Monday, September 30, 2019

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m

Sunday, September 29, 2019

Crash, and The Forest, The Trees, and The One Thing

The movie Crash tells the story of many seemingly unrelated people who are trying to live their lives in Los Angels, are actually intimately intertwined with each other. The article â€Å"The Forest, the Trees, and the One Thing† elaborates on the theme of interconnectivity by using the analogy of the individual trees, and how they come together to make a forest. Both the movie and the article show how people who are just trying to go about their dally lives affect others In more ways than we realize.The locksmith played by Michael Penn was the easiest to empathic with, because he was one of the only characters who was genuinely a nice person. The scene where he gives his daughter the invisible, impenetrable cloak was easy for most people to empathic with because he was being a good father by making his daughter feel safe. He is one of the most touching characters because even when the Iranian man is yelling at him and treating him badly, he tries to explain to him that the do or needs to be fixed, and not the lock that he keeps requesting.Sandra Bullock's racism visibly disturbs and Insults Michael Penn when he Is fixing her lock, because Sandra Is yelling at her husband that the man ‘†with the jail tattoos† is going to go give their eyes to one of his â€Å"homiest† so they can break in and steal from them. Michael does not say anything though, but he makes sure to leave all of the keys on the counter in front of her when he leaves to show her that she is wrong. Sandra Bullocks character Is a great example of how racial attitudes shape behavior.When Sandra and her husband are walking home from dinner, she Instantly grabs his arm when she sees two black men walking towards them. She Is racist so she immediately assumes that since they are black, they will try to rob them, which coincidentally is exactly what happens. This incident only serves to strengthen her already racist beliefs. When they get home, she is so paranoid that sh e makes her husband get their locks changed, and then wants the locks to be changed again in the morning because the locksmith has tattoos and is Latino.Her racist attitude towards others begins to show Its downfalls when she falls down the stairs at the end of the movie, and her own â€Å"friends† will not take her to the hospital because she is at the spa. Sandra then relies on her Mexican maid, who she regularly berates, to take her to the hospital and make sure she is taken care of. Sandra realizes that her aid is the only one who was there for her, and that her maid is her only real friend. Matt Dillon plays a bitter, racist cop who is teaching his rookie partner the ways of the force.The last thing that he says to his rookie partner Is ‘Walt until you've been on the Job a few more years. Walt until you've been doing It a little bit longer. † Dillon is implying that after a few years, Ryan Philippe will start to see the trends that eventually lead to more bla ck men being arrested than white men. This trend comes from racist cops who believe that black people are criminals, and it reinforces their life because they keep arresting black people. Dillon also blames the black supervisor at his fathers HOMO for not providing adequate treatment for his father.He thinks that she only has the Job because she Is black and he thinks that a more lady to get the Job. Ludicrous' character is a stereotypical black criminal in LA who has vowed to only steal from white people. When he hits an Asian man in the street, he wanted to Just leave him to die, but his friend made sure that they dropped him off at a hospital. In the beginning of the movie, he complains to his friend that everyone else thinks that hey have him figured out because he's black, especially when Sandra Bullock grabs her husband's arm. He then proceeds to steal Sander's car and prove that she was right to be scared.Ludicrous then breaks his one promise, to never steal from another blac k man, when he tries to carjack the Movie Director Cameron. After Cameron has the standoff with the police and he is let go with a warning, he drops off Ludicrous at a corner and tells him Mimi embarrass me. You embarrass yourself. † Ludicrous then commits what is probably the most morally correct act of his life by saving the updated Chinese people that he found in the back of a van that he had stolen. The last character that I am analyzing is Ryan Philippe, the rookie cop.When his partner Matt Dillon pulls over the black couple, he feels uneasy because he can see the racial motivation that his partner has for pulling him over. He is beginning to see â€Å"the real world† that is not sugar coated. When he requests to be moved to a solo car because he does not like how his partner is racist, the Chief tells him that he needs a better reason. He begins to realize that most people won't personally care about him, and that they only care about themselves. He is becoming aw are that it is a dog eat dog world, and he needs to learn in order to survive.The article â€Å"The Forest, the Trees, and the One Thing† and the movie Crash are both great examples of connectivity. In Crash, all of the characters affect each other in one way or another, and â€Å"The Forest, the Trees, and the One Thing† shows us, the readers, how we may affect more people than we think. The article tells us about the Forest, which is society, is made up of a multitude of trees, or individual people, and the One Thing that makes the Trees a Forest, is the One Thing, which is the interactions are connections between the Trees, between the individual people.This is also shown in the movie because of the many different interactions between all of the characters and how they unknowingly influence each other. The idea interactions and connectivity is expressed in â€Å"The Forest, the Trees, and the One Thing† is shown when the author says â€Å"The choices we make as individuals matter beyond our loves more than we can imagine†. The author also elaborates on the effects of racism in a society giving examples such as â€Å"When the subject of race and racism come up, white people often withdraw into silence as if paralyzed by guilt†.The character played by Ludicrous also expresses feeling similar to this when he talks to his friend about how everyone thinks that they know him and â€Å"type†. As humans we think of most things as a collection of parts that function together in order to do things that each part would be unable to do on its own. We think of families as individual people, the mother, father, daughter, son, sister, brother, and their relationships with each other is what makes them a family. If this is the way that we think of things and comprehend them, then we can think of society in that way as well, Just with more people, more trees.We begin to think about the relationships that we normally overlook, such a s the cashier at the Cutbacks that you make small talk with while you we realize how much of an impact we have on other people with Just these little interactions, we realize that all of us play a large role in the big family that we call society. In the forest, little trees can be protected from storms under the canopy of larger trees, or the larger tree can slowly kill the smaller trees by not letting enough sunlight through. Without realizing it, everyone influences everyone, and that, is the one thing that makes Just a bunch of trees, a forest.

