Wednesday, August 26, 2020

City of Dreams free essay sample

I feel the second coming, the sentiment of a cool wind simply like a similar inclination I get when I bite a minty new gum. My heart detects each breeze of wind as it strikes my face and soon my heart is dependent on this sentiment of coolness. The trees look alive as though they are moving and the sun is sparkling brilliant, yet not to where it’s consuming blistering. As I stroll down the city boulevards, seeing sky towers and wonderful structures show up before my sight. The individuals that are in the city are singing and moving to communicate their affection for the city as well. At the point when I see these enthusiastic individuals it makes me need to celebrate and share each other’s culture simply as they do. Subsequent to strolling another mile, I showed up at Chinatown, which is the spot that feels like home to me. We will compose a custom article test on City of Dreams or then again any comparative point explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page Seeing the dominant part being Asians carries enthusiasm to my heart. My walk proceeds until I stop before the eatery called the Koi Palace. This is the place I had genuine true Chinese food which I have not had in ten years. My companions or family consistently leave there with a stomach that is prepared to detonate. Directly over the café is a boba place where me and my companions have a beverage and start discussions. That spot used to be our joint spot, yet now it’s overwhelmed with individuals from various schools and even various societies. The following stop was downtown and downtown was continually loaded up with enlivened individuals. Strolling through midtown hearing either jazz or the blues playing on the roads was consistently a spot that can brighten me up. There are a huge number of strip malls around, however as opposed to having standard styles there are stores that have interesting and unique styles. Each time I stroll past a most loved store the enticements of going through a ton of cash develops. Eventually I yield and purchase a lot of new garments, yet my wallet was perpetually discontent since it never has cash to convey. At the point when the sun sets down and the moon ascends, that is the point at which the city begins to sparkle. The landscape that it gives and the inclination bliss is consistently a characteristic of the city. The location of brilliant lights and hordes of individuals makes the city satisfying and entertaining. I generally realized that each progression I assumed or any position I went in this city would consistently be a memory to always remember.

Saturday, August 22, 2020

Tartuffe Essays - Tartuffe, Damis, Le Tartuffe, Orgon, Tartuffe

Hypocrite Essays - Tartuffe, Damis, Le Tartuffe, Orgon, Tartuffe Hypocrite by Moli?re I was in the crowd at the proformance of Tartuffe the main night it played at Prairie High School. I truly enjoyed Tartuffe, I felt that the play was really entertaining, and I preferred how it began by telling the crowd Hypocrite is a cheat. I thought it was a generally excellent creation. In Tartuffe we get essentially an individual view into Orgons?s home, all of the play happens here. In Act I, scene 4, Tartuffe, coming into chapel regular and drawing consideration with his uproarious petition. In chapel Orgon would offer him blessings and he would state they were twice excessively and right away offer some to poor people, again this sort of thing causes the crowd to figure it out that Tartuffe is a cheat and that he has Madame Pernelle and Orgon persuaded that he is great. At some point or another Orgon welcomes Tartuffe to live in his home. Fraud immediality takes everything over. He persuades Orgon to give the house to him alongside some significant papers. Orgon is absolutely in obscurity on whats going on and everytime an individual from his family attempts to converse with him about it he gets all frantic and the have a battle. Tartuffe?s entire purpose behind being in the house is that he is attempting to suduce Orgons youthful spouse. Everybody in his family knows what?s going on and they set hypocrite up to take a fall. It works and Orgon tosses Tartuffe out of the house, But what we as a whole overlooked is that Orgon had given everything up to Fraud and Tartuffe has Orgon and his family ousted from the home. Fortunately, the great lord sees through Tartuffe and has him captured. This play is set in Orgons home. The specialized components of this play are utilized to set a temperament for the play. Like when Tartuffe begins to dominate Orgons home, Tartuffes assisstant starts to change the floor coverings and window hangings to the shading green, {Tartuffes fundamental color}, and afterward when Tartuffe begins to lose his control on Orgon, the house keeper come out and evacuates the green and replaces it with the standard shading. I truly wasnt affected by the changing of the hues until I recollected what occurred and acknowledged why it occurred. At that point it begun to improve a tad bit of an image., of how Tartuffe was dominating at that point losing control. The lighting of the play was all together acceptable however what I seen is when Damis is playing a computer game in the corner it was a little difficult to see and here him since everybody was before him and he was in the corner. I loved the ensembles utilized in Tartuffe I preferred how Tartuffe and his hireling donned green and afterward Orgon began sporting green, at that point Orgon went back to his normal garments, and Tartuffe wore some pimp garments, that we neet I got how that was functioning from the beginning. I dont very review many audio cues being utilized in the show, however previously and during recess there was alot of old style music playing so we got the possibility that we were going to see an a play about rich individuals. The way the playwrite utilizes Tartuffe in the start of the play to make himself resemble a hyprocrit, is one reason that I enjoyed the play since I truly feel that when the crowd doesnt like the villian it makes for a way better play. Furthermore, I imagine that the entire crowd felt that Hypocrite was an imbecile before the finish of the primary demonstration. I truly made some hard memories understanding the play while I was in the crowd, since I was under the impact that the play occurred in the 14 or 15 hundreds. I didnt discover intil the following day that the play had been climbed in time abit the 1990?s. I recently felt that the early english utilized in the play didnt very equivalent out with the entire 1990?s thing. That was one of the main thing that I didnt like about Hypocrite. I felt that it was attempting to come to a meaningful conclusion, not to confide in everybody since looks can be decieving. I feel that Tartuffe was truly implied for everybody to have a decent snicker, there wasnt much else to it. I believe that since I previously read the content, that is the thing that made me confounded about the spot in time that the

