet Simon scale of 1908. The Binet Simon scale identified the academic skills typical of specific age groups. In 1912, William Stern used chronological age as a denominator to be divided into mental age, resulting in an intelligence quotient. In 1916, Lewis Terman multiplied this intelligence quotient by 100 (to eliminate the decimal places) and called the result an IQ score. Termans formula of mental age divided by chronological age multiplied by 100 became popularized as the formula for calculating a persons IQ. Adult intelligence does not change from year to year so the concept of mental age is less meaningful when discussing adults. Contemporary IQ tests use cumulative indexes to determine scores rather than the calculation of IQ scores based upon Termans formula. A contemporary equivalent of mental age is the Standa rd Age Score of the Stanford-Binet IQ test, which was formulated in 1987. Overview of mentally challenged Although there is no hard evidence, one of the strongest factors of the mental deficiency is hereditary. Besides this there are a number of environmental factors that contribute to mental arrest, malnutrition or infection during pregnancy or even an excessive intake of drugs and RH incompatibility whatever the cause, if the handicap is very severe, the entire development of the child gets affected physical, social and emotional along with mental. Some of these children cannot perform the simplest of tasks that we all seem to take for granted. Simple things like walking straight, eating or toilet training. A great amount of patience and tolerance is required to supervise and handle such a child. Mental retardation occurs in 2.5-3% of the general population. About 6-7.5 million mentally retarded individuals live in the United States alone. Mental retardation begins in childhood or adolescence before the age of 18. In most cases, it persists throughout adulthood. Mentally retarded children reach developmental milestones such as walking and talking much later than the general population. Approximately 85% of the mentally retarded population is in the mildly retarded category and they can often acquire academic skills up to the 6th grade level, become self-sufficient, and in some cases live independently, with community and social support. Low IQ scores and limitations in adaptive skills are the hallmarks of mental retardation. Aggression, self-in-jury, and mood disorders are sometimes associated with the disability. The severity of the symptoms and the age at which they first appear depend on the cause. Children who are mentally retarded reach developmental milestones significantly later than expected, if at all. If retardation is caused by chromosomal or other genetic disorders, it is often apparent from infancy. If retardation is caused by childhood illnesses or injuries, learning and adaptive skills that were once easy may suddenly become difficult or impossible to master. The most noticeable emotional characteristics children with mental retardation often recognize that they have difficulties with tasks that others find easy. This realization can lead to frustration, anger and depression. Some children with mental retardation may suffer from anxiety. These children may act out due to these emotions. They may have trouble expressing their feelings and may show their feelings in ways such as refusing to eat or sleeping too much. Sonic, the foster child living with me, will be calm and act like a five year old one moment, and then if you ask something of sonic, major mood change to the point of aggression. How to understand the mentally challenged Anyone who has toiled with the mentally challenged people knows, many will tell you exactly what is on their mind. When something does not go Sonics way, he will tell you and if you persist, he will tell you she will kill you, and hates you. Understanding that this is typical in a mentally challenged you let it roll off you and just stay close enough to make sure that sonic does not hurt herself. The mentally challenged know their likes and dislikes, what is going on in their lives, and even some idea of what they want their future to be. When the mentally challenged are treated as subhuman, as children, or as a menace to society, it follows that we become the ones to decide what is best for them, and what kind of life they should lead, we instead should remind ourselves that they are Gods creatures. They need to be treated as serious human beings with important things to communicate. (McLean, Brady, Mclean, Behrens, 1999) Understanding their language is likely to be much better than the ability to express it. Speech maybe very poorly articulated and difficult to understand One of the critical aspects in forming a communication is one that emphasizes skill actualization, where teachers give the mentally challenged many opportunities to use and expand on their already developed skills. Skill actualization goals are represented in the individual education plan (IEP) such as the child will use whatever skill is already developed and continue to expand to the point where the child will reach the next goal. In Sonics case, the IEP has included counting skills up to 20, understanding the valued of money, and doing simple life skills. Steps in Creating Communication The first step to communicating with a mentally challenged person is to understand the way they communicate. Mirror there patterns keeping in mind get on their level but do not be on their level. Match the way they see the world, not as a child but as a learning style. Most are visual learns where they learn in pictures, using word like see and look. Visual learners prefer to use diagrams, pictures, study notes, handouts and movies to see the information they are learning. Sometimes the mentally challenged are audio learns where they may not even look at you but put more stock into the spoken word and the voice inflection. This is a fine line where the teacher must be very calm and sure of each word other wise you could miscommunication and all the building process is for naught. The mentally challenged needs to be heard and we must allow them to hear us. The final learning style is kinesthetic learners also called tactile learners need to feel it to learn best. The more the learning experience involves moving, touching, tasting and feeling, the more it will be absorbed by this type of learner. Projects and experiments also work well with this group. Young children learn thins way by reaching out to something and feeling it, touching it, and breaking it. (OK I had to put that in) The real art is to combine learning styles to fit the child. Sonic uses Visual