Saturday, September 28, 2019

Teaching English to Young Learners Essay Example | Topics and Well Written Essays - 5500 words

Teaching English to Young Learners - Essay Example Therefore, the main attention of the paper is focused on a combination of playful methods, involvement of music and games in the process of language acquiring. Part I Literature Review Before starting up a discussion about how to teach English as a second language to young learners, it is relevant to observe classic theoretical works in this field. Teaching English to young learners as a second language is considered in the works of classical theoretic writers, such as Stern and Weinrib (1977), Dunn (1983, 1985), Halliwell (1993) and Drucker (2003). Their theories were based with regard to the evolution of children at pre-school age, correlation between their physical and intellectual abilities etc. Moreover, children’s abilities to narrate and cognize were also taken into account. With respect to children’s abilities, different activities, games etc were chosen by theoreticians as the basis for development of the most appropriate learning program for young learners. Th e most common practice for teachers is the usage of a form of a game during the lesson. This approach is relevant to children who are already able to solve brain teasers or riddles. In this case an indirect learning occurs. A child does not have to learn some new words or sentences; he is just trying to solve a riddle or a puzzle (Arnold, 1999). Therefore, a role of indirect learning is as well important as a role of direct learning, because â€Å"whether one is used more than the other depends on a combination of intellectual development, temper and circumstances. Direct and conscious learning seems to encourage an elaborated accuracy of the language, while acquisition stimulates a spontaneous and more fluent use† (Arnold, 1999). The ideal variant of English language learning is when both accuracy and fluency is reached. Unfortunately, child’s abilities to lean grammar consciously are underdeveloped. From the one perspective, children have in-born skills to acquire la nguage. Thus, this fact should be properly used by a teacher in order to develop a relevant methodology enabling children to use their language knowledge not only during the lessons, but also outside the class. Consequently, game is a perfect opportunity and the right way to a proper learning. In accordance with Halliwell (1993): â€Å"games should not be disregarded as a waste of time. They also shouldn’t be considered as something that can be introduced as a time filler at the end of class or as a prize for doing  «real » work; they are real work. Games make up a central part of the process of language acquisition, which is wonderful because children have such a strong sense of fun and games† (Halliwell 1993, p. 6). Consequently, we can surely conclude that during games children reveal their creative potential, stimulate their imagination and fantasy. For example, the main role imagination plays in the L2 class. Moreover, Halliwell (1993) underlines that fantasy involvement benefits to real usage of language. In a playful manner children can make an attempt to describe to each other a certain monster and they will try to use different words to reflect their fantasy verbally. In the contemporary studies on English teaching to young learners there are three main types of contents: these are conceptual, attitudinal, and procedural (Lessow-Hurley, 2003). In the

