Wednesday, September 2, 2020

Merger between the United and US Airways Term Paper

Merger between the United and US Airways - Term Paper Example (Mainland, 2012). Under the United Continental Holdings †the parent organization of Continental and United, its fourth quarter 2011 income was expanded by 5.5% with yearly benefit of $840 million (Omaha World-Herald, 2012). The US Airways is â€Å"the sixth biggest U.S. carrier by traffic and eighth biggest by advertise an incentive in the United States† (Nolan, 2011; Fenske, 2008). Showcased under the brand name of US Airways Express, the PSA Airlines and Piedmont Airlines are two of US Airways’ completely claimed auxiliaries on its other four aircraft auxiliaries (Polek, 2008). The US Airways has 341 mainline and 319 provincial airplanes across 200 goals around North-and South America, Europe and the Middle East. The organization is working 629 every day trips all through its 133 relentless goals (Portillo, 2011). Its yearly net benefit barring net uncommon charges was $111 million when contrasted with $447 million in the earlier year (PRNewswire, 2012). Subseque nt to deducting the net unique charges, the company’s net benefit was $0.68 million when contrasted with $2.34 million during the earlier year (BusinessWeek, 2012). Motivating forces to Consolidate Although the merger plan between the United and the US Airways has not been effective since the time the United chose to converge with the Continental last July 2010 (Breaking Travel News, 2010), possible merger between the United and the US Airways never kicked the bucket (Portillo, 2011). Actually, Derek Kerr †the Chief Financial Officer of US Airways expressed that â€Å"consolidation is one of the significant ways this industry can become profitable† (Chakravorty, 2010). Beside economies of scale, a large portion of the current carrier organizations are converging to extend or rule a bustling center point. As it were, merger empowers these aircraft organizations to have an upper hand by contributing on topographically separated courses. This clarifies why other sign ificant aircraft transporters, for example, Delta was anxious to converge with Northwest though the United with Continental (Portillo, 2011). Moreover, Portillo (2011) clarified that the center of US Airways is the way to 90% of the airport’s flights. This perspective will give the United the motivator to choose and consider solidifying with the US Airways sooner rather than later. Breaking down Firms inside the Industry Strategies made by the organizations inside the U.S. carrier industry can be surely known by leading an industry breaking down utilizing the Porter’s five powers system. In light of this structure, it bodes well that the U.S. carrier industry has a low hindrance because of the expanding danger of new participants (Ramon-Rodriguez, Moreno-Izquierdo and Perles-Ribes 2011). Since the time the Airline Deregulation Act was executed in 1978, firms inside the U.S. aircraft industry began encountering the business outcomes of a tight market rivalry. Despite th e fact that the U.S. government expelled the political limitations over the U.S. household courses, calendars and local admissions, a portion of the air terminal guidelines, constrained departure and landing spaces and aircraft

Saturday, August 22, 2020

All About the French Regular Verb Passer (to Pass)

