Monday, January 27, 2020
Library Management System Based On Finger Prints And RFID
Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as ââ¬Å"transpondersâ⬠. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatââ¬Å"energizesâ⬠the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output à ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as à ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 à µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as ââ¬Å"transpondersâ⬠. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatââ¬Å"energizesâ⬠the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output à ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as à ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 à µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit
Sunday, January 19, 2020
The Scarlet Letter and Hawthornââ¬â¢s Theory of Romance :: Scarlet Letter essays
The Scarlet Letter and Hawthornââ¬â¢s Theory of Romance Nathaniel Hawthorn started writing The Scarlet Letter in 1847 and it was published in 1850. The Scarlet Letter is recognize by many "critics as being one of the greatest of American novels."1 Hawthorn created his own individual style of "romance," a style of writing. His own individual style of writing is now called "Hawthorn's Theory of Romance". His "theory of Romance" is emphasized in The Scarlet Letter in many different ways. The techniques Hawthorn used in The Scarlet Letter are basically from his "theory of Romance." Hawthorn uses his "theory of Romance" in many different ways in The Scarlet Letter. Hawthorn being a Romantic writer incorporates many characteristics of Romanticism and also includes his "theory of Romance" in the novel. Some romanticism ideas he incorporates are those of heroic characters which would include Hester Prynne "It had the effect of a spell, taking her out of the ordinary relations with humanity, and enclosing her in a sphere by herself."2 A heroic character is "bigger than those found in ordinary life" and also is strong, brave, noble, risky and powerful. Another characteristic he includes is the writing of mysterious events such as the adultery of Hester, the birth of Pearl and the return of her husband Roger Chllingworth. The uses of the "theory of Romance" by Hawthorn follows an order. The order is initiated by Hawthorn looking for to write on a serious topic. The topic is the adultery of Hester, Pearls birth, the revenge by Chillingworth and the hypocrisy of Dimmesdale. Then he chooses the setting of his characters "On the outskirst of town, within the verge of the peninsula, but not in close vicinity to any other habitation, there was a small thatched cottage."3 The small cottage is Hester's home which is isolated from society. This is a characteristic of a heroic character which is Hester. His next step is to choose characters who have lived in real life and to associate them with fictitious characters. The fictitious characters being Hester Prynne, Roger Chllingworth, Reverend Dimmesdale and Pearl. The real life character being Governor Bellingham. "Here, to witness the scene which we are describing, sat Governor Bellingham himself, with
Saturday, January 11, 2020
Did Alexander II deserve the title Tsar Liberator? Essay
A liberator is defined as someone who releases people from captivity or bondage. For Alexander II to deserve the title of Tsar Liberator he would have to have released the Russian people from bondage. In 1861 Alexander II passed the Ukase of the emancipation of the serfs, which saw the freeing of 40 million serfs. Whilst in theory this was a good idea in practice things didnââ¬â¢t work out as planned as there was no structure to how the process was carried out. The change came about for the wrong reasons instead of emancipating the serfs for the growth of industry in Russia, Alexander did it out of fear that if he didnââ¬â¢t abolish it from above it would be destroyed from below; he was simply trying to protect his autocracy. The emancipation was flawed, serfs were given plots of land that were 20% smaller than what they needed just to feed their family, they were expected to earn their own money selling the produce they had grown but they had no idea how to and were given no help. Serfs were also expected to pay for the plots of land they had been given over the course of 49 years; the average life expectancy was around 40 years so the debt was passed down through the family. As the population of Russia increased the size of land the serfs were given became smaller and smaller and so people were finding it increasingly difficult to be able to grow enough food to feed their family and have enough produce left over to sell in order to make loan repayments. Whilst