about 80% and verbal about 15% and kinesthetic the remaining 5%. If you show her something, she will remember and get the message quickly, by adding the verbal component he will recall the instruction the next day, demonstrating, giving verbal instruction then transferring ownership of a task, builds his self-confidence. There are small tasks she can do the give him pride in doing well, such as showing which day on the med chart we are on and then picking the proper cup to take. The second step is to incorporate the communication skills in both the education setting as well as the extra curricula activities. Opportunities exist almost constancy or as it is called teachable moments. The hardest part as a teacher is to keep on top of the moments one can take advantage of and then take advantage of them. At home with sonic, it becomes a one on one the moment Sonic comes home from school until bedtime and in turn allows many more recognizable and controlled setting. The third step is to facilitate conversation and keep them engaged as much as possible. The issue here must be keeping it simple. In studies, (McLean, Brady, Mclean, Behrens, 1999) simple yes or no question got the most response from the mentally challenged. Asking completed questions creates confusion and frustration, and can actually cause the person to regress rather then moving forward. Using the KISS (keep it simple) method more ground can be make rather creating an antagonistic climate. How to communicate with the Mentally Challenged 1.  Ã‚  Ã‚  Ã‚  Ã‚   Maintain a calm, low volume. Speaking louder does not make you more understandable. 2.  Ã‚  Ã‚  Ã‚  Ã‚   When determining age-appropriateness of your words, remember that you must know the mental age of your listener, not his or her calendar age. Remember, they are just mentally challenged, not a person with a limited vocabulary, such as a five-year-old. 3.  Ã‚  Ã‚  Ã‚  Ã‚   Do not cover or hide your mouth because listeners will want to watch you as you pronounce your words. This helps them figure out what you are saying in many cases. 4.  Ã‚  Ã‚  Ã‚  Ã‚   Do not mimic how the mentally challenged speaker pronounces words in a misguided presumption that he or she will understand if you speak like he or she does. This does not make you easier to understand. It will confuse your listener and may give the wrong impression about your sensitivity to his or her handicap. 5.  Ã‚  Ã‚  Ã‚  Ã‚   Avoid running words together. For example, do not say, Do-ya wanna eat-a pizza? One of the biggest challenges for listeners knows where one word ends and the next one begins. Give them a small pause between words if they seem to be struggling. 6.  Ã‚  Ã‚  Ã‚  Ã‚   When possible, opt for simple words instead of ones that are complex. The more basic a word is, the better the chance is that it will be understood. Big is a better choice than enormous, for example. Make is a better choice than manufacture. 7.  Ã‚  Ã‚  Ã‚  Ã‚   Avoid speech complexity, which is beyond your listeners comprehension level. Use simple subject-verb-object statements with the significantly challenged. More mildly challenged people may be able to handle more forms that are complex. 8.  Ã‚  Ã‚  Ã‚  Ã‚   Look them in the eye. It lets them know that you care about what you are saying. Although they may rarely make eye contact with you, behave as if you really are interested in what they are talking about. 9.  Ã‚  Ã‚  Ã‚  Ã‚   Treat people with disabilities with respect. Do not treat them as inferior. Remember that the person you are talking to has feelings and is not stupid. Rather, he/she is challenged with something you will never understand the ability to understand, communicate, or decipher. 10.   Patience is the key. 11.   Be aware that you must listen and observe the person you are speaking to. In most cases, communicating with a person with a disability is very much like learning how to understand an accent. Be ready to adjust your communication style in a respectful way when necessary. 12.   Treat them as close as possible as you would a normal person, except use age-appropriate words. Otherwise, they may sense something is up. 13.   Smile to show them you are enjoying their company. 14.   Be aware of the tone of your voice.   Is it patronizing? Are you speaking with the tone you would use for a child? Adjust accordingly. (Challenges faced by, 2010) Conclusion The mentally challenged can become part of the community by understanding how they speak and process information. The earlier the problem is detected the better it is for the child. Sometimes the public tries to hide the fact until it becomes apparent to all, and by then it is too late to get timely help. There are plenty of child guidance centers and special schools around to provide the perfect environment to aid in the development of the child. If these facilities are not utilized, a mentally deficient child will definitely develop severe social and emotional problems as well. We all should try to accept the fact that their child is mentally challenged and help him or her grow to the full potential that he or she is capable of. Some people try for a miraculous cure and expend a lot of time and energy in search of a divine elixir. Even though such an attitude is understandable, it does not show any results. That time will be better spent in admitting the child to a special school or sheltered institution where he can get professional help. Communicating with people who have mental deficiency is a skill that you can hone over time with continuous practice. There are some tips, which will allow you to communicate in a better way with them. Words are just the tip of the communication iceberg. When conversing with a person, we send myriad signals by the way we stand the expression on our face and the tone of our voice. These form levels of communication that bypass words. When talking to anyone, remember to relax and consciously use body language in a positive manner. Even if the verbal communication is misunderstood, the body language can convey concern and interest. The person will receive the message that we are interested in them and care about their feelings. Watch what you say to the child, be very careful of the environment they are in, and make sure people treat the child as one of us, not a special child. Each Tuesday we play softball for the church and each time Sonic gets up a homerun is produced. It is not the home run that matters to us, although Sonic would tell you other wise, but the encouragement of being one of the gang that allows her to participate in an activity someone with a mentally challenged condition would never experience.