About the French Regular Verb 'Passer' ('to Pass') Passer (to pass) is an exceptionally normal and valuable ordinary - er action word, by a long shot the biggest gathering of action words in the French language. It might be utilized as a transitive action word that takes an immediate item or an intransitive action word, and in doing as such, itsâ compound tensesâ are conjugated with eitherâ avoirâ orâ ã ªtre. Intransitive Passerâ à ªtre With no immediate item, passer intends to pass and requires à ªtre in the compound tenses: Le train va passer dans cinq minutes.  The train is going to pass/go past in five minutes.Nous sommes passã ©s devant la porte midi.  We passed by the entryway around early afternoon At the point when followed by an infinitive, passer intends to go/come to accomplish something: Je vais passer te voir demain.  Ill drop (by to) see you tomorrow.Pouvez-vous passer acheter du painâ ?  Can you go get some bread? Transitive Passer Avoir At the point when passer is transitive and has an immediate article, it intends to go, to cross, to experience, and it requires avoir as the assistant verbâ in the compound tenses. On doit passer la riviã ¨re avant le coucher du soleil.â We have to cross the waterway before sunset.Il a dã ©j passã © la porte.  He has just experienced the entryway. Passer is likewise utilized transitively with a timeframe to intend to spend: Nous allons passer deux semaines en France.  Were going to go through about fourteen days in FranceJai passã © trois mois sur ce livre.   I went through 3 months on that book Transitive versus Intransitive While the implications are almost the equivalent, the thing that matters is in the article (the thing following the action word). On the off chance that there is no article, or if a relational word isolates the action word and item, the action word is intransitive, as in Je suis passã © devant la porte. In the event that theres no relational word, as in Jai passã © la porte, its transitive. Se Passer The pronominal se passer frequently intends to occur, to occur, or, regarding time, to pass by. Mission ce qui se passeâ ?  Whats going on?Tout sest bien passã ©.  Everything went smoothly.Deux jours se sont passã ©s.  Two days passed by. Articulations With Passer Withâ idiomatic expressionsâ using the French verbâ passer, you can margarine somebody up,â handcuff somebody, kick the can, and that's only the tip of the iceberg. passer  clothingâ â to slip on/intopasser  infinitiveâ â to go do somethingpasser la douane  to experience customspasser la radio/tã ©lã ©  to be on the radio/TVpasser lheure dã ©t㠩â â to turn the timekeepers foward, start light sparing timepasser lheure dhiverâ â to turn the tickers back, end sunlight sparing timepasser pas lents  to pass slowlypasser de bons minutes  to have a decent timepasser de bouche en bouche  to be reputed aboutpasser des artificial billets  to pass manufactured moneypasser devant Monsieur le maire  to get marriedpasser du coq lã ¢neâ â to change the subject, make a non sequiturpasser en courant  to run pastpasser en revue  to list; to go over in ones psyche, go throughâ (figurative)â passer (en)  ordinal numberâ â to put in ___ gearpasser lã ¢ge de  to be too old forpasser larme gaucheâ (familiar)â â to kick the bucketpasser la journã ©e/soirã ©e  to go through the day/eveningpasser la principle dans le dos quelquun  to margarine somebody uppasser la tã ªte la porte  to jab ones head around the entryway passer le top  to move beyond the most exceedingly terrible, turn the corner, get over the hurdlepasser le top des 40 ans  to turn 40passer le poteau  to cross the completion linepasser les bornes  to go too farpasser les menottes quelquun  to bind someonepasser standard  to experience (an encounter or intermediary)passer standard de dures à ©preuves  to experience some unpleasant timespasser standard toutes les couleurs de larc-en-ciel  to redden to the underlying foundations of ones hair, to turn pale (from fear)passer standard luniversitã ©  to experience collegepasser pour  to take for, be taken forpasser quelque picked quelquun  to pass/hand something to someonepasser quelque picked aux/standard benefits et pertes  to discount something (as a loss)passer quelque picked en fraude  to carry somethingpasser quelque picked sous quiet  to disregard something in silencepasser quelquun tabac  to beat somebody uppasser quelquun standard les armes  to sh oot somebody by terminating squadpasser sa colã ¨re sur quelquun  to take out ones outrage on somebody passer sa mauvaise humeur sur quelquun  to take out ones awful state of mind on someonepasser sa compete faire  to consume ones time on earth doing Conjugations You can see all the tensesâ of passer, both basic and compound,â conjugated somewhere else. For the present, underneath is the current state to show that passer cuts precisely to ordinary - er conjugation endings.â Current state: je passetuâ passesil passenousâ passonsvousâ passezilsâ passent