Thursday, August 20, 2020

Sunny day Sweepin the clouds away

Sunny day Sweepin’ the clouds away I was reading Evans most recent entry and I noticed that he mentioned Sunnys, which I dont believe has ever been blogged about. What is one to do when one discovers an un-blogged aspect of MIT??? BLOG IT! As awesome as it is to wake up 10 minutes before a class and not get to eat until 4 pm, sometimes a college student has to take some responsibility and plan their meals. I know, right? I mean, who has time for that? Ever since I can remember Ive been told that breakfast is the most important meal of the day. Instead of inspiring me to eat a balanced breakfast every morning, the constant reminder that I was skipping the most important meal of the day normally starts my day with a feeling of guilt. Thanks society. Every once in a while its important for an MIT student to have a good breakfast, which is why Sunnys exists. A short walk down Mass Ave is all it takes before you are seated to a nice hot breakfast at an affordable price, not to mention that Sunny is awesome and is always working. Part of what makes Sunnys awesome is Sunny himself. Always in a good mood and ready to sit down and chat with you at any opportunity, Sunny does his restaurant proud. Its also a great place to hang out with other MIT folk. I went yesterday morning with Maddie 11, Jordan 11, and Javi 08 and before wed been there even 10 minutes a big ol crowd of more awesome MIT people wandered in. Liz 11, Sam 09, Noah 09, and Chris 09 all showed up for breakfast and joined our table. Apparently were on such good terms that its even Sams responsibility to fix Sunnys wi-fi router whenever its having issues. I always order the same thing, the Gentle Giant, which is 2 pancakes, 2 eggs, hash browns, and bacon. As I was eating I struck up a conversation with Sunny and was offered the explanation of his obsession with The Simpsons. I dare you to look around that diner and not see The Simpsons, hes mildly obsessive (and by mildly I mean completely). Apparently he just really likes them, go figure. He used to drive around with a life-sized Homer buckled into the passenger seat of his car but after an old lady rubbernecked and almost crashed into him he decided to move Homer to the back seat. So, for all of you breakfast-deprived prefrosh and even to those of you non-breakfast-deprived ones, know that there is a great breakfast spot right near campus that not only has good food, but also good company. Just one more thing that makes MIT one of the best schools ever. -:-

Sunday, May 24, 2020

Skill Building Exercise 2.1_Frederick Taylor Excert Essays

Following are excerpts from a speech made by Frederick W. Taylor in 1911: If any of you will get close to the average workman in this country—close enough to him so that he will talk to you as an intimate friend—he will tell you that in his particular trade if, we will say, each man were to turn out twice as much work as he is now doing, there could be but one result to follow: Namely, that one-half the men in his trade would be thrown out of work. This doctrine is preached by almost every labor leader in the country and is taught by every workman to his children as they are growing up; and I repeat, as I said in the beginning, that it is our fault more than theirs that this fallacy prevails. While the labor leaders and the†¦show more content†¦Looking at Taylor’s and Grayson’s remarks, which were made approximately 73 years apart, one has to wonder what we have learned. Many similar comparisons could be made. Why do you think managers don’t seem to learn as much as they could from the past? †¢ Traditional relationships between management and labor looks nothing as it did 100 years ago, especially when it pertains to unions. Being the only industrialized country with its infrastructure mostly intact after World War II, the United States basked in economic superiority with American industry. However, management in the past rarely included employees in the decision-making process. There was a disconnect between management and labor which union leaders were utilized to close gaps and ensure fairness in areas such as pay and benefits, but more importantly, where safety is involved. In American businesses today, with government regulations and restrictions, differences in American and global markets and customs, outsourcing and contract services, and improvements in technology have changed the relationships between management and labor. According to an article written in Governing.Com, relationships between management and labor can be minimized by forming a joint process improvement committee (PIC), who are focused on driving organizational efficiencies. The committees are formed which enables both sides to pursue their interests with

Wednesday, May 13, 2020

Ismenes Monologue From Antigone

This dramatic female monologue is a selection from Act One of Antigone by Sophocles. About Ismene as a Character Ismene is a fascinating character. In this dramatic  monologue, she conveys grief and shame as she reflects upon her father Oedipus’ sad history. She also warns that Antigone’s fate and her own might be worse if they disobey the laws of the land. She is at once melancholy, fearful, and diplomatic. Context of the Monologue Within the Play The brothers of Ismene and Antigone battle for control of Thebes. Both perish. One brother is buried as a hero. The other brother is deemed a traitor to his people. When the corpse of Antigone’s brother is left to rot out on the battlefield, Antigone is determined to set things right, even if it means defying the laws of King Creon. Her sister Ismene is not as headstrong. She is sad for the death and dishonor of her brother. However, she does not want to risk her life by upsetting the â€Å"powers that be.† Ismenes Monologue Bethink thee, sister, of our fathers fate,Abhorred, dishonored, self-convinced of sin,Blinded, himself his executioner.Think of his mother-wife (ill sorted names)Done by a noose herself had twined to deathAnd last, our hapless brethren in one day,Both in a mutual destiny involved,Self-slaughtered, both the slayer and the slain.Bethink thee, sister, we are left alone;Shall we not perish wretchedest of all,If in defiance of the law we crossA monarchs will?—weak women, think of that,Not framed by nature to contend with men.Remember this too that the stronger rules;We must obey his orders, these or worse.Therefore I plead compulsion and entreatThe dead to pardon. I perforce obeyThe powers that be. Tis foolishness, I ween,To overstep in aught the golden mean.