Thursday, September 19, 2019

New Deal America :: American America History

New Deal America The stock market crash of 1929 helped launch the United States and many other nations into the worst economic depression in history. The severity of the Great Depression called for federal government programs to protect the general welfare of citizens. The New Deal programs created by Franklin D. Roosevelt provided the framework for the welfare state that still serves as a basis for American public policy. All aspects of American society suffered during the Great Depression. By 1932, there were thirteen million people unemployed. There was no security for the millions who lost all of their savings in the bank failure or stock market crash. Volunteer organizations attempted to help the needy, but their resources were simply not adequate (Madaras and SoRelle 218). Hope seemed non-existent. Americans had never seen such a severe depression. They could not look to history for guidance. The New Deal was Roosevelt's attempt to restore the economy. His willingness to act decisively and experiment with new policies set him apart from previous presidents. He often said, "I have no expectation of making a hit every time I come to bat. What I seek is the highest possible batting average"(Tindall and Shi 1238). In the first years of Roosevelt's term he worked hard to empower the federal branch. The New Deal set the precedent for 20th century liberalism. The first order of business for the Roosevelt administration was financial reform. Banking is a crucial aspect of capitalism and Roosevelt was very aware of this fact. On his second day in office, Roosevelt called Congress to meet in a special session. The outcome was the Emergency Banking Relief Act, which permitted stable banks to reopen and provided managers to those who remained in trouble. The Glass-Steagall Act separated commercial and investment banking and created the Federal Deposit Insurance Corporation. These actions all helped restore banking confidence within American people. Roosevelt ensured that it was safer to "keep your money in a reopened bank than under the mattress"(Tindall and Shi 1238). After accomplishing this task, the new administration was ready to solve other problems. Other financial programs included the Securities and Exchange Commission (SEC), National Industrial Recovery Act (NIRA), and the Agriculture Adjustment Administration (AAA). The SEC functioned in regulating the stock and bond markets. The NIRA and AAA were aimed at recovery through regulation. The NIRA played a big role in restoring faith and confidence in the system and helped to increase demand and wages, but realistically it was impractical; it abandoned the American market system.