Friday, August 21, 2020

Battle of Mons in World War I

Clash of Mons in World War I The Battle of Mons was battled August 23, 1914, during World War I (1914-1918) and was the British Armys first commitment of the contention. Working at the outrageous left of the Allied line, the British accepted a situation close to Mons, Belgium trying to stop the German development here. Assaulted by the German First Army, the dwarfed British Expeditionary Force mounted a diligent barrier and dispensed overwhelming misfortunes on the adversary. Generally holding as the day progressed, the British at last fell back because of expanding German numbers and the retreat of the French Fifth Army to their right side. Foundation Intersection the Channel in the beginning of World War I, the British Expeditionary Force conveyed in the fields of Belgium. Driven by Field Marshal Sir John French, it moved into position before Mons and framed a line along the Mons-Condã © Canal, just to one side of the French Fifth Army as the bigger Battle of the Frontiers was getting in progress. A completely proficient power, the BEF dove in to anticipate the propelling Germans who were moving through Belgium in understanding to the Schlieffen Plan (Map). Included four infantry divisions, a mounted force division, and a rangers unit, the BEF had around 80,000 men. Profoundly prepared, the normal British infantryman could hit an objective at 300 yards fifteen times each moment. Furthermore, a large number of the British soldiers had battle understanding because of administration over the domain. In spite of these traits, German Kaiser Wilhelm II purportedly named the BEF a terrible little armed force and taught his administrators to kill it. The proposed slur was grasped by the individuals from the BEF who started to allude themselves as the Old Contemptibles. Armed forces Commanders English Field Marshal Sir John French4 divisions (approx. 80,000 men) Germans General Alexander von Kluck8 divisions (approx. 150,000 men) First Contact On August 22, in the wake of being crushed by the Germans, the leader of the Fifth Army, General Charles Lanrezac, requested that French hold his situation along the waterway for 24 hours while the French fell back. Concurring, French taught his two corps officers, General Douglas Haig and General Horace Smith-Dorrien to get ready for the German invasion. This saw Smith-Dorriens II Corps on the left build up a solid situation along the waterway while Haigs I Corps on the privilege framed a line along the channel which additionally bowed south along the Monsâ€Beaumont street to secure the BEFs right flank. French felt this was fundamental in the event that Lanrezacs position toward the east crumbled. A focal component in the British position was a circle in the trench among Mons and Nimy which shaped a remarkable in the line. That equivalent day, around 6:30 AM, the lead components of General Alexander von Klucks First Army started reaching the British. The main conflict happened in the town of Casteau when C Squadron of the fourth Royal Irish Dragoon Guards experienced men from the German second Kuirassiers. This battle saw Captain Charles B. Hornby utilize his saber to turn into the primary British trooper to slaughter a foe while Drummer Edward Thomas apparently discharged the principal British shots of the war. Driving the Germans off, the British came back to their lines (Map). The British Hold At 5:30 AM on August 23, French again met with Haig and Smith-Dorrien and advised them to fortify the line along the waterway and to set up the trench spans for destruction. In the early morning fog and downpour, the Germans started showing up on the BEFs 20-mile front in expanding numbers. In the blink of an eye before 9:00 AM, German firearms were in position north of the trench and started shooting at the BEFs positions. This was trailed by an eight-contingent ambush by infantry from IX Korps. Moving toward the British lines among Obourg and Nimy, this assault was met by overwhelming fire structure the BEFs veteran infantry. Unique consideration was paid to the remarkable shaped by the circle in the trench as the Germans endeavored to cross four scaffolds in the territory. Obliterating the German positions, the British kept up a such a high pace of shoot with their Lee-Enfield rifles that the aggressors accepted they were confronting automatic rifles. As von Klucks men showed up in more noteworthy numbers, the assaults escalated compelling the British to consider falling back. On the north edge of Mons, an unpleasant battle proceeded between the Germans and the fourth Battalion, Royal Fusiliers around a swing span. Left open by the British, the Germans had the option to cross when Private August Neiemeier hopped in the waterway and shut the scaffold. Retreat By evening, French had to arrange his men to start falling back because of substantial weight on his front and the presence of the German seventeenth Division on his correct flank. Around 3:00 PM, the notable and Mons were relinquished and components of the BEF got occupied with rearguard activities along the line. In one circumstance a legion of the Royal Munster Fusiliers held off nine German regiments and made sure about the sheltered withdrawal of their division. As night fell, the Germans stopped their ambush to change their lines. In spite of the fact that the BEF set up new lines a short separation south, word showed up around 2:00 AM on August 24 that the French Fifth Army was in retreat toward the east. With his flank uncovered, French arranged a retreat south into France with the objective of setting up at line along the Valenciennesâ€Maubeuge street. Arriving at this point after a progression of sharp rearguard activities on the 24th, the British found that the French were all the while withdrawing. Left minimal decision, the BEF kept on moving south as a component of what got known as the Great Retreat (Map). Consequence The Battle of Mons cost the British around 1,600 slaughtered and injured. For the Germans, the catch of Mons demonstrated exorbitant as their misfortunes numbered around 5,000 murdered and injured. In spite of the fact that a thrashing, the remain of the BEF purchased important time for Belgian and French powers to fall trying to frame another cautious line. The BEFs retreat eventually endured 14 days and finished close to Paris (Map). The withdrawal finished with the Allied triumph at the First Battle of the Marne toward the beginning of September.