Alexander II did in theory liberate the serfs they were still bound through the repayment of debt, so he would be unworthy of the title tsar liberator as he never truly released them. In 1864 Alexander II introduced a more modern western style legal system. This included the introduction of judges that could not be swayed by bribery, juries and courts. For the first time Russians were offered the chance of a fair trial, and a considerable freedom of expression. It was thought that due to this reform the court room became the only place in Russia that real freedom of speech prevailed. However any political cases were removed from courts and the Tsarââ¬â¢s secret police could still arrest people at will. This was a big step forward for Russia and does contribute to Alexander II deserving the title Tsar Liberator, but the reform was limited because not all cases could be taken to court, and the Tsar was still using his secret police to arrest whoever he liked. Next local government reforms that saw the introduction of Zemstavs and the Dumas that held local power over public health, prisons, roads, agriculture and education. This provided new opportunities for local political participation. But there were still imitations as the Tsarââ¬â¢s word was still law and he could overrule the Zemstavs any time he wanted, the Zemstav was not a equal representation of the public as it was made up of mainly gentry so peasants were not able to have their say, and the Zemstav was often short of money making them open to bribes from influential people. This reform would not earn Alexander II the title of Tsar Liberator, because although it was a good idea and a step towards liberating the public and letting them have their say, the system put in place was corrupt and was not an accurate representation of the population, therefore it did not liberate very many people and the Tsar still had an over ruling power in order to protect his autocracy. Alexander reformed the army in order to modernize and strengthen it. He reduced the length of conscription from 25 years to 6 years and introduced universal military service for all males over 20. This meant that people were becoming more skilled and disciplined and would have time to use these new found skills in the world outside of the army. By drastically cutting the length of conscription Alexander made being a part of the army less of a life sentence, thus releasing the Russian people. This action would make him worthy of the title Tsar Liberator as it left the Russian people free to experience life outside of the army. Censorship was relaxed and education policies became more liberal, meaning that university students were now able to learn about life outside of Russia and leave Russia in order to study. This liberated Russian scholars as they were able to learn about other places and about their governments and philosophy, but it caused an increase in student radicalism, and political instability. This in some cases lead to riots. This was liberating in the sense that it Russian became aware of a life outside of Russia, where allowed to talk about what was happening elsewhere and were able to leave Russia to study elsewhere. This would make Alexander II worthy of the title Tsar Liberator. Alexander II did not deserve the title of ââ¬ËTsar Liberatorââ¬â¢ because whilst some of his reforms could be seen as liberating the Russian public he was simply finding a new way to have a hold over them for example through debt. To truly be ââ¬ËTsar Liberatorââ¬â¢ Alexander would have had to give the public more of a say in how the county was ran, doing this would have destroyed his autocracy, which is something he was not willing to do.
Friday, January 3, 2020
Content or Function Word Pronunciation Practice
You can improve your pronunciation by identifying which words are content words and which words are function words. Content words include main verbs, nouns, adjectives, and adverbs. Function words are necessary for grammar, but do not receive stress in spoken English. Use these exercises to help you learn how to use content and function words to help you with your pronunciation because English is a time-stressed language. In other words, the rhythm and music of English comes from stressing content words. Once youve mastered this exercise, move on to finding focus words to help you further.à Content or Function Word? First, you need to be able to immediately distinguish between content and function words. Write down C for content and F for function.