Friday, September 27, 2019

Heredity, Structure and Function - Discussion Unit 6 SC300 Essay

Heredity, Structure and Function - Discussion Unit 6 SC300 - Essay Example Man, being more gifted than all other animals in terms of intelligence has the responsibility of ensuring that nature is maintained. Otherwise, if it were not for the conscience of people who conserve the environment, more animals and plants would be extinct. However, there are those who do not care and are on the forefront destroying nature. Man is part of nature, and extinction of other creatures does have various effects on him. Some plants are of high value as medicine sources, for example, Cascarilla cinchona pubescens, a source of anti-malarial drug (Robalino, 2009). However, due to its overexploitation it is on the verge of extinction. Thus, man loses, as sources of medicine deplete with time. The dilemma that exists in man’s life is whether to give up on the gains from other creatures to avoid extinction or continue gaining at the cost of the almost extinct creatures. On the other hand, man can continue gaining from the creatures; concurrently, he can evaluate his ways to avoid the creatures from extinction. In the evaluation, man can exploit the creatures but at least provide a replacement of the same. In the case of plants, man can opt to plant others after using them. Ethically, it is man’s responsibility to provide protection to other creatures instead of killing them. Man’s efforts to preserve nature’s creatures face many challenges. These challenges include lack of adequate manpower to fight for the preservation of creatures against those who are after them. If I were president, I would take the initiative to salvage endangered species by introducing a policy that prohibits people from utilizing, in any way, an endangered species, not unless one has a permit. Moreover, for one to get a permit, he or she has to provide a valid and credible purpose of the work and provide a way of preventing extinction of the species. The tradeoff that I would make to enforce the policy is providing a permit

Thursday, September 26, 2019

Consent to Search Research Paper Example | Topics and Well Written Essays - 4500 words

Consent to Search - Research Paper Example While there are a number of reasons why a police officer might prefer to obtain consent as opposed to warrant, it is less clear why an individual would voluntarily consent to the inconvenience of a police search. This paper analyses the consent to search issue and considers why policy resort to consent searches as an investigative tool, why individuals might voluntarily consent to a search and how consent searches benefit the public. Consent Searches as a Police Investigative Tool According to Stack police largely rely on consent searches at the airport in their efforts to interdict illicit drug trafficking (183). Police suspicions are usually aroused as to who might be a likely drug trafficker based on the latter’s â€Å"conformity† to police â€Å"drug courier profiles† of persons involved in the illicit drug trade (Stack, 183). This suspicion would not usually be sufficient to obtain a search warrant on the grounds of probable cause or reasonable suspicion tha t the individual is about to or has committed a criminal offence. Even if, the officer had probable cause, it would be counterproductive for the police to apply for and go through the process of obtaining a search warrant as the individual will likely leave the airport or take a flight outside of the jurisdiction in the meantime (Stack, 183-184). According to Nadler and Trout, police investigative practices in the US typically involve â€Å"on-the-fly searches† as a means of detecting â€Å"evidence of crime† (328). In other words, these types of searches are impromptu and not incidental to an existing criminal investigation. Police are: †¦acting on their instincts and training regarding a person’s appearance or behavior or even presence in a particular place (Nadler and Trout, 328). For the most part, consent searches are obtained during routinely made traffic stops. In a typical case, the police will often stop a driver for a minor traffic infraction such as a flawed tail-light, changing lanes without a signal or for exceeding the speed limit. When police officers stop a motorist for a minor traffic infraction it is not usually because of the perceived danger of these infractions, but for the â€Å"opportunity† the stop provides for â€Å"investigating suspicious citizens† (Nadler and Trout, 329). Even where police stop an individual in a routine traffic stop on a hunch that the individual is likely in possession of illegal drugs, the stop is not unlawful if there is evidence of an actual traffic violation (Whren v US, 806). According to Nadler and Trout, the federal government awards significant funding to local police departments as a means of advancing the nation’s war on drugs (329). Therefore, local police departments have a significant incentive for interdicting drugs and this accounts for the large reliance on motorists consent to be searched and have their vehicles searched in routine traffic stops (Nadl er and Trout, 329). Consent searches are necessitated where there is no probable cause or where there are no reasonable grounds to suspect that a crime is being committed or was committed (Nadler and Trout, 230). In addition to passengers at the airport and drivers in traffic