Wednesday, May 27, 2020

Hinduism Origin, History, Beliefs - Free Essay Example

The United States is multicultural, and many religions are part our society and it can be beneficial to become competent with other cultures and religions. Learning about other religions may help you understand other’s beliefs and values about their religion practices. Becoming competent in other religions allows you to be culture sensitive with those you work with or might encounter at a quick trip to the grocery store. It is very helpful to learn about other cultures including their religion practices that might include a specific dress attire, meal, fasts, or rituals different to yours. In this case Hinduism will be explored, according to Griffiths (2015) Hinduism is â€Å"the oldest religion in the world† (p. 340). Griffiths (2015) also mentions that, Hinduism â€Å"originated in the Indus River Valley about 4,500 years ago† (p. 340). â€Å"Hindus believe in a divine power that can manifest as different entities†¦ Brahma, Vishnu, and Shiva† (Griffiths, 2015, p. 340). It is believed that they are the creator of the universe, preserver of the universe, and the destroyer of the universe (Hinduism, 2018). Hindus are those who practice this religion and it is not limited to a gender, age, or race. Hinduism is mostly practiced in India, although it is practiced in the United States as well. â€Å"The Hindu belief is that gods or divinities can take many forms, but all form one universal spirit called Brahman† (Hinduism, 2018). Hindus believe in reincarnation and karma is present in their current life. According to Hinduism (2018), this karma cycle can be changed if their behaviors are changed eventually achieving salvation. Many services are performed to accomplish salvation these practices are called marga (Hinduism, 2018). Hinduism is very diverse, there are many books of doctrine used to for hymns and sacred verses (Hinduism, 2018). In India caste system is practiced each caste system marry their own. Hindus as part of the caste system they follow their â€Å"own set of values, rules, and dietary beliefs† (Hinduism, 2018). Although Hinduism beliefs do not include discrimination, it is impossible to avoid when most Indians are part of a caste system (Hinduism, 2018). In conclusion Hinduism being one of the oldest religions, it has changed throughout the years to better Indian’s society. Gandhi was a great leader of Hinduism that led India to its independence in 1947 (Hinduism, 2018).

Saturday, May 16, 2020

Je Ne Sais Quoi, That Indefinable Thing She Has

Je ne sais quoi is a French idiomatic expression used so much in English that it has made it into the leading English dictionaries. In other words, it has been assimilated into the English language. Merriam-Webster describes je ne sais quoi as something (such as an appealing quality) that cannot be adequately described or expressed, as in This woman has a certain je ne sais quoi that I really like. In French, Larousse calls je ne sais quoi a thing one wouldnt know how to define but whose existence is understood intuitively. Je Ne Sais Quoi in French In French, the expression je ne sais quoi literally means I dont know what. It is often used for its literal meaning, not as an idiom. For example: Jai fait la vaisselle, le mà ©nage, le rà ©passage, et je ne sais quoi (dautre) encore.I did the dishes, the house-cleaning, I ironed, and I dont know what else. How the French Use It But the French also use it as we do  in English: a quality you cannot describe. We connect je ne sais quoi to the adjective describing it with de, like this: Cette fille a je ne sais quoi de fascinant.There is something fascinating about that girl. Note that the adjective is always masculine singular, even if the sentence refers to a girl or a  feminine noun. The adjective should agree with je ne sais quoi, which is masculine, singular. Two Spellings in French Or we can also use it,  as in English, as a noun: un je ne sais quoi or hyphenated as un je-ne-sais-quoi. Both spellings are correct. And we often use it with certain,  as in English: Elle avait un certain je-ne-sais-quoi de spà ©cial : lexpression de son regard peut-à ªtre.She had a certain special je ne sais quoi—the expression in her eyes perhaps. Finally, in spoken modern French, the je and the ne glide together, making the expression sound like jeun say kwa. A Word About Spelling This is a common expression that is recognizable in its correct spelling of  je ne sais quoi. It is even in English-language dictionaries, so there really is no excuse for misspelling this classic phrase as jena se qua, as some anglophones tend to do. Just look it up in the dictionary. That woman with the special something will thank you.