Wednesday, May 6, 2020

Chilhood memories of frankie lennon and mine Free Essays

Reading     Frankie Lennon   feels like you become part of the story, you feel connected and involved at every scene that unfolds. The characters she introduces makes it more vivid and real, you can’t help but think of your own family and relatives that have been part of   your past and shaped your own present life. You begin to look back at your own childhood and adolescent years and recall the many struggles you went through to become the person you are now. We will write a custom essay sample on Chilhood memories of frankie lennon and mine or any similar topic only for you Order Now It makes us think back and wonder how we got over the conflicts and complications and been able to confront them. Readers connect to the stories due to similarities in culture, race, sexuality, and childhood. The author said in an interview, and to quote her:  Ã¢â‚¬Å"†¦I narrate stories starting with my childhood and take you with me on my turbulent life journey and struggle to find freedom from the many prisons that bind me.  I tell stories that make you think and re-evaluate issues. I offer the reader the chance to see and experience my naked feelings, conflicts, fears, and struggles and you get the chance to experience my trials and tribulations along with me. It will be exciting, funny, and heartbreaking. And it will never be dull.† â€Å"The   Mee   Street Chronicles: Straight up Stories of a Black Woman’s Life is a turn pager narrative of blunt memories in her struggle to live her own life and sexual identity. The book passes through generations dealing with sensitive issues like racism, oppression, homosexuality, and   Ã‚  alcoholism   that   still   exists in our society today. It lets us enter to places never seen before but will make us aware of our own feelings, in what we love and fear of, of our desires and what we value in life. The book mirrors that presents to readers what has happened and still happening in our lives.   Many people identify and unconsciously reflect with at least one story in the book. In a special way, it surprised and touched readers on their own personal journey. Like the author, we also preserve our memories through journals, diaries, photographs, and keep it in our hearts. We become proud of these memories because it is what our identity is all about. We pass them on to our children to tell them who we are to reveal secrets setting us free from denial. This book reminds us that we are not alone in our struggles. We may think we are strange and has a dark past, but who doesn’t? It inspires to move on no matter how bad it seemed or what people have done or said or how bad it appeared. Others out there also   went through the same difficulties and survived. Others who repeat the same mistakes just when they have lifted themselves up, and picking themselves back in shape and has finally found their way. In it, stories on childhood life were depicted like it was your own. Significant characters were portrayed as if they were your own family. It is amazing to relate because you have your own aunt , grandmother, uncle, and cousins who can be irritating and unpleasant when they are around you, on the other hand you truly adore. People who in one way or another   have contributed in shaping your life as a whole. One chapter in the book entitled â€Å"Adversaries† narrates some fragments on the childhood events in the author’s life. At a very young age she could still remember clear details and accounts of family members and various emotions in facing her auntie and the tensed encounters that prevail between them. You feel a little bit at the edge of your seat as words and emotions are revealed that causes you to be anxious and empathize with the girl.. Somehow, upon reading this particular story, I was able to relate to the characters and circumstances that the author encountered.   Similar   events and people I grew up with. I remember these people and what they signify had an impact in my life, may   it   be   Ã‚  good or bad memories. Reading through it brings back memories of kids being punished for reasons not explained very clearly would sometimes make you think now that it was senseless. Folks back then were not even aware that we kids need to be treated fairly sometimes. They just come lashing out of nowhere and give you spanking for all the world to see. I had my own taste of that ‘cruelty’ back then.   I   experienced   some old school discipline where I can get so ashamed of myself for something I have done wrong, just because the ‘crime’ is against the elder’s rules.   Characters like â€Å"Auntie† were also part of my so called privileged childhood. My mother’s sister would sometimes go on a vacation in our house and would stay for a long time I think for decades and my life miserable. I remember her as the lady who keeps an eye on me, scary sometimes because she would watch every move I make. She was so stern and uptight and she is so particular about being proper. She made a great deal of impact in the whole household with her continuous bickering, comparing her life to my mother’s. What’s worse is we have to bear with her and leaves us no choice, but   be under her rule when my parents are away for a few days. I did my best to please her and make her feel that I liked her though I was faking it. I pretended hard to be somebody else just for her to accept me and have a harmonious relationship altogether. She is now a ‘stigma’ among us cousins and her grand kids because of   the character she playe d in our lives. The author in the story had to go through that kind of misery.   The emotions she felt in some instances and the way she describes ‘Auntie’ in detail like her appearance, reactions, and attitude made me think back and reminds me of my own aunt. I   was touched so much by the incident that her aunt would bad mouth her father. I cannot forget the way my aunt would back-stab my mother and insult her in front of us and for other people to hear. She compares her life and her way of   raising her kids to that of my parents. She boasts of a better life and material things compared to my mother who has to work harder for a better life. My aunt and I did not talk too much. I tried the best I could to avoid her, not to be in the same room with her   and even look her in the eye. I was not sure if it is because I was scared of her or hated her. She, like Aunt seemed to be so powerful to make us frightened of her.   