Wednesday, September 25, 2019

Macroeconomic Objectives of the UK Govenment Economic Policy Assignment

Macroeconomic Objectives of the UK Govenment Economic Policy - Assignment Example This paper offers a comprehensive analysis of the framework of macroeconomic policies of the government of the UK. In order to exercise effective administration of the country the government must determine the objectives of its policy. Then the target has to be selected. The next task is to choose the instruments of policy to be used in pursuit of the objectives. Four major economic objectives, that any government should pursue, include low unemployment level, price stability, satisfactory balance of payment position and sufficient sustainable economic growth. In addition to four major economic objectives a government may have other objectives for the economy. These may include a more even distribution income of wealth and a cleaner environment. It is difficult to achieve all four macro economic objectives at a time. Countries rarely experience stable economic growth. Instead they experience business cycles. Periods of rapid economic growth are followed by periods of low growth or even a fall in output. Sometimes, these cycles can be the result of government policy of raising taxes in a recession in order to compensate for falling tax revenues caused by lower incomes and expenditures. Unemployment fluctuates with business cycles. High employment has a number of significant advantages. Most people receive higher incomes from employment than from state benefits. Governments usually not aim for complete price stability but for low and stable rate of inflation. The government also is to ensure balance of payment equilibrium. ... New classical economist refers to the non-accelerating rate of unemployment ( NAIRU). It can also be called the natural rate of unemployment. It is the rate of unemployment which exists when all those who want to work at the going wage rate and who have the appropriate skills can find a job (Storm & Naastepad 2012).  . Whether it is example four percent or 8 percent will depend on a number of factors. These include the gap between paid employment and state benefit, attitudes towards living on benefits, labor market information and skill levels. A government basing its policies on new classical theory would seek to reduce NAIRU by improving the working of the labor market ( Top of Form Fabiani 1998).   Bottom of Form . Furthermore, Governments usually not aim for complete price stability but for a low and stable rate of inflation. Complete price stability or zero inflation would mean that the general price level is not changing. In practice, in a dynamic, growing economy the gener al price the general price level is likely to rise by between 1% and 2% per year. This rise will reflect the buoyancy level of demand and the fact that the quality of goods tends to rise. For example, a television purchased in the year 2013 may be 5% more expensive than one purchased in 2012 but it may also, for instance, have extra channels and give better reception. If the rate of inflation is equal to or below rival countries, the countries can at least maintain its international price competitiveness. If it is stable then firms do not have to guess what wage claims they need to make to maintain their real wages. However, high and accelerating inflation is clearly undesirable. It can reduce a country’s international competitiveness, reduce the real income of some groups, create

Tuesday, September 24, 2019

Writer's choice Essay Example | Topics and Well Written Essays - 250 words

Writer's choice - Essay Example The continuous conflict between these two nations has actually been built on social injustice against the Palestine, economic apartheid, and political oppression imposed on them by the Jews. The root of the conflict can be traced back to the invasion of the Palestine by the Zionists in 1800s and the gradual but steady support the Israeli community has been gaining from their fellow American Jews. The pressure on the Palestine on various sovereignty issues has been growing since 1800s owing to the effects of holocaust and the subsequent mass immigration of Jews to Middle East and US. The Scholarly books offered over this issue all point fingers on the historical injustice that Israel has always done against the Muslim dominated Palestine as the world watches and United States’ open complacency on the issue. The conflict runs through ideologies and community affiliation that disregards the religious inclination. This explains why US supports the Jewish Israeli Who profess Judaism rather than the Muslim and Christian Palestine. The US has economic interests in Israel and this includes financial support on various social, economic, and political policies. On the other hand, the world especially the Arab states have keenly been following the actions of US towards the two nations’ conflict resolution. It has therefore been a delicate balance for the US since this has serious diplomatic challenges and its entire economy. Mark Green, ed., Persecution, Privilege & Power: Reconsidering the Zionist Narrative in American Life, Thirty Essential Articles on the Most Pressing Issue of our Time (2007): Read carefully the Book Description/About Mark Green, click on TV Interviews and watch the Jeff Blankfort (#1 and #2) short video clips at:

Monday, September 23, 2019

Channel tunnel Essay Example | Topics and Well Written Essays - 750 words

Channel tunnel - Essay Example The Transmanche Link (TML) is the contractor who is responsible for the Channel Tunnel design, construction and commissionioning of the project. Design of the Channel Tunnel The design scale was massive and highly intricate and hence it was categorized into five divisions – a) System throughput b) Performance of shuttle trains c) Environment d) Safety and passenger evacuation e) Scenarios and operational procedures The design of the Channel Tunnel included four phases: 1. Development Study 2. Outline Design APS) 3. Definitive Design (APD) 4. Detailed Design (PEO) The design of the project was so intricate and diverse with a huge volume of work and specialties involved that sub-contracts making use of the expertise of major independent companies were accepted. Design teams such as BETU (Tunnel design office) and BETER (Terminal design office) contributed their expertise. 1. Structural design a) The Service Tunnel The Service Tunnel Transportation is designed with 24 rubber-tyre d vehicles rolling along at top speed of 80 kph that is electronically guided by cables that are embedded but allows for the maintenance of permanent equipment. These shuttles are 650m in length having a single deck. There are open wagons that are 20m in length, 4 m in width and 5m in height with a load capacity of 44T. It is designed in such a way that special amenity coaches are provided to carry drivers between the locomotive and the HGV wagons. b) The Main Railway Tunnels (RTs) The design comprises of two tunnels 50 km in length and running parallel to each other with a distance of 30m. Each tunnel has a single rail track, overhead catenary, power supply, cooling pipes, two walkways, a drainage system and other auxiliary services. These tourist shuttles are designed with an average capacity of 135 vehicles and a length of 775m. Each end has a loading and unloading wagon and 12 twenty-five meter long carrier wagons that are closed and identical. Special Design Features Rail Signa ling System The rail signaling system is so designed so as to ensure safety to passengers, drivers, goods and locomotive behavior. All information is directly relayed within the drivers cabin. It also includes an automatic speed limit to ensure safety. Track System Since this railway is the most heavily trafficked with an average of about 240,000,000 tonnes per year, the design is made to match this output. It has a strong support system made of concrete to last for a minimum of 50 years. The strong framework is made highly tolerant for safety to life and property and is also designed with a rail fastening to allow minor service adjustments for maintenance and changing of components. The design also includes a low aerodynamic resistance that allows airflow under the trains. The tunnels comprise of a non-ballasted track made of concrete consisting of UIC 60kg/lm rail tracks that is mounted on pairs of independent support blocks. The tracks are isolated from the support blocks by nylo n clips and rubber ‘O’ ring. Such designing not only lends resilience but also maintains a high level of geometric tolerance. The design also contributes towards increasing speed that is 200km/h for TGVs through trains, while shuttles go at 160 km/h. Rolling Stock Rolling Stock comprises of 43 locomotives and 512 wagons that include