Wednesday, May 6, 2020

Eugenics And The Eugenics Movement - 1512 Words

Eugenics is the pseudoscience of obtaining desired traits in a population through controlled repopulation, specifically by preventing those deemed â€Å"unfit† by â€Å"Nordic stereotypes† from breeding. Most modern day Americans do not realize the origins of eugenics, which was planted by Charles Darwin and Sir Francis Galton and bloomed in America, and what effect it had on the attempt to create a master race in Nazi Germany. America played a very influential role in German eugenics by collaboration between scientists and funding from American corporations. The negative connotation associated with this science is usually directed towards the scientists of the Holocaust under Adolf Hitler, and not towards American scientists who also partook in horrific experiments and performed inhumane acts as well. This is absurd when you consider that the United States was the backbone of the eugenics movement internationally and only developed a negative perspective of the researc h when it became affiliated with the holocaust and the troubling actions of Nazi Germany. The American eugenics movement is characterized by the implementation of sterilization laws in over 30 states that led to over 60,000 sterilizations of those deemed â€Å"disabled† by the regulating entities. This movement began in the early 1900’s and many argue that this movement was the base for eugenics programs all over the world, including the infamous eugenics movement in Germany. Proponents of this program believed that theShow MoreRelatedEugenics And The Eugenics Movement2789 Words   |  12 PagesMichael Olson 951-36-5231 PS 308 PS 308 Essay Eugenics has always been given such a notoriously bad connotation, and rightfully so. Eugenics is essentially the belief in controlling the human population by means of improving the gene pool through different processes, and increasing the likelihood of traits which are generally more desirable to the whole of the species. Now that probably sounds familiar, doesn t it? People commonly connect the eugenics movement with the Aryan belief that Hitler infamouslyRead MoreEugenics And The Eugenics Movement1559 Words   |  7 Pagespaved with good intentions; this clichà © quintessentially describes the eugenics movement. Eugenics is the controlled reproduction of individuals; the main focus of eugenics is to isolate â€Å"good† genes from â€Å"bad† genes (Dolan DNA Learning Center). The main goal of Eugenics is to create a higher quality human race (Dolan DNA Learning Center). This movement became the center of which the twentieth century orbited around. The movement swa yed numerous significant policies, which were implemented within theRead MoreEugenics And The Eugenics Movement1530 Words   |  7 Pagesthat was paved with good intentions†; this clichà © quintessentially describes the eugenics movement. Eugenics is the controlled reproduction of individuals; the main focus is to isolate â€Å"good† genes from â€Å"bad† genes (Dolan DNA Learning Center). The primary goal of Eugenics is to create a higher quality human race and became the center of which the twentieth century orbited around (Dolan DNA Learning Center). The movement swayed numerous significant policies, which were implemented within the UnitedRead MoreEugenics And The Eugenics Movement3686 Words   |  15 Pagesshould come as no surprise that eugenics follows this same guideline in human history. A term originally coined by Francis Galton, first cousin to Charles Darwin, eugenics simply means that the â€Å"best people† in society with the most â€Å"h ealthy† â€Å"normal† genes should continue to reproduce and pass on their â€Å"goodness† to the next generation, while the individuals with the â€Å"unhealthy† genes should be discouraged from having any children (Allen 2001:59). With movements beginning in the early 20th centuryRead MoreThe Eugenics Movement1101 Words   |  5 Pagesunder Jim Crow laws, Native Americans were forced into reservations and all of the new immigrants were in crowded ghettos. Those that were a race other than White were at â€Å"the bottom of the social and political hierarchy.