Picturing Aunt in my mind while reading makes me feel scared just by recalling how my own aunt was. However, unlike the author, I was never confrontational. I never talked or fought back. Frankie had the courage to stop Aunt from hitting her. I had my share of hard spankings courtesy of   not only of my aunt, but in some instances from my own parents. But I just take it as part of growing up and that is how I should be disciplined. Sometimes I would ponder, regretting that I did not question or prevent it from coming or could have ran away. If only I had the choice and wishes come true, I could have spent more time with my mother and have spent more loving moments with her. I could have understood it better if the she did the spanking herself. REFERENCE : Sundararaj, A. ( 2007, March 14). How to Tell a Story, A Beginner’s Guide to Storytelling. Interview with Frankie Lennon. Retrieved May 23, 2007, from   www.howtotellagreatstory.com/byot/byot How to cite Chilhood memories of frankie lennon and mine, Essay examples Chilhood memories of Frankie Lennon and mine Free Essays Reading     Frankie Lennon   feels like you become part of the story, you feel connected and involved at every scene that unfolds. The characters she introduces makes it more vivid and real, you can’t help but think of your own family and relatives that have been part of   your past and shaped your own present life. You begin to look back at your own childhood and adolescent years and recall the many struggles you went through to become the person you are now. We will write a custom essay sample on Chilhood memories of Frankie Lennon and mine or any similar topic only for you Order Now It makes us think back and wonder how we got over the conflicts and complications and been able to confront them. Readers connect to the stories due to similarities in culture, race, sexuality, and childhood. The author said in an interview, and to quote her: â€Å"†¦I narrate stories starting with my childhood and take you with me on my turbulent life journey and struggle to find freedom from the many prisons that bind me. I tell stories that make you think and re-evaluate issues. I offer the reader the chance to see and experience my naked feelings, conflicts, fears, and struggles and you get the chance to experience my trials and tribulations along with me. It will be exciting, funny, and heartbreaking. And it will never be dull.† â€Å"The   Mee   Street Chronicles: Straight up Stories of a Black Woman’s Life is a turn pager narrative of blunt memories in her struggle to live her own life and sexual identity. The book passes through generations dealing with sensitive issues like racism, oppression, homosexuality, and   Ã‚  alcoholism   that   still   exists in our society today. It lets us enter to places never seen before but will make us aware of our own feelings, in what we love and fear of, of our desires and what we value in life. The book mirrors that presents to readers what has happened and still happening in our lives.   Many people identify and unconsciously reflect with at least one story in the book. In a special way, it surprised and touched readers on their own personal journey. Like the author, we also preserve our memories through journals, diaries, photographs, and keep it in our hearts. We become proud of these memories because it is what our identity is all about. We pass them on to our children to tell them who we are to reveal secrets setting us free from denial. This book reminds us that we are not alone in our struggles. We may think we are strange and has a dark past, but who doesn’t? It inspires to move on no matter how bad it seemed or what people have done or said or how bad it appeared. Others out there also   went through the same difficulties and survived. Others who repeat the same mistakes just when they have lifted themselves up, and picking themselves back in shape and has finally found their way. In it, stories on childhood life were depicted like it was your own. Significant characters were portrayed as if they were your own family. It is amazing to relate because you have your own aunt , grandmother, uncle, and cousins who can be irritating and unpleasant when they are around you, on the other hand you truly adore. People who in one way or another   have contributed in shaping your life as a whole. One chapter in the book entitled â€Å"Adversaries† narrates some fragments on the childhood events in the author’s life. At a very young age she could still remember clear details and accounts of family members and various emotions in facing her auntie and the tensed encounters that prevail between them. You feel a little bit at the edge of your seat as words and emotions are revealed that causes you to be anxious and empathize with the girl.. Somehow, upon reading this particular story, I was able to relate to the characters and circumstances that the author encountered.   Similar   events and people I grew up with. I remember these people and what they signify had an impact in my life, may   it   be   Ã‚  good or bad memories. Reading through it brings back memories of kids being punished for reasons not explained very clearly would sometimes make you think now that it was senseless. Folks back then were not even aware that we kids need to be treated fairly sometimes. They just come lashing out of nowhere and give you spanking for all the world to see. I had my own taste of that ‘cruelty’ back then.   I   experienced   some old school discipline where I can get so ashamed of myself for something I have done wrong, just because the ‘crime’ is against the elder’s rules.   Characters like â€Å"Auntie† were also part of my so called privileged childhood. My mother’s sister would sometimes go on a vacation in our house and would stay for a long time I think for decades and my life miserable. I remember her as the lady who keeps an eye on me, scary sometimes because she would watch every move I make. She was so stern and uptight and she is so particular about being proper. She made a great deal of impact in the whole household with her continuous bickering, comparing her life to my mother’s. What’s worse is we have to bear with her and leaves us no choice, but   be under her rule when my parents are away for a few days. I did my best to please her and make her feel that I liked her though I was faking it. I pretended hard to be somebody else just for her to accept me and have a harmonious relationship altogether. She is now a ‘stigma’ among us cousins and her grand kids because of   the character she played in our lives. The author in the story had to go through that kind of misery.   The emotions she felt in some instances and the way she describes ‘Auntie’ in detail like her appearance, reactions, and attitude made me think back and reminds me of my own aunt. I   was touched so much by the incident that her aunt would bad mouth her father. I cannot forget the way my aunt would back-stab my mother and insult her in front of us and for other people to hear. She compares her life and her way of   raising her kids to that of my parents. She boasts of a better life and material things compared to my mother who has to work harder for a better life. My aunt and I did not talk too much. I tried the best I could to avoid her, not to be in the same room with her   and even look her in the eye. I was not sure if it is because I was scared of her or hated her. She, like Aunt seemed to be so powerful to make us frightened of her.   Picturing Aunt in my mind while reading makes me feel scared just by recalling how my own aunt was. However, unlike the author, I was never confrontational. I never talked or fought back. Frankie had the courage to stop Aunt from hitting her. I had my share of hard spankings courtesy of   not only of my aunt, but in some instances from my own parents. But I just take it as part of growing up and that is how I should be disciplined. Sometimes I would ponder, regretting that I did not question or prevent it from coming or could have ran away. If only I had the choice and wishes come true, I could have spent more time with my mother and have spent more loving moments with her. I could have understood it better if the she did the spanking herself. REFERENCE : Sundararaj, A. ( 2007, March 14). How to Tell a Story, A Beginner’s Guide to Storytelling. Interview with Frankie Lennon. Retrieved May 23, 2007, from   www.howtotellagreatstory.com/byot/byot 70.html – 60k- How to cite Chilhood memories of Frankie Lennon and mine, Essay examples