Wednesday, September 18, 2019

Managing Classroom Behavior :: essays research papers

Managing Classroom Behavior Managing classroom behavior can be a difficult task, especially if you have a child who is always causing disturbances. Once you have identified that there is a problem, you should ask yourself six simple questions. The first question asked is whether the problem is a result of inappropriate curriculum or teaching strategies. As teachers we have a tendency to overlook the fact that what and how we teach can contribute directly to our students behavioral problems. Secondly, ask yourself "What do I demand and prohibit - and what should I?" Teachers find it easier to specify what they will not tolerate than to specify the behavior they demand. The third question to ask is "Why do certain behaviors bother me, and what should I do about them?" As a teacher you have to decide if this is a difference in culture or upbringing and why it bothers you, is it inappropriate, is the behavior disturbing the other children? There are many things to consider when a child is acting up. As the teacher, it is your responsibility to solve these disturbances, if they are personal, you may try ignoring them, talking with them, or even living with the problem. The fourth question you need to ask your self is if this behavior is developmentally significant. Although there are other types of developmentally significant behaviors, most will fall into four primary categories: academic failure, aggression, depression, and problems with peers. The fifth question to ask is, "Should I concentrate on a behavior excess or deficiency?" A behavioral excess is something you usually want the child to stop doing.

Tuesday, September 17, 2019

Counselling and the Law Essay

The law would seem to affect the counsellor predominantly over issues of confidentiality which cause ethical dilemmas in a variety of areas. It would seem the counsellor tends to end up torn between their responsibility towards their clients and the law or doctors/other health officials/organisations and society in general. The counsellor must weigh up client confidentiality against that of public interest and the guidelines of what is or is not in the public interest are not always clearly defined. For example, if the court decides that a counsellor must produce notes of their sessions with a client, this may not only become problematic from a confidentiality point of view but also as the counsellors’ notes are subjective and the law deals in facts – any changes within the client’s thoughts/feelings which result in ‘conflicting’ portral of events could be mis-interpreted as false testimony. The private unobserved nature of therapy and the importance of confidentiality between counsellor and client can result in concerns over whether this provides power to promote personal change or power to abuse the privilege. Evidence of bad practice in sexual abuse and allegations of false memories from clients seem to be all too common in the USA and one has to ponder to what extent in the UK, especially in the light of the recent publicity of the alleged abuse cases of Saville. If any counsellors or those in a counselling role were involved in any way with the children he had contact with – it begs the question – were they aware of something amiss and afraid to come forward because of who he was or for fear of repurcussions within their organisation? Thus, the counsellor can be put in a legally vulnerable position whereby they are liable to pass information on to the employer under their contract and potentially liable to their client for breach of confidentiality. Counsellors may not only find themselves in an ethical dilemma regarding client autonomy and client self harm or the client potentially harming others from a ‘professional standards’ point of view as the law may be unclear about their legal responsibilities as well. When one thinks of the tragic case of Anna, although the counsellor did not face any legal  repercussions, the law is not clear on rules or regulations to help minimise their legal vulnerability when making decisions as to what action to take or not take. Legislation is much more clear cut in the areas of adoption and infertility than in other areas but still there are uncertainties and conflicts of interest for the counsellor to wrestle with. The counsellor is presented with conflicting rights of the parent and their right to confidentiality on the one hand and the right of the child to know who their parents are on the other. When considering the case where a counsellor had to assess the degree of personal risk posed to the birth mother if personal information was released-it becomes clear that there are no clear guidelines for the counsellor which are laid down by law. Thus, ethical and legal dilemmas could arise between the right of the individual to records and the right of the birth parent to privacy. Similarly, the counsellor is left to weigh up the gravity of keeping information confidential in cases of AIDS and HIV whereby the client has the right to privacy but the partner has the right to be informed as they could be at risk of harm. According to Jenkins (1996), establishing a clear relationship with the law is one of the elements which is associated with acquiring full professional status. That is to say, a profession such as medicine, which has a recognised status in legislation and case law, is authorised to carry out certain activities and can delegate some of the responsibility for self-discipline and the maintenance of high standards of practice. But, the legal dimensions of therapy are not recognised in the same way and thus the legal obligations and responsibilities of the counsellor and the law remain unclear and require further exploration of the legal context in which the counsellor works. One would hope that this dilemma would be worked on indepth to help counsellors to counsel effectively and of course, to avoid the fear of being sued as a result of imperfect knowledge of the law or inadvertent negligence.