† One of the aims of the Eugenics Movement was racial purification. Using the concept of Mendelian genes, scientists would try to breed the best, smartest, most talented, most beautiful and always white individuals and breed out the worst and weakest colored individuals. Mixed race peopleRead MoreThe Eugenics Movement Essay1541 Words   |  7 Pagesstarted a movement known as â€Å"The Eugeni cs Movement.† The idea of eugenics was eventually picked up by Germany, China, Peru, India and Bangladesh. The movement is still in effect till this day; however, it is not as prevalent as it once was. The beginning of the Eugenics Movement all started at Cold Spring Harbor, New York. The United States coined the term Eugenics from Great Britain in the early 1900s. In the year 1910, a man by the name of Charles B. Davenport founded the Eugenics Records OfficeRead MoreThe Holocaust And The Eugenics Movement2285 Words   |  10 Pagesbeen decreased 90 percent due to genocide, diseases, etc.) ? Did you know that there was a sterilization movement in the United States that found success in getting their laws passed in state legislation? These less well-known facts are quite similar to actions carried out by the Nazis, such as the holocaust and the sterilization movement that took place in Germany during the 1930’s. Nazi Eugenics and racism was not a unique instance but rather part of a larger global trend of justifying racism throughRead MoreThe Science Of Eugenics Movement1423 Words   |  6 PagesThe science of eugenics was widely used during the 20th century in the United States to strategically eliminate the reproductive rights of women who were deemed inferior on the social ladder (â€Å"What is Eugenics?†). Some women of color, women with disabilities, and women from lower financial classes were sterilized for permanent birth control, and sometimes without their consent or knowledge (â€Å"What is Eugenics?†). The eugenics movement was aimed to promote selective human features in order to increaseRead MoreRace And The Eugenics Movement987 Words   |  4 PagesRace matters! Race has been probably the most dominating factor beneath the eugenics movement and the pseudo scientific experiments the Europeans physicians and scientists conducted on people of African origin and other races since the 18th century. The foundation for these studies can be associated with ancient Greece, the roots of today’s western values of knowledge, civilized, and democracy which are considered to be the basis for human development. Similarly to today ’s Europeans, Ancient EuropeansRead MoreEugenics And The Social Movement1770 Words   |  8 PagesEugenics is defined as the social movement that claims to improve the genetic features of human populations through selective breeding and sterilization, The word Eugenics is basically selective breeding and it is a Greek word for good birth which was made in the late 1800 s by Francis Galton, who is related to the survival of the fittest scientist Charles Darwin. Galton s number one goal was that each generation contain the best people possible. His main fear was that the higher-class people