Tuesday, May 5, 2020

Fine Arts Museums of San Francisco Essay Example For Students

Fine Arts Museums of San Francisco Essay The fine arts museums of San Francisco, or the De Young takes its name after one of the first San Franciscan journalists M. H. De young and together with the Legion of Honor comprises the Pine Arts Museums within Golden Gate Parks 1 ,017 acres was inaugurated in 1895, reconstructed and open in 2005 the new building is 293,000-square-foot (27,000-square-meter)_ Located in the park are gardens, playgrounds, lakes, picnic garn. sees, trails, and monuments, plus an array Of cultural venues. The De Young has its own magnificent presence, With its boosting copper tower, and building stretching the length of a football field, gave e the imagination Of the grand architecture, vastness and complexity Of the culture that am fascinated with the Maya. Parking under the Academy of sciences and accompanied by my mother Joyce, we exited the garage into the courtyard looking upon De Young. I tried to picture how for millennia the Amman would gaze across vast expanses like this, looking at grand pyramids and stone structures that were simply part of their world as they recognized it, like I see the De Young, unique but not beyond. I chose the De Young for its Art of the Americas collection, cultures and violations that thrived in the Western Hemisphere tort over 2000 years. With a strong focus in Micronesian and Andean art, almost all of these ancient arts were used in religious or burial contexts. Themes include human and divine ritual and life in the afterworld. My interest is the Stella with Queen lax Mutual Behave, AD. 761 Limestone, folded on the border of Mexico and Guatemala. As a jeweler and carver of stone my interest in this particular object laid in its beauty and its fixed Oracle significance and the fact that l could carve this. Before reaching my desired exhibit, my mother and I are excited by the expansive modern environment inside the D Young, it is the awe that one feels when in the presents of unique greatness like half Dome in Yosemite National Park, or standing above the expanse of the Grand Canyon. Well maybe not that excited, you get the idea. Reaching the part Of the Americas collection and turning into the dark Amman exhibit, see across the room to a brightly lit carving standing over 2. M high and I . Mm Wide, ammo thick, it is the Stella. Im struck by its unique detail and size. Pictured sitting in the rock is the life-size deity carved in relief by removing material away from the surroundings to be displayed, like a fife size cameo, a time-consuming process of chipping away by means of chisel and mallet. Would estimate one person using a chiseling technique would take 8 to 10 days, For myself using rotating and chisel pneumatic power tool about 1/3 the time. Below the Stella a plaque that describes the limestone as coming from the southern Amman lowlands once part of a large archaeological setting built in tribute to Maya political leaders and gods, Erected to commemorate major political or historical events and substantiate royal lineages. Queen lax Animal Aha is depicted with an elaborate headdress, beaded costume-dress said to epic jade and spindle shell draping down to her feet-adorned in what could be feathers. Around her waist appears a belt with what looks like a large handled knife in a sheaf, or possibly the clasp to a purse. Her head is turned to the right, and hands appear chest-high with her left-palm out and right-palm-in, like part of a dance pose. A large serpent wrapped itself around her body making four turns. Out Of the serpents gaping mouth emerged lighting depicted by two curls (Amman believed lighting represented rain) along with the head and shoulders of, another Amman deity Kali all Of Which are said to depict a vision quest. Seeing the rain meant a good harvest, thus fulfilling her vision as an intermediary. .u251bb574491b6f244d59f05f1eceb56c , .u251bb574491b6f244d59f05f1eceb56c .postImageUrl , .u251bb574491b6f244d59f05f1eceb56c .centered-text-area { min-height: 80px; position: relative; } .u251bb574491b6f244d59f05f1eceb56c , .u251bb574491b6f244d59f05f1eceb56c:hover , .u251bb574491b6f244d59f05f1eceb56c:visited , .u251bb574491b6f244d59f05f1eceb56c:active { border:0!important; } .u251bb574491b6f244d59f05f1eceb56c .clearfix:after { content: ""; display: table; clear: both; } .u251bb574491b6f244d59f05f1eceb56c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u251bb574491b6f244d59f05f1eceb56c:active , .u251bb574491b6f244d59f05f1eceb56c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u251bb574491b6f244d59f05f1eceb56c .centered-text-area { width: 100%; position: relative ; } .u251bb574491b6f244d59f05f1eceb56c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u251bb574491b6f244d59f05f1eceb56c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u251bb574491b6f244d59f05f1eceb56c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u251bb574491b6f244d59f05f1eceb56c:hover .ctaButton { background-color: #34495E!important; } .u251bb574491b6f244d59f05f1eceb56c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u251bb574491b6f244d59f05f1eceb56c .u251bb574491b6f244d59f05f1eceb56c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u251bb574491b6f244d59f05f1eceb56c:after { content: ""; display: block; clear: both; } READ: Spongebob EssayThis Stella would have been placed in a plaza to demonstrate the importance Of historical elite figures and their ability to contact the higher forces so that people could have a better life. Four hieroglyphic text appear on the Stella on the upper left side; two correspond to the dates March 13 761 and August 10 760 The first date said to possibly dedicating the Stella. Surrounding the wall of the room on both sides of Stella are glass cases displaying ornate pottery, stone carvings and knives or cutting implements made of volcanic glass, jasper or flint. One pair chipped in multi directions like the small letter t a design that wouldeve taken much talent. All of this shows an advanced society dull tot ritual and individual talent. Combine this with the beautiful drawings I had seen prior of Titian Procrastinator (an architect from the ass who re-created Amman cities in beautiful detail from first hand experience in the jungles of Yucatan) and I have a complete picture. That is all that is missing, are some murals of the great Amman Cities to set the tone.