à Example: magazine (C) as (F) many (F) wentà withà justà quicklyà theà hardà next toà CD ROMà openà hadà orà informationà in order toà difficultà muchà exactingà in front ofà Jackheà howeverà Answers contentfunctionfunctioncontentfunctioncontentfunctioncontentcontentfunction or content (if helping verb - function / if main verb - content)functioncontentfunctioncontentfunctioncontentfunctioncontentfunctioncontent Content or Function? Stressed or Non-stressed? Next, take a look at the sentences and mark the words that should be stressed. Once you have decided, click on the arrow to see if you have chosen the correct words. Example: Jack (yes) went (yes) to the shop (yes) to grab (yes) some coke (yes). He had finished breakfast before I arrived.à Phillip ordered a huge steak for dinner.à They will have to stay up late if they are going to finish their homework.à It must have been something in the air that caused Jack to shout.à Could you please be more quiet?à Unfortunately, Jack wasnt able to finish on time.à As soon as he has collected the results he will post them to his website.à Peter bought shoes today.There should have been some replies by now.à Knowledge creates opportunities where none have existed before. Answers stressed content words: finished, breakfast, arrived / non-stressed function words: he, had, before, Istressed content words: Phillip, ordered, huge, steak, dinner / non-stressed function words: a, forstressed content words: stay up, late, finish, homework / non-stressed function words: they, will, have to, if, they, are going to, theirstressed content words: something, air, caused, Jack, shout / non-stressed function words: it, must have been, in, the, that, toà stressed content words: please, more, quiet / non-stressed function words: could, you, bestressed content words: unfortunately, Jack, finish, time / non-stressed function words: wasnt able to, onstressed content words: soon, collected, results, post, website / non-stressed function words: as, he, has, the, he, will, them, to, hisstressed content words: Peter, bought, shoes, today / non-stressed function words: 0stressed content words: some, replies, now / non-stressed function words: There should have been, bystressed cont ent words: knowledge, creates, opportunities, none, existed, before / non-stressed function words: where, have Notice how some of the shorter sentences actually have more stressed words than the longer ones (2 compared to 3). These shorter sentences can often take longer to speak than longer sentences with many function words. The Music of English English is a very rhythmic language because of this tendency to accent only certain words. For this reason, you should practice using your ear as much as possible. Often repeating spoken English without looking at the written sentence can also help you learn this music of the language.à Helping Yourself Improve Pronunciationà at Home Finally, practice speaking through the sentences below. First speak the sentence trying to carefully pronounce EVERY word. Notice how unnatural this sounds (as in the listening exercise above showing the contrast between this unnatural pronunciation and the natural way of speaking). Next, focus on speaking the sentences only working on stressing the content words. Tape yourself doing this and you will be surprised at how quickly your pronunciation improves! He drove to work after he had finished working in the garden.Youll find the apples next to the oranges on the shelf over there.Maggie must have been visiting her aunt in Springtown last weekend.Could you pass me the mustard, please?They have been considering buying a new car as soon as they have saved enough money. Teachers can use this lesson plan to help students focus on stress-timed pronunciation in class.
Thursday, December 26, 2019
Essay on T.S. Eliot Poetry Analysis - 1597 Words
Till Human Voices Wake Us:and We Drown Analysis of T.S. Eliots Poem ââ¬Å"The Love Song of J. Alfred Prufrockâ⬠and Till Human Voices Wake Us T.S. Eliots ââ¬Å"The Love Song of J. Alfred Prufrockâ⬠embodies many of the different feelings of Americans during the Modernist movement. Prufrock was seen as the prototype of the modern man, it is through his character in this poem that T.S. Eliot shows how man felt insecure, how the new theories of psychology were changing the concept of the mind and how society was becoming more doubtful and indecisive and less of an action taking people. The film Till Human Voices Wake Us, uses Eliots poem as a base to showcase these ideas and to show how dreams and the past can help shape a man. . Prufrock isâ⬠¦show more contentâ⬠¦He says I instead of we or mentioning he walked with someone. He is also showing that he is not the only lonely man in the city. There are lonely men, more than one, hanging out of windows, as if they are waiting for someone to come by, someon e to spend time with, someone to share their