Monday, September 16, 2019

Are Learners With Besd Supported In Secondary School Education Essay

There are a figure of footings to depict scholars with behavioral troubles. In earlier old ages they were categorised as being maladjusted defined by The Underwood Committee Report on Maladjusted Children in 1995 as â€Å" an persons relation at a peculiar clip to people and fortunes which make up his environment † . This was subsequently succeeded by Emotional Behavioural Difficulties ( EBD ) as referred to in the Particular Educational Needs ; Report of the commission of Enquiry Into the Education of Handicapped Children and Young People ( The Warnock Report ) ; HMSO ( 1978 ) . The Elton Report ( 1989 ) stated a kid had EBD when they showed â€Å" terrible and relentless behavior jobs as a consequence of emotional or neurological perturbation such that their demands can non be met in an ordinary school † , Elton Report ( 1989 p.42 cited in Wood, 1995, p14 ) . Within this statement I already notice the mention of demand for EBD students ‘ to be educated outside of â€Å" ordinary schools † , advancing the demand for exclusion or resettlement to jump supplier of instruction. This definition does non see the complexness of influences that contribute to the behavior itself. SEN codification of pattern This was subsequently replaced by behavioral, emotional & A ; societal troubles ( BESD ) identified in the SEN codification of pattern as: â€Å" Children and immature people who demonstrate characteristics of behavioral and emotional troubles who are withdrawn or isolated, riotous and distressing, overactive and lack concentration ; those with immature societal accomplishments ; and those showing ambitious behaviors originating from other complex particular demands. † ( DfES,2001a: 7:60 cited in Capel, Leask & A ; Turner, 2009 ) . Sometimes the fact that the student has a SEN and the celebrated riotous behavior is the consequence is frequently overlooked. The force per unit areas of the instruction system due to the rigidness of the course of study, demands on raising accomplishment, low staffing ratios and clip restraints, instructors interpret hard behavior as peculiarly nerve-racking due to the sum of clip spent on behavioral issues as opposed to learning and larning as supported by Bennett ( 2006 ) . It is this negation that has raised concern for this peculiar group and their inclusion in the chief model of the instruction system. The Department for Children Schools & A ; Families ( DCSF ) , Statistical First Release ( SFR ) ( 2009 ) reported a rise of 7 % in lasting exclusions from 2001/02 to 2003/04 with lasting exclusions making 8430, which so fell back to 7000 in 2007/08 within province funded secondary schools. The study besides identified that ; â€Å" Students with SEN ( both with and without statements ) are over 8 times more likely to be for good excluded than those students with no SEN. In 2007/08, 33 in every 10,000 students with statements of SEN and 38 in every 10,000 students with SEN without statements were for good excluded from school. This compares with 4 in every 10,000 students with no SEN. The figures show a little lessening in the rate of fixed period exclusions in secondary schools for those students with SEN compared with the old twelvemonth. In 2007/08, the rate of fixed period exclusion for those students with statements was 30.8 per cent ; the rate for those with SEN without statements was 28.9 per cent. This compares to 5.1 per cent for those students with no SEN. † ( DCSF SFR, 2009 ) . I found the most important facet of this study is the bulk of exclusions both lasting and fixed period, where as a consequence of relentless riotous behavior. This contributed to a monolithic 31 % to all lasting exclusions during 2007/08 in province funded secondary schools in the UK ( DCSF SFR, 2009 ) as frequently associated with BESD scholars. This was dual that of the following major subscriber being physical assault on another student. Having looked at these figures it is obvious that the inclusion of BESD students ‘ is still really much a high precedence country, sing the sheer volume of exclusions they represent. As a following measure I need to look into what practises and policies are being put in topographic point to assist cut down this figure.It is evident that BESD clearly stands out from other SEN appellations. Many within the instruction system still remain ill-defined on how to pull off scholars whose SEN on a regular basis seems to necessitate retaliatory actio n, potentially including exclusion. It is unusual to see a school