Thursday, April 2, 2020

All About Common Chinese Punctuation Marks

All About Common Chinese Punctuation Marks Chinese punctuation marks are used to organize and clarify written Chinese. Chinese punctuation marks are similar in function to English punctuation marks but sometimes differ in the form or look. All Chinese characters are written to a uniform size, and this size also extends to punctuation marks, so Chinese punctuation marks usually take up more space than their English counterparts. Chinese characters can be written either vertically or horizontally, so the Chinese punctuation marks change position depending on the direction of the text. For example, parentheses and quotation marks are rotated 90 degrees when written vertically, and the full stop mark is placed below and to the right of the last character when written vertically. Common Chinese Punctuation Marks Here are the most commonly used Chinese punctuation marks: Full Stop The Chinese full stop is a small circle that takes the space of one Chinese character. The Mandarin name of the full stop is Ã¥  ¥Ã¨â„¢Å¸/Ã¥  ¥Ã¥  · (jà ¹ ho). It is used at the end of a simple or complex sentence, as in these examples: è «â€¹Ã¤ ½  Ã¥ ¹ «Ã¦Ë†â€˜Ã¨ ² ·Ã¤ ¸â‚¬Ã¤ » ½Ã¥   ±Ã§ ´â„¢Ã£â‚¬â€šÃ¨ ¯ ·Ã¤ ½  Ã¥ ¸ ®Ã¦Ë†â€˜Ã¤ ¹ °Ã¤ ¸â‚¬Ã¤ » ½Ã¦Å  ¥Ã§ º ¸Ã£â‚¬â€šQÇ ng nÇ  bÄ ng wÇ’ mÇŽi yÄ « fà ¨n bozhÇ .Please help me buy a newspaper.é ¯ ¨Ã© ­Å¡Ã¦Ëœ ¯Ã§  ¸Ã© ¡Å¾Ã¤ ¸ Ã¦Ëœ ¯Ã© ­Å¡Ã© ¡Å¾Ã¨ â„¢Ã¨   Ã¦Ëœ ¯Ã§  ¸Ã© ¡Å¾Ã¤ ¸ Ã¦Ëœ ¯Ã© ³ ¥Ã© ¡Å¾Ã£â‚¬â€šÃ© ² ¸Ã© ± ¼Ã¦Ëœ ¯Ã¥â€¦ ½Ã§ ± »Ã¤ ¸ Ã¦Ëœ ¯Ã© ± ¼Ã§ ± »Ã¨ â„¢Ã¨   Ã¦Ëœ ¯Ã¥â€¦ ½Ã§ ± »Ã¤ ¸ Ã¦Ëœ ¯Ã© ¸Å¸Ã§ ± »Ã£â‚¬â€šJÄ «ngyà º shà ¬ shà ²u là ¨i, bà ºshà ¬ yà º là ¨i; biÄ nfà º shà ¬ shà ²u là ¨i, bà ºshà ¬ niÇŽo là ¨i.Whales are mammals, not fish; bats are mammals, not birds. Comma The Mandarin name of the Chinese comma is é€â€"號/é€â€"Ã¥  · (dà ²u ho). It is the same as the English comma, except it takes the space of one full character and is positioned in the middle of the line. It is used to separate clauses within a sentence, and to indicate pauses. Here are some examples: Ã¥ ¦â€šÃ¦Å¾Å"é ¢ ±Ã© ¢ ¨Ã¤ ¸ Ã¤ ¾â€ Ã¦Ë†â€˜Ã¥â‚¬â€˜Ã¥ ° ±Ã¥â€¡ ºÃ¥Å"‹æâ€"…è ¡Å'。å ¦â€šÃ¦Å¾Å"Ã¥  °Ã© £Å½Ã¤ ¸ Ã¦  ¥Ã¦Ë†â€˜Ã¤ » ¬Ã¥ ° ±Ã¥â€¡ ºÃ¥â€º ½Ã¦â€"…è ¡Å'。Rà ºguÇ’ tifÄ“ng bà ¹ li, wÇ’men jià ¹ chÃ… « guà ³ lÇšxà ­ng.If the typhoon does not come, we will take a trip abroad.ç  ¾Ã¥Å" ¨Ã§Å¡â€žÃ©â€º »Ã¨â€¦ ¦Ã§Å"Ÿæ˜ ¯Ã§â€ž ¡Ã¦â€°â‚¬Ã¤ ¸ Ã¨Æ' ½Ã£â‚¬â€šÃ§Å½ °Ã¥Å" ¨Ã§Å¡â€žÃ§â€ µÃ¨â€žâ€˜Ã§Å"Ÿæ˜ ¯Ã¦â€"  Ã¦â€°â‚¬Ã¤ ¸ Ã¨Æ' ½Ã£â‚¬â€šXinzi de dinnÇŽo, zhÄ“nshà ¬ wà º suÇ’ bà ¹ nà ©ng.Modern computers, they are truly essential. Enumeration Comma The enumeration comma is used to separate list items. It is a short dash going from top left to bottom right. The Mandarin name of the enumeration comma is é  â€œÃ¨â„¢Å¸/é ¡ ¿Ã¥  · (dà ¹n ho). The difference between the enumeration comma and the regular comma can be seen in the following example: Ã¥â€"Å"〠Ã¦â‚¬â€™Ã£â‚¬ Ã¥â€œâ‚¬Ã£â‚¬ Ã¦ ¨â€šÃ£â‚¬ Ã¦â€žâ€ºÃ£â‚¬ Ã¦Æ' ¡Ã£â‚¬ Ã¦ ¬ ²Ã¥  «Ã¥ Å¡Ã¤ ¸Æ'æÆ'…。åâ€"Å"〠Ã¦â‚¬â€™Ã£â‚¬ Ã¥â€œâ‚¬Ã£â‚¬ Ã¤ ¹ Ã£â‚¬ Ã§Ë† ±Ã£â‚¬ Ã¦  ¶Ã£â‚¬ Ã¦ ¬ ²Ã¥  «Ã¥ Å¡Ã¤ ¸Æ'æÆ'…。XÇ , nà ¹, Ä i, là ¨, i, à ¨, yà ¹, jiozuà ² qÄ « qà ­ng.Happiness, anger, sadness, joy, love, hate, and desire are known as the seven passions. Colon, Semicolon, Question Mark, and the Exclamation Mark These four Chinese punctuation marks are the same as their English counterparts and have the same usage as in English. Their names are as follows: Colon冒號/冒å  · (mo ho) - Semicolon - 分號/分å  · (fÄ“nho) - Question Mark - å• Ã¨â„¢Å¸/éâ€" ®Ã¥  · (wà ¨nho) - Exclamation Mark - é ©Å¡Ã¥Ëœâ€ Ã¨â„¢Å¸/æÆ'Šå  ¹Ã¥  · (jÄ «ng tn ho) - Quotation Marks Quotation marks are called Ã¥ ¼â€¢Ã¨â„¢Å¸/Ã¥ ¼â€¢Ã¥  · (yÇ n ho) in Mandarin Chinese. There are both single and double quote marks, with the double quotes used within the single quotes: ã€Å'...『...〠...〠 Western-style quotation marks are used in simplified Chinese, but traditional Chinese uses the symbols as shown above. They are used for quoted speech, emphasis and sometimes for proper nouns and titles. è€ Ã¥ ¸ «Ã¨ ª ªÃ£â‚¬Å'ä ½  Ã¥â‚¬â€˜Ã¨ ¦ Ã¨ ¨ËœÃ¤ ½  Ã¥Å"‹çˆ ¶Ã¨ ª ªÃ§Å¡â€žÃ£â‚¬Å½Ã© â€™Ã¥ ¹ ´Ã¨ ¦ Ã§ «â€¹Ã¥ ¿â€"Ã¥ Å¡Ã¥ ¤ §Ã¤ ºâ€¹Ã¤ ¸ Ã¨ ¦ Ã¥ Å¡Ã¥ ¤ §Ã¥ ®ËœÃ£â‚¬ Ã©â‚¬â„¢Ã¥  ¥Ã¨ © ±Ã£â‚¬â€šÃ£â‚¬ Ã¨â‚¬ Ã¥ ¸Ë†Ã¨ ¯ ´Ã¢â‚¬Å"ä ½  Ã¤ » ¬Ã¨ ¦ Ã¨ ® °Ã¤ ½  å› ½Ã§Ë† ¶Ã¨ ¯ ´Ã§Å¡â€žÃ¢â‚¬ËœÃ© â€™Ã¥ ¹ ´Ã¨ ¦ Ã§ «â€¹Ã¥ ¿â€"Ã¥ Å¡Ã¥ ¤ §Ã¤ ºâ€¹Ã¤ ¸ Ã¨ ¦ Ã¥ Å¡Ã¥ ¤ §Ã¥ ®ËœÃ¢â‚¬â„¢Ã¨ ¿â„¢Ã¥  ¥Ã¨ ¯ Ã£â‚¬â€šÃ¢â‚¬ LÇŽoshÄ « shuÃ… : â€Å"NÇ men yo jà ¬zhu Guà ³fà ¹ shuÃ…  de ‘qÄ «ngnin yo là ¬ zhà ¬ zuà ² dshà ¬, bà ¹yo zuà ² d guÄ n’ zhà ¨ jà ¹ hu.†The teacher said: â€Å"You must remember the words of Sun Yat-sen - ‘Youth should be committed to do big things, not to make big government.’