Sunday, September 22, 2019

Communication Style Case Study Essay Example for Free

Communication Style Case Study Essay Communication style can vary among individuals. Common communication types include assertive, passive, and aggressive. Assertive individuals communicate confidently and speak up for themselves. Aggressive individuals communicate with verbal attacks; they speak their feelings without regard to others, often in a condescending manner riddled with superiority tones. Passive individuals communicate out of fear of displeasing others; they avoid conflict often denying their own feelings or needs (Hansten, 2009). This paper will be discussing three case studies and a scenario from my own personal experience. In the first case study Rashad was passive and Robin was aggressive. Rashad an aide and Robin a RN attended a team meeting. Rashad spoke about role clarification during the meeting stating that he thought it was part of his role to anticipate some of the needs of the patients. Robin was aggressive with her tone toward Rashad and disregarded his feelings and undermined his ability to do his job. Robin stated that he was only an aide and that he should only do what he is told. Rashad then planned on being passive-aggressive toward Robin in the future by not  doing his job on his own, and only doing the things he was told to do. Robin’s condescending manner when speaking to Rashad did not take into account his feelings and she spoke with a sense of superiority. Rashad, fearing losing his job if he defended against her assault, was passive and quiet while devising a plan to make her pay for the way she treated him. This type of communication between Robin and Rashad is toxic and will lead to vengefulness and hostility among coworkers. Robin could have been assertive and clarified the role of RN and aide and the expectations of both parties. Rashad could have been assertive by being confident enough to stand up for his rights and expressing his feelings about how Robin treated him. The second case study a school nurse named Pamela was passive or non-assertive when dealing with a volunteer Brigite who had administered some vision and hearing tests. Pamela noticed that the previous screens results and the results from the tests that Brigite administered differed. Pamela was concerned that they were not accurate. Instead of communicating to Brigite, and possible educating Brigite on proper technique for administering  the tests, Pamela decided to redo all of the tests herself. This passive type of communication lead to a lot more work for Pamela and denied Brigite the opportunity to learn. If Pamela had communicated assertively with Brigite they could have retested the students together; with Brigite learning proper technique and building a trusting relationship between Brigite and Pamela. When dealing with delegated tasks, being assertive about how to do the task with clear expectations can build a trusting relationship among staff. Failure to be assertive leads to one party feeling like they. COMMUNICATION STYLE CASE STUDY 3 need to do all the work; this can lead to overtime, burn out, and decreased job satisfaction. The party who was denied the opportunity to learn because of the fear of the delegatee may feel underappreciated or not a part of the team. Feeling that you have to do it all for it to get done correctly can lead to multiple people being dissatisfied with their job. In case study three, Rosa is a surgical center manager and Mabel is a surgical technician. Mabel was aggressive to Rosa with regards to her job description by stating that her grandparent was the chairman on the board  and that she would have Rosa’s head on a platter. Rosa was assertive in making sure that Mabel knew that what she was refusing to do was in her job description. Managers need to be assertive and treat everyone fairly regardless of who they know or are related to. Not being assertive with Mabel could have lead to hard feelings among other coworkers. Mabel’s aggressive behavior was threatening to Rosa; not only to Rosa’s authority but for her job in general. Mabel may feel entitled due to her grandparent’s role on the board, or she may just be a lazy employee, but  whatever her motivation she has created a difficult situation for her manager. Rosa needs to continue to have the confidence to remain assertive in order to maintain the respect she needs to do her managerial duties effectively. If Rosa becomes passive and lets Mabel manipulate her, she will lose the respect of the employees she manages. In my own personal scenario I was dealing with an aggressive family member whose mother was very ill and the prognosis was poor. I had to remain assertive and not let my feelings of anger get the best of me. This family member had been caring for her mother at home for about a year. When her mother was brought to the hospital she was emaciated, weighing only 70 pounds, she had 17 pressure sores, aspiration pneumonia, and was contracted into the fetal position. The patient flinched every time her daughter came near. Although Adult Protective Services had been notified, the daughter (family member in question) was allowed to stay with the patient. Any time a staff member would try to do any care for her mother the daughter would aggressively try to tell us how to do our jobs, and made accusations that we were the ones who created the sores. She often sabotaged  dressing changes but inserting herself into the process often contaminating the area. Despite her aggression the staff remained assertive that we were trained to do our jobs, and that we were following policy. I was the patient’s nurse on the day that she was rapidly declining after her lung collapsed and she was actively having a heart attack. The patient’s daughter became very aggressive with me and I had to be very assertive. The daughter wanted the patient deep suctioned; she was sure that would fix her. I had to continue to be assertive and explain that suctioning would  not help in this case but could make her mother worse. I involved respiratory therapy and the doctor; we had a COMMUNICATION STYLE CASE STUDY 4 meeting before meeting with the patient’s daughter to explain the severity of the situation. We were able to medicate the patient and the patient calmed down with her breathing. At this point the daughter accepted what the situation was and thanked me for helping her mother. I saw an opportunity to sit down beside the daughter and discuss realistic expectations and set some boundaries. By remaining confident and assertive and involving the team to join. I gained the daughters trust, therefore decreasing her aggressive behavior. If I had been passive or avoidant the patient would have suffered. If I had gotten defensive and aggressive the patient would have suffered. By having good communication skills the situation was diffused and all parties came to an agreement. If I could do it over again I would have set boundaries earlier. I felt that the daughter was aggressive due to her stage in the grieving process or due to her guilt of her mother deteriorating while in her care. I was assertive when the patient’s daughter  became aggressive toward me, but I was also avoidant of conflict by â€Å"choosing my battles. † Among the communication types assertive communication is the most productive. Passive or aggressive behavior can lead to difficulty managing others, hurt feelings, and stress. To effectively communicate in the healthcare setting, assertive communication is key for dealing with colleagues, patients, and their families. Reference Hansten, R. (2009). Clinical Delegation Skills: a handbook for professional practice. Retrieved from the University of Phoenix eBook collection database.