own insecurities with. This idea of loneliness is similar in the movie, Ruby shows up also alone. She doesnt know where she belongs, and has no one in her life. Both Ruby and Sam are forced to interact with one another and face their loneliness. Prufrocks insecurities showcased as he doubts what he is capable of. In lines 81 through 86 he again says I, showing it was him alone, and he talks about how his bald head is brought on a platter. Eliot, who loved to reference the past, is alluding to the story of John the Baptists beheading. Prufrock goes on to say, ââ¬Å"I am no prophet- and heres no great matter;â⬠(83) He is implying that he is not as important, and his moment of greatness is just a ââ¬Å"flickerâ⬠(84) and in the moment he was afraid. His fear emphasizes his feeling of inadequacy, by comparing it to the greatness of John the Baptist. He is once more showing how much self doubt he has, he does not believe himself t o be a great man or capable of great things. Sam also looks to the past and it emphasizes his insecurities. He is constantly remembering theShow MoreRelatedThe Era Of Modernism : What People Do People Perceive Through Their Perceptions?945 Words à |à 4 Pagesyears of Modernism, T.S. Eliot, Virginia Woolf, and Dylan Thomas established the foundations for modern literature, defining Modernism for the world. Although Modernism is very difficult to define and pinpoint, the Modern writers in England certainty changed the age with their writing. While there were many famous writers of the time, a very distinct and powerful writers was T.S. Eliot. Thomas Stearns Eliot was born in St. Louis, Missouri (Greenblatt 1298). Although T.S. Eliot was born in the UnitedRead MoreTradition And The Individual Talent944 Words à |à 4 Pagesand critic T.S. Eliot believes tradition in a poetry sense varies through cultures, through time, and it is ever changing. In Eliotââ¬â¢s critical analysis ââ¬Å"Tradition and the Individual Talentâ⬠tradition is something considered passed down but in a poetry sense, it is something that is not inherited, it is something that requires great ambition and focus to learn from past poets. A great poet must learn from predecessors of the difficult art before he or she takes to writing great poetry. According toRead MoreAnalysis of The Hollow Men by T.S. Eliot Ess ay1367 Words à |à 6 PagesAnalysis of The Hollow Men by T.S. Eliot Eliot, a master of the written craft, carefully thought out each aspect of his 1925 poem The Hollow Men. Many differences in interpretation exist for Eliots complex poetry. One issue never debated is the extensive range of things to consider in his TS Eliots writing. Because TS Eliot often intertwined his writing by having one piece relate to another The Hollow Men is sometimes considered a mere appendage to The Waste Land. The Hollow MenRead MoreCritical Analysis : The Love Song Of J. Alfred Prufrock895 Words à |à 4 PagesEssay Two- Critical Analysis Writing a critical analysis is diving into the text. Readers must break down all parts of the text and pin pointing the author s purpose for the writing. A very challenging poem to analysis is T.S. Eliotââ¬â¢s ââ¬Å"The Love Song of J. Alfred Prufrockâ⬠. It has been declared that ââ¬Å"The Love Song of J. Alfred Prufrockâ⬠started that Anglo-American modernist movement with poetry. The poem was the first poem with American poetry to flow free verse. At the time, it was deemedRead MoreThe Love Song of J. Alfred Prufrock Essay1524 Words à |à 7 Pageshistorical context of a particular poem Poem: T. S. Eliot, ââ¬ËThe Love Song of J. Alfred Prufrock The context of any given text whether poetry, novels or a movie is always integral to its understanding. Social and historical context of not only the given text, but the writerââ¬â¢s context and readerââ¬â¢s context play an important role in the interpretation and understanding of the major ideas, issues, values and beliefs within the text. T.S (Thomas Stearns) Eliot was one of the twentieth centuryââ¬â¢s major poetsRead MoreT.S. Eliots View of the Human Condition in The Hollow Men Essay856 Words à |à 4 Pages T. S. Eliot was a man who strongly believed that poetry should represent life. He knew that life was complex, so that is why his poetry was difficult to understand not only for students writing research papers, but also for critics. He was the backbone of modernist poetry, who wrote mostly about darkness, despair, and depression in life. He tried and succeeded to capture the torment of the world during World War 1 and World War II (Shmoop T.S. Eliot). Eliotââ¬â¢s view of the human condition isRead MoreT.S. Eliot the Wasteland Essay1371 Words à |à 6 PagesWrite a critical analysis, focusing particularly on what makes your