Sunday, March 8, 2020

Ivory Soap in the Microwave - Heat Makes Foam

Ivory Soap in the Microwave - Heat Makes Foam If you unwrap a bar of Ivoryâ„ ¢ soap and microwave it, the soap will expand into a foam that is more than six times the size of the original bar. Its a fun trick that wont hurt either your microwave or the soap. This soap trick can be used to demonstrate closed-cell foam formation, physical change, and Charles Law. Soap Trick Materials Bar of Ivoryâ„ ¢ soapPaper towel or microwave-safe dishMicrowave ovenOther brands of soap for comparison (optional) Perform the Soap Trick Unwrap a bar of Ivoryâ„ ¢ soap.Place the bar of soap on a paper towel or microwave-safe dish.Microwave your soap. Watch the soap closely to see what happens.Depending on microwave power, your soap will reach its maximum volume within 90 seconds to 2 minutes. If you microwave the soap longer (we  went up to 6 minutes) nothing bad will happen, but the soap wont continue to grow.Allow the soap to cool for a minute or two before touching it.The soap will feel brittle and flaky, but its still soap, with the same cleaning power as before. Go ahead and get it wet and youll see it lathers the same as ever. About Foams A foam is any material that traps a gas inside a cells of foams include shaving cream, whipped cream, Styrofoamâ„ ¢, and even bone. Foams can be fluid or solid, squishy or rigid. Many foams are polymers, but the type of molecule isnt what defines whether or not something is a foam. How the Soap Trick Works Two processes occur when you microwave the soap. First, you are heating the soap, which softens it. Second, you are heating the air and water trapped inside the soap, causing the water to vaporize and the air to expand. The expanding gasses push on the softened soap, causing it to expand and become a foam. Popping popcorn works in much the same way. When you microwave Ivoryâ„ ¢, the appearance of the soap is changed, but no chemical reaction occurs. This is an example of a physical change. It also demonstrates Charles Law, which states the volume of a gas increases with its temperature. The microwaves impart energy into the soap, water, and air molecules, causing them to move faster and further away from each other. The result is that the soap puffs up. Other brands of soap dont contain as much whipped air and simply melt in the microwave. Things to Try Place a bar of Ivoryâ„ ¢ in a bowl of water. Does it float? Try this with other brands of soap. Do they float or sink?Cut or break off a piece of Ivoryâ„ ¢ and examine it. Do you see pockets of air? The air that causes Ivoryâ„ ¢ to be less dense than water has been whipped into the soap, so you wont see bubbles or pockets of air. This is important because its the reason why the soap trick works.Try microwaving other brands of soap. Soap Trick Safety Dont leave the microwave unattended while microwaving soap.Dont place metal in the microwave.Be aware that while microwaving soap will not harm either your microwave or the soap, it will cause your microwave to smell floral and pretty for several hours.Wash your hands after playing with soap so that you dont accidentally eat it (though its not toxic) or get it in your eyes (which would burn).

Thursday, February 20, 2020

Do all our actions aim at happiness Thesis Example | Topics and Well Written Essays - 2000 words

Do all our actions aim at happiness - Thesis Example Even though people long for happiness, it is something that is totally out of their own making with luck adding to their cause. Since happiness does not involve the usage of money, it is something that is derived from within. The inherent feeling of being happy is something that is cherished by people living in different regions of the world. Happiness is usually surrounded with a smile on the face of the person who actually feels that sense of contentment within his fore. This smile depicts how well he is able to translate his happiness into actions that the world around him can see and decipher for their own selves. Moral judgments have long stated that doing good for the society and the people would indeed bring happiness and satisfaction to the individuals who are committed to such a cause. This has been proven with time and much research has been undertaken on these fronts. What has come to the reckoning is the fact that the actions speak up loudly when the talk goes out loud regarding the happiness realm and it is for this reason that happiness is always attached with doing something worthy enough to get the nod of the people at large. But then again, there are some gestures and actions which do not need the approval of the people. They are committed so that success could be attained within the relevant ranks, and hence the reason that happiness is derived from such quarters. What is most fundamental here is an understanding that happiness will seek newer grounds and look to maintain its mind level which was not the case when happiness was not attained by this individual under consideration (Meese, 2007). Happiness is therefore a vital tool to get one started, and thus finds out where he is going wrong and what kind of success would be attained if the actions are corrected in the most realistic sense possible. The need is to comprehend how an individual will mend

Tuesday, February 4, 2020

Dual Agency and Ethics Conflicts in Correctional Practice Essay

Dual Agency and Ethics Conflicts in Correctional Practice - Essay Example An overlap in the normative framework of offender rehabilitation and punishment develops a unique collection of ethical dilemmas for the practicing persons (Cervantes and Hanson, 2013). The roles of corrections professionals in prisons have changed to reflect a prevailing ideology within the correctional administration which is taken to deemphasize on treatment while emphasizing on custodial concerns and security. Consequently, these professionals experience unique professional and ethical conflicts, dilemmas. Among these conflicts are integrity, inmate custody, security, objectivity, honesty, documentation and decision making. As a manager I developed a six-step policy that controlled the identified dilemmas among others to provide guidelines and address the possible conflicts for the practitioners under my supervision. This was aimed to eliminate vague standards and possible misinformation by the practitioners. The approach below solves the dilemmas and improves the service deliver y to incarcerated individuals (Wilson, 2010). The six identified steps were, identify, analyze, report, discuss, action, follow-up. Under the identification step, the practitioners are entitled to point out the challenges that will build the chances of a conflict within themselves, peers, or with their clients, inmates. There are situation where interests may collide within cases handled by different practitioners in a correction facility, they are supposed to document it in detail to avoid delay in service delivery or injustices that may compromise integrity. The situation is analyzed to check whether it can be solved at this level before escalating it to the next level in management. If it is not possible to clear it here, it is moved to the next phase within the policy, reporting, where it is tabled to the management. From here, the involved corrections professionals delve into the matter in an attempt to eliminate the issue in dilemma. When a consensus is reached,