policy that recommended a punitory response for a scholar who demonstrated trouble in reading as a consequence of a known acquisition trouble. If this were so all scholars recognised as holding a SEN with cognitive damage like dyslexia, would be at uninterrupted hazard of exclusion merely because of their SEN. Realistically they would hold their demands met by an individualized programme, including extra resources, larning support, extra clip allowances, ICT handiness and much more. ( Null, 2008 ) .If a student is identified as holding BESD falls quarry to the exclusion punishment, is this a contemplation on the schools inability to pull off and back up that student neglecting to run into the demand of the National Curriculum ‘s Inclusion Policy. Is it still acceptable to state that in some cases exclusion may be the lone option non in the sense of â€Å" acquiring rid † as its negative intension implies, but to put the scholar in an environment that will be better equipped to vouch their entitlement to an instruction. Previously I thought that exclusion was a agency of traveling on scholars to a more suited acquisition environment where they will hold better support. Having experienced the other side of exclusion, I question this move. There is turning concern over the ability of surrogate commissariats to run into the demands of the scholars in mention to the frequence of Sessionss available and the nature of the educational chances on offer ( Gray and Panter, 2000 ) . Should more be done to forestall exclusion, schools reflect the construction and regulations of the society we live in and if we can non learn BESD learners how to get by within the confines of a school, how are they to pull off in society where there is really small support. Exclusion deprives scholars of societal interaction and a high degree of instruction, increasing the opportunities of them going disaffected, taking portion in anti societal behavior and cut downing their part to the state ‘s societal and economic well being ( Gray and Panter, 2000 ) . During an observation at School A, I identified that as portion of the schools ‘ Plan for Success 2010-13 they wanted to raise accomplishment of the least successful groups of pupils. I hope to look into the current tendencies of inclusion of BESD students ‘ and place what patterns are good in advancing their inclusion in mainstream secondary schools and their effectivity in advancing a positive acquisition environment, raising attainment and making good rounded scholars who are able to accomplish societal and economic well being, in conformity with the Every Child Matters Aims.In order to understand what is being done to include scholars I must foremost specify it.Inclusion is the addition of engagement and decrease of exclusion from, the civilizations curricula and communities of local schools. Inclusion is concerned with the larning engagement of all pupils vulnerable to exclusionary force per unit areas, non merely those with SEN. Inclusion is concerned with bettering schools for staff every bit good as for pupils.( Centre for Studies on Inclusion in Education ( CSIE ) , 2000 ) .The current national model is embed with values and rules back uping equalit y, diverseness and inclusion including the right of all scholars to entree a rich course of study, provide chance to belong and accomplish. These rights were set out in the national course of study as a set of rules now known as the `general inclusion statement` . The three chief rules for inclusion are ;The demand for suited acquisition challenges.Reacting to pupils ‘ diverse acquisition demands.Overcome possible barriers to larning and appraisal.These three rules focus to a great extent on what the school and instructors should be making to make a positive acquisition environment for all scholars. For me the most of import issue to see is what extra resources and preparation are provided to assist instructors provide for single acquisition demands. Having read several documents on the effectual direction of BESD students ‘ and sing a school with an internal support unit, I have identified several successful methods that were echoed in several documents in advancing the inclusion of BESD students ‘ . Over the last few old ages at that place has been a steady diminution in exclusions due to the addition in support units with specialized trained staff within mainstream schools in an effort to advance inclusion. School A provided extra support for students ‘ at hazard of exclusion in a support unit within the school. At first I noticed the unit provided an environment