Tuesday, May 5, 2020

Persuasion free essay sample

The criticism of His criticism In Jane Austens novel Persuasion. diction and subversive tone depict Austens disdain and disapproval towards the society. Sir Walter Elliot informs Anne and Mr. Shepherd about his irritation toward people who strive to rise above the society. He mentions how naval officer is a profession that transits man with obscure birth into undue distinction (Austen 14), and expresses his disgust towards the officers growing old in appearance sooner than any other man. Sir Walter declared, l was in company with two men Admiral Baldwin, the most deplorable looking personage you can imagine I never saw quite so wretched an example of what a seafaring life can do (Austen 14). Austen Implies the superficial nobllltles like Sir Walter Elliot who insist trivial matters such as appearance supplant other elements of a man. The diction includes deplorable and wretched, which illustrate Jane Austens perspective toward the members of upper class. We will write a custom essay sample on Persuasion or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page She uses Sir Walters absurd contempt for the sailors to portray her contempt for the materialistic nobilities. hen Admiral Baldwin Is the example of a seafaring life can do, Austen portrays Sir Walter as one, too (Austen 14). She sets Sir Walter as the example of what an overindulged life can do to people; they do not understand the torment of toil and labor of the mind as they possess the authority and wealth (Austen 14). Therefore, Sir Walter Elliots negative diatribe on the navy conveys Intentions and feelings of Austen towards the peerage. As Sir Walter continues on his anecdote to denunciate the social workers whom do not adhere to what he values, he asserts, They are all nocked about, and exposed to every climate, and every weather, till they are not fit to be seem It Is a pity they are not knocked on the head once (Austen 14). Sir Walter who is on a highly acknowledged position would rather Judge an individual effortlessly through ones physical appearance than recognizing their true worth. Jane Austen has included irony to reveal her opinion to the Judgmental aristocrats; she gives pity to the society where the foolish upper class men obstinately relate peoples quality with ones appearance. While the workers were exposed to every climate and every weather, the prestigious aristocrats peacefully remained indoors with their luxurious benefits. Austen deprecates the society consisted of immoral nobilities; she believes the peerage Is a pity not knocked on the head once. She holds the opinion that the hollow nobility are not fit to be seen. In response to Sir Walters diatribe, Mrs. Clay begins off her return with a mild explanation of each profession and their loss of personableness on looks as they get devoted to the profession. It Is only the lot of those who are not obliged to follow any, who can live In a regular way o hold the blessings of health and a good appearance to the utmost: I know no other set of men but what lose something of their personableness when they cease to be quite young (Austen 15). Austen expresses her disagreement with Sir Walters shallow judgments through Mrs. Clays clarification on the relationship between toll and mans look In regard of natural effect of time. This strengthens Austens tone of disgust towards the wretched upper class; her attitude oward the members of the aristocracy is revealed through Mrs. Clays subtle to rise above their status by praising the nobility; Mrs. Clay attempts to place herself with the level of Sir Walter. Another ironic tone of Austen is depicted as Mrs. Clay mentions a life of living in a regular way. This is ironic due to a well known fact that the nobilities of high society live in an distinguished way compared to the people in middle classed society. Austen stresses on the essence of appearance for the peerage to signify her chastising tone of the society where pride and self-admiration re the prominent traits of the nobility. The prejudiced society where only the rank and superficial appearance signifies ones reputation and quality was well illustrated in the story of Persuasion to emphasize the insincerity of ignorant and shallow- minded aristocrats. Until the society today, people cannot escape illogical Judgments only based on the appearance or the social status of a person. Bibliography Austen, Jane. Persuasion. 2nd ed. Ed. Patricia Meyer Spacks. New York: W. W. W. Norton Company, New York, 2013. 14-15. Print.

Thursday, April 16, 2020

NFL HISTORY Essays - Akron Pros, APFA Season, Ralph Hay,

NFL HISTORY ?The Beginning of the N.F.L? The year was 1920 and pro-football was in a state of confusion. The three main problems that led to all the confusion were, salaries rising, players jumping from team to team and the use of players still enrolled in college. So, on August 20, 1920, a group of men representing the four current pro teams met. When the day was done the American Professional Football Conference was born. The A.P.F.C. was formed to make one governing body over pro football. Then, on September 17, 1920, a second organizational meeting was held. At the second meeting the following teams attended: the Akron Pros; Canton Bulldogs; Cleveland Ohio Indians; Dayton Ohio Triangles; Decatur Illinois Staleys Athletic Club; Hammond Indiana Pros; Massillon Tigers; Muncie Indiana Flyers; Racine [a Chicago street] Cardinals; Rochester New York Jeffersons; Rock Island Illinois Independents; and [the State of] Wisconsin. One of the first orders of business was to change the name of the American Professional Football Conference to the American Professional Football Association. The second order was to appoint a president. So Native-American Olympic Gold Medallist Jim Thorpe was elected as league president. Other rules were made such as a membership fee of $100 per team; to be charged to give an appearance of respectability No team ever paid it. Scheduling was left up to the teams, and there were wide v ariations. This occurred both in the overall number of games played and in the number played against APFA member teams. Four other teams-the Buffalo All-Americans, Chicago Tigers, Columbus Panhandles, and Detroit Heralds-joined the league sometime during the year. On September 26, the first game, which featured an APFA team was played at Rock Island's Douglas Park. A crowd of 800 watched the Independents defeat the St. Paul Ideals 48-0. A week later, October 3, the first game matching two APFA teams was held. At Triangle Park, Dayton defeated Columbus 14-0, with Lou Partlow of Dayton scoring the first touchdown in a game between Association teams. The same day, Rock Island defeated Muncie 45-0. At the league meeting in