Monday, January 27, 2020

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit

Sunday, January 19, 2020

The Scarlet Letter and Hawthorn’s Theory of Romance :: Scarlet Letter essays

The Scarlet Letter and Hawthorn’s Theory of Romance Nathaniel Hawthorn started writing The Scarlet Letter in 1847 and it was published in 1850. The Scarlet Letter is recognize by many "critics as being one of the greatest of American novels."1 Hawthorn created his own individual style of "romance," a style of writing. His own individual style of writing is now called "Hawthorn's Theory of Romance". His "theory of Romance" is emphasized in The Scarlet Letter in many different ways. The techniques Hawthorn used in The Scarlet Letter are basically from his "theory of Romance." Hawthorn uses his "theory of Romance" in many different ways in The Scarlet Letter. Hawthorn being a Romantic writer incorporates many characteristics of Romanticism and also includes his "theory of Romance" in the novel. Some romanticism ideas he incorporates are those of heroic characters which would include Hester Prynne "It had the effect of a spell, taking her out of the ordinary relations with humanity, and enclosing her in a sphere by herself."2 A heroic character is "bigger than those found in ordinary life" and also is strong, brave, noble, risky and powerful. Another characteristic he includes is the writing of mysterious events such as the adultery of Hester, the birth of Pearl and the return of her husband Roger Chllingworth. The uses of the "theory of Romance" by Hawthorn follows an order. The order is initiated by Hawthorn looking for to write on a serious topic. The topic is the adultery of Hester, Pearls birth, the revenge by Chillingworth and the hypocrisy of Dimmesdale. Then he chooses the setting of his characters "On the outskirst of town, within the verge of the peninsula, but not in close vicinity to any other habitation, there was a small thatched cottage."3 The small cottage is Hester's home which is isolated from society. This is a characteristic of a heroic character which is Hester. His next step is to choose characters who have lived in real life and to associate them with fictitious characters. The fictitious characters being Hester Prynne, Roger Chllingworth, Reverend Dimmesdale and Pearl. The real life character being Governor Bellingham. "Here, to witness the scene which we are describing, sat Governor Bellingham himself, with

Saturday, January 11, 2020

Did Alexander II deserve the title Tsar Liberator? Essay

A liberator is defined as someone who releases people from captivity or bondage. For Alexander II to deserve the title of Tsar Liberator he would have to have released the Russian people from bondage. In 1861 Alexander II passed the Ukase of the emancipation of the serfs, which saw the freeing of 40 million serfs. Whilst in theory this was a good idea in practice things didn’t work out as planned as there was no structure to how the process was carried out. The change came about for the wrong reasons instead of emancipating the serfs for the growth of industry in Russia, Alexander did it out of fear that if he didn’t abolish it from above it would be destroyed from below; he was simply trying to protect his autocracy. The emancipation was flawed, serfs were given plots of land that were 20% smaller than what they needed just to feed their family, they were expected to earn their own money selling the produce they had grown but they had no idea how to and were given no help. Serfs were also expected to pay for the plots of land they had been given over the course of 49 years; the average life expectancy was around 40 years so the debt was passed down through the family. As the population of Russia increased the size of land the serfs were given became smaller and smaller and so people were finding it increasingly difficult to be able to grow enough food to feed their family and have enough produce left over to sell in order to make loan repayments. Whilst Alexander II did in theory liberate the serfs they were still bound through the repayment of debt, so he would be unworthy of the title tsar liberator as he never truly released them. In 1864 Alexander II introduced a more modern western style legal system. This included the introduction of judges that could not be swayed by bribery, juries and courts. For the first time Russians were offered the chance of a fair trial, and a considerable freedom of expression. It was thought that due to this reform the court room became the only place in Russia that real freedom of speech prevailed. However any political cases were removed from courts and the Tsar’s secret police could still arrest people at will. This was a big step forward for Russia and does contribute to Alexander II deserving the title Tsar Liberator, but the reform was limited because not all cases could be taken to court, and the Tsar was still using his secret police to arrest whoever he liked. Next local government reforms that saw the introduction of Zemstavs and the Dumas that held local power over public health, prisons, roads, agriculture and education. This provided new opportunities for local political participation. But there were still imitations as the Tsar’s word was still law and he could overrule the Zemstavs any time he wanted, the Zemstav was not a equal representation of the public as it was made up of mainly gentry so peasants were not able to have their say, and the Zemstav was often short of money making them open to bribes from influential people. This reform would not earn Alexander II the title of Tsar Liberator, because although it was a good idea and a step towards liberating the public and letting them have their say, the system put in place was corrupt and was not an accurate representation of the population, therefore it did not liberate very many people and the Tsar still had an over ruling power in order to protect his autocracy. Alexander reformed the army in order to modernize and strengthen it. He reduced the length of conscription from 25 years to 6 years and introduced universal military service for all males over 20. This meant that people were becoming more skilled and disciplined and would have time to use these new found skills in the world outside of the army. By drastically cutting the length of conscription Alexander made being a part of the army less of a life sentence, thus releasing the Russian people. This action would make him worthy of the title Tsar Liberator as it left the Russian people free to experience life outside of the army. Censorship was relaxed and education policies became more liberal, meaning that university students were now able to learn about life outside of Russia and leave Russia in order to study. This liberated Russian scholars as they were able to learn about other places and about their governments and philosophy, but it caused an increase in student radicalism, and political instability. This in some cases lead to riots. This was liberating in the sense that it Russian became aware of a life outside of Russia, where allowed to talk about what was happening elsewhere and were able to leave Russia to study elsewhere. This would make Alexander II worthy of the title Tsar Liberator. Alexander II did not deserve the title of ‘Tsar Liberator’ because whilst some of his reforms could be seen as liberating the Russian public he was simply finding a new way to have a hold over them for example through debt. To truly be ‘Tsar Liberator’ Alexander would have had to give the public more of a say in how the county was ran, doing this would have destroyed his autocracy, which is something he was not willing to do.