chosen passage a piece of Modernist writing. Unreal City, Under the brown fog of a winter dawn, A crowd flowed over London Bridge, so many, I had not thought death had undone so many. Sighs, short and infrequent, were exhaled, And each man fixed his eyes before his feet. Flowed up the hill and down King William Street, To where Saint Mary Woolnoth kept the hours With a dead sound on the final stroke of nine. There I sawRead MoreAnalysis Of. Eliot s The Four Quartets And `` The Waste Land ``1784 Words à |à 8 PagesI. Introduction to T.S Eliot T.S. Eliot wrote poems that communicated his antagonistic perspectives of life, mankind, and his general surroundings by exemplifying and escalating particular angles and analogies in his written work. T.S. Eliot was born in 1888 and lived during early 1900 s and was a part of Modernist Period. He lived throughout two world wars and struggled with poverty and oppression which impacted his writings. Eliot wrote The Four Quartets and The Waste Land which are importantRead MoreAnalysis Of The Poem Cousin Nancy And Morning At The Window Poem Analysis And Exploration1475 Words à |à 6 Pages ââ¬Å"Cousin Nancyâ⬠and ââ¬Å"Morning at the Windowâ⬠Poem Analysis and Exploration Cousin Nancy By T. S. Eliot Miss Nancy Ellicott Strode across the hills and broke them, Rode across the hills and broke them ââ¬â The barren New England hills ââ¬â Riding to hounds Over the cow-pasture. Miss Nancy Ellicott smoked And danced all the modern dances; And her aunts were not quite sure how they felt about it, But they knew that it was modern. Upon the glazen shelves kept watch MatthewRead MoreEssay about Modernism in T.s. Eliotss the Wasteland885 Words à |à 4 PagesModernism in T.S. Eliots The Wasteland Modernism has been defined as a rejection of traditional 19th-century norms, whereby artists, architects, poets and thinkers either altered or abandoned earlier conventions in an attempt to re-envision a society in flux. In literature this included a progression from objectivist optimism to cynical relativism expressed through fragmented free verse containing complex, and often contradictory, allusions, multiple points of view and other poetic devices
Wednesday, December 18, 2019
Political Theory Comparing Locke, Rousseau and Plato Essay
Locke: What is the purpose of politics - we could live in the state of nature, we donââ¬â¢t need contract or soverign - life, liberty and property State of nature: men live according to reason and governed by reason - man exists in the state of nature in perfect freedom to do as they want, a state of perfect freedom - not necessarily good or bad, bit is calm and peaceful - men give up some of their freedom to secure the advantages of civilized socity - men have the right to protect their freedom (killing if necessary) - bound by the laws of nature - contrast with hobbes: everyone has the right over everything, there exist no private property - Liberty to do asâ⬠¦show more contentâ⬠¦Ã¢â¬ ¢ First part says that the aim of the contract is to protect and defend the common goods of each member. Consistent with Lockeââ¬â¢s claims that the purpose of society is protect the security of each members. Rousseau adds a second and more disctinctly original claim. â⬠¢ The contract must ensure the conditions for mutual protection, but also in uniting with one another each person obeys only himself and remains as free as he was before. â⬠¢ Isnââ¬â¢t the essence of the social contract giving up part of our natural freedom? â⬠¢ How can we remain as free. â⬠¢ Total alienation of each associate together with all of his rights to the entire community â⬠¢ Total alienation, entire community. â⬠¢ To ensure the terms of the agreements, persons must totally give themselves up for the social contract. â⬠¢ When we alienate ourselves, this must be given to the entire community. This is to ensure that the general will works. â⬠¢ General will is only legitimate sovereign. The famous doctrine of the sovereignty of the people â⬠¢ When we give ourselves over to it, we do nothing more than obey ourselves. Sovereign is not third party, it is simply the people as a whole acting in their collective capacity. â⬠¢ How do we remain as free as we were before? â⬠¢ Formula for freedom or tyranny of the majority? â⬠¢ Only through total alienation do we remain free, because nobody isShow MoreRelatedJurisprudential Theories on IPR13115 Words à |à 53 Pagesproperty, such as: 1. Natural Rights/Justice Argument: this argument is based on Lockeââ¬â¢s idea that a person has a natural right over the labour and/or products which is produced by his/her body. Appropriating these products is viewed as unjust. Although Locke had never explicitly stated that natural right applied to products of the mind,[34]à it is possible to apply his argument to intellectual property rights, in which it would be unjust for people to misuse anothers ideas.