that the students ‘ felt safe and able to concentrate on their acquisition. The staff and pupils seemed to hold good relationships with each other. Within the unit it appeared that there were clear outlooks of the students ‘ as incidents arose when effects were implemented which the students ‘ responded to. Research in 1999 by Ofsted identified that students with BESD preferred working with instructors who meant what they said and followed the carnival but house. Additionally the research identified that successful schools believed that hapless behavior is non the mistake of the student but thei r reaction to the people and environing environment as shared by The Underwood Committee Report on Maladjusted Children ( 1955 ) and Ogden ( 2001 cited in Jull, 2008, p.15 ) . Having read these accounts I now know it is of import for schools to see how the school environment can be modified both physically and socially to cut down the presence of triggers taking to behavioral jobs. Examples of such triggers include unjust competition, inappropriate or irrelevant academic demands, bossy instruction manner, inordinate or deficiency of structuring ( Maag, 2004, p.61 ) The category size was little consisting of merely six students ‘ . The aesthetics of the schoolroom were shown marks of debasement and the siting layout did non look optimum. These units provide chance for students ‘ with BESD to hold an individualised timetable supplying extra support where it is needed leting them most of their educational and societal development to develop in a mainstream environment ( Gray and Panter, 2000 ) . The school followed the SEN Code of Practice three phase attack in placing degrees of support for students on the SEN registry. When looking at the Particular Educational Needs Staff Handbook I noted all students ‘ registered as holding BESD where School Action or higher. I was so able to place through the proviso maps in the enchiridion what support the student ‘s would have. During a visit to school A, I observed student A, whose timetable consisted of lessons in the support unit and normal lessons in the afternoon. During the forenoon student A attended forenoon lessons in the support unit alternatively of physical instruction due to a struggle with the instructor which I identified as an ongoing job through treatment but had yet to be resolved. In the afternoon he attended scientific discipline and mathematics. There was a clear contrast in the manner each lesson was delivered. The scientific discipline lesson merely had four students ‘ go toing who were all sat individually at the instructors direction. The lesson was lead in a really autocratic manner. Pupil A was demoing marks of detachment by looking about and shirking with points on his desk. I felt pupil A had non been motivated or challenged academically. In contrast the mathematics lesson was a batch busier. The instructor started with an synergistic starting motor acquiring the whole cat egory engaged. There was good schoolroom direction where some debatable students ‘ had to be relocated and the instructor demanded silence when explicating activities but was rather happy to let pupils to speak while working one time they had finished. The schoolroom was a really positive acquisition ambiance with all students ‘ working and basking themselves. I noted that pupil A was one of the brightest in the category as the instructor supported during treatment at the terminal of the lesson. The instructor had provided plentifulness of chances for student A to reply inquiries during the lesson and provided tonss of positive congratulations. It was interesting for me on contemplation to see where student A had been seated during the lesson and had this had a direct impact on his ability to concentrate. Comparison between the behavior of junior aged kids go toing a unit for students with emotional and behavioral troubles and similar kids in mainstream categories Wood, Michael Henry July-1995The SEN codification of pattern implemented a three phase attack in fiting the demands of students with their SEN. The first phase is School Action where low degree support is provided frequently ensuing in a Individual Education Plan, puting out learning schemes, usage of resources, usage of extra staff and short term marks. Next is School Action Plus which encompasses all the above but so includes audience with external support services provided by the local Authority and outside agencies. ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?

Sunday, September 15, 2019

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m