Saturday, September 21, 2019

Effects of ICT Essay Example for Free

Effects of ICT Essay New Technologies The new technologies in the computer industrial have made major advances. This has opened new jobs but have also lost job. Things can be done faster and over night. It has become easier and faster to send thing across the world. Mail has become so fast that you van now see events and meet with people in video with people that are on the other side of the world. From the invention of the computer people has tried to make them smaller and faster. In the beginning they made 3 forms of computer, apple Macs, IBM mainframes, and desktop pc. When this was going on IBM were leading the way with the mainframes but as IBM moved into making mainframes the desktop pc began to get popular. IBM was forced out of the industry. Since then they have lost out on a lot of the market. This led the market open and has been filled with other companies. Since then there has been a lot of new technologies like faster internet and the need for speed as increased and the need better communication between people all over the world. Advantages of ICT The advantage of ICT is that it is fast and is cheaper to run than people. This has led to a revolution in building on production lines. For example in Ford at the car plant in Dagenham they have replaced the working line that once had many people to a line made of robots to do one job at a time. Another advantage of ICT is that is easier to talk to people on the other side of the world form your home computer. With advances in technologies we can have video meeting and conference with people across the world. The world has now become small. Disadvantages of ICT The disadvantages of ICT is that cause of millions have job have been lost due the revolution it has left millions of people out of work. This has also left people with no money, but when the car was invented what happened to the horse and cab driver. They trained in driving cars. So people who lost their jobs should train in the technologies and adapt to the changes. An animal in the environment that has a changed his eco system changes to fit in so why cant we. Effects of ICT in the work place ICT has greatly effect the work place because of new ways of communicating with other people across the world and the people that would have jobs like printing or running printing presses. They jobs would have gone to save money with the bosses and they would have been replaced with jobs like computer operators. This would be cheaper for the management and faster. It has also changed the world does business in transfers and moving money from account to account. With the invention of the Internet speed will only get faster and better quality will always come on the market. This means when you pay for goodies the money is transferred directly into the supplier accounts. It doesnt just work on a small market but when you buy stokes and shares they are paid directly and the value can go up or down according to want you do. In offices these days they will put a computer work station at every desk to have easy access to the documents and other personal or business resources. This is capable cause of they network that the computer is connect to. The environmental Effects of ICT The effects of Computers in the environment is that we dont use as much paper as we used to so therefore there have been a lot less trees cut down due to this. With no computer powered machine to cut the wood there is also a lot less wastage from other forms of waste from the wood and the paper being wasted. In an older office they would use a lot of paper to write things down to remember things. This made people use more paper and when there was a memo going round the office they would use the paper to write it on to. This would have meant the why would have use millions of tons of waste paper every year. With and e system they would use and email to save paper because it is faster and more efficient to get a message to someone. This means that people would save so much more money than they spend on paper. Now they only would use paper in a letter that they would print off and give to the people that they would go to. The Social, Moral and Ethical Issues of Computers These issues are to do with the way we use things like credit cards and debit cards in our socialites today. These cards are used to borrow money to pay for other things like clothes and food. This is always using to pay as a substitute to money. These are known as credit cards. Credit means to borrow and pay back at the end of the month or the end of the period that you have borrowed that money. Another effect of Computer is the health and safety of them. Computer can cause stress and muscle pain in later life because you have to sit down and look at a monitor, which could give off radiation. These problems all need to be looked at when putting in an e system into a work place. Personal Privacy The issue of personal privacy because of computer they have a large amount of data in large database about different people across the UK. This can mean that they can sell your data to other people across the UK and therefore the junk mail is increased. These database hold information like your name, age, phone number, where you live, email address and in some database bank details. The information in these databases can be used for junk mail and other things that is not need for you. These are used for gaining information on people. Data Protection Act The data protection act of 1984 says that data that has been acquired lawfully from then person that the data concerned. It should also be up to date. There was a new data protection act of 1998 says that data can be build up over time but I needs to be keep lawfully and not given away for unknown uses, They should be given a small amount of information that would need to be transferred between two companies. Valid Data It is important that data is kept up to date by the companies cause if it is stored on a computer over a long period of time this has to been change in order if someone was to change there address or change the job. This is done by legitimate sources for the persons that have been put in to this. Everyone should be very careful on who they give out there data to. Security of Data The companies that also have the data need to keep are stored in a safe place and have it up to date. This has protected your files from hackers by using an encryption of data. This means that your data has to be secure in all ways.