[35]à Lokeans argument for intellectualRead MoreThe Implication of Paulo Freires Banking Concept to the 8.4.4 System of Education in Kenya9634 Words à |à 39 Pages The frustrations faced in the efforts placed while going through the 8:4:4 system necessitated this study. This paper will try to find out to what extent the associationism theory of John Locke will be applicable in analyzing how Kenyan education has contributed to lack of creativity in the country. Based on this theory, it is hoped that solutions will be suggested. Itââ¬â¢s my position that we go back to the drawing board (in this case, classroom) to re-design our curriculum. There is dire need forRead MoreNormality and Coercion: Plato, Aristotle, Locke, Rousseau, Kant, and Rawls3749 Words à |à 15 PagesHobbes theory of the Leviathan replacing the ââ¬Ëstate of natureââ¬â¢, what is his conception of normativity and coercion? Discuss three writers from different disciplines who change and update these conceptions and the relationship between normativity and coercion. The 17th Century English philosopher Thomas Hobbes is now widely regarded as one of a handful of truly great political philosophers, whose masterwork Leviathan rivals in significance the political writings of Plato, Aristotle, Locke, Rousseau
Monday, December 9, 2019
Bare free essay sample
Giggles and sneers. ââ¬Å"Whereââ¬â¢re your shoes?â⬠I smile without meaning to and lightheartedly shrug, ââ¬Å"In my backpack. I just felt like taking them off.â⬠Sure, of course walking barefoot seems a little strangeââ¬âmaybe a little too Hippie for this eraââ¬âbut some spring days are just meant to be lived without shoes on. I often find that when bustling around campus, my mind is too busy freaking out about exams, soccer, or the dress I have to finish making to really look where Iââ¬â¢m stepping. Todayââ¬â¢s emphasisââ¬âand probably tomorrowââ¬â¢sââ¬âfocuses more on where we are supposed to end up, and less on the stones we have to jump on to get there: my first lead role, flying alone to Spain, or my Geometry final freshman year that I stayed up all night to study for. Shoes only encourage this neglect. Shoes enable us to walk blindly because with our feet in a cage of safety, we donââ¬â¢t have to look where we stepââ¬âwe are protected. We will write a custom essay sample on Bare or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Children run around barefoot all the time despite the frowns of worried parents. I know I stubbed my toe at least ten times as a kid running around suburban streets determined to catch a footballââ¬âand clearly even after the fifth time I wasnââ¬â¢t afraid of taking the risk of bare feet again. As a seven year old, I swash-buckled with trees and wrote stories that came to me while making fairy houses in the backyard. I didnââ¬â¢t care that trees didnââ¬â¢t fight back, or that my stories didnââ¬â¢t make sense, or even when my fairy houses collapsed. I didnââ¬â¢t worry about failureââ¬âI could always try and build that fairy house again another time. That stubbed toe: well, slap a band-aid on it and keep running. Where did all that fearlessness go?Play it safe, do what you know you can do, just get through the day, and wear shoes. Yes, my mature head tells me to be secure and Iââ¬â¢ll have a comfortable future. If I walk only ââ¬Å"inside the boxâ⬠then I wonââ¬â¢t have to feel any hurt, any disappointment, and definitely wonââ¬â¢t have to feel the sting of a stubbed toe. If I had always lived in a laced up comfort zone I never would have experienced getting cut from the soccer team I tried out for, messing up during a flute concert, or losing my voice as a cabin leader at Outdoor Ed. See though, sometimes we have to take risks, even if the outcome doesnââ¬â¢t always seem worth it. If we never skid through any dirty puddles, we can never know the true taste of victory. Luckily, my heart is a bit more reckless than my head and still believes in writing wild stories and sprinting barefoot.My campus is lettered with painful gravel and gross dirt, not to mention scorching pavementââ¬âsomething I only caught onto once my sandals were in my backpack. Yet as I gratefully stroll over a patch of lawn, I also start to appreciate just how wonderfully soft the grass is, and when I enter the Main building, I enjoy the cool wooden hallway more than I should for just a plain spring day. A grin smears itself into the corner of my mouth and I realize all these things I feel biting or soothing my feet mean Iââ¬â¢m alive. Itââ¬â¢s all good.
Subscribe to:
Comments (Atom)