Friday, March 13, 2020

Fermentation vs. Anaerobic Respiration

Fermentation vs. Anaerobic Respiration All living things must have constant sources of energy to continue performing even the most basic life functions.  Whether that energy comes straight from the sun through photosynthesis or through eating plants or animals, the energy must be consumed and then changed into a usable form such as adenosine triphosphate (ATP). Many mechanisms can convert the original energy source into ATP.  The most efficient way is through aerobic respiration, which requires oxygen. This method gives the most ATP per energy input.  However, if oxygen isnt available, the organism must still convert the energy using other means.  Such processes that happen without oxygen are called anaerobic.  Fermentation is a common way for living things to make ATP without oxygen.  Does this make fermentation the same thing as anaerobic respiration? The short answer is no.  Even though they have similar parts and neither uses oxygen, there are differences between fermentation and anaerobic respiration.  In fact, anaerobic respiration is much more like aerobic respiration than it is like fermentation. Fermentation Most science classes discuss fermentation only as an alternative to aerobic respiration.  Aerobic respiration begins with a process called glycolysis,  in which a carbohydrate such as glucose is broken down and, after losing some electrons, forms a molecule called pyruvate.  If theres a sufficient supply of oxygen, or sometimes other types of electron acceptors, the pyruvate moves to the next part of aerobic respiration.  The process of glycolysis makes a net gain of 2 ATP. Fermentation is essentially the same process.  The carbohydrate is broken down, but instead of making pyruvate, the final product is a different molecule depending on the type of fermentation.  Fermentation is most often triggered by a lack of sufficient amounts of oxygen to continue running the aerobic respiration chain.  Humans undergo lactic acid fermentation. Instead of finishing with pyruvate, lactic acid is created.  Distance runners are familiar with lactic acid, which can build up in the muscles and cause cramping. Other organisms can undergo alcoholic fermentation, where the result is neither pyruvate nor lactic acid.  In this case, the organism makes ethyl alcohol.  Other types of fermentation are less common, but all yield different products depending on the organism undergoing fermentation. Since fermentation doesnt use the electron transport chain, it isnt considered a type of respiration. Anaerobic Respiration Even though fermentation happens without oxygen, it isnt the same as anaerobic respiration.  Anaerobic respiration begins the same way as aerobic respiration and fermentation.  The first step is still glycolysis, and it still creates 2 ATP from one carbohydrate molecule.  However, instead of ending with glycolysis, as fermentation does, anaerobic respiration creates pyruvate and then continues on the same path as aerobic respiration. After making a molecule called acetyl coenzyme A, it continues to the citric acid cycle.  More electron carriers are made and then everything ends up at the electron transport chain.  The electron carriers deposit the electrons at the beginning of the chain and then, through a process called chemiosmosis, produce many ATP.  For the electron transport chain to continue working, there must be a final electron acceptor.  If that acceptor is oxygen, the process is considered aerobic respiration.  However, some types of organisms, including many types of bacteria and other microorganisms, can use different final electron acceptors.  These include nitrate ions, sulfate ions, or even carbon dioxide.   Scientists believe that fermentation and anaerobic respiration are older processes than aerobic respiration.  Lack of oxygen in the early Earths atmosphere made aerobic respiration impossible.  Through evolution, eukaryotes acquired the ability to use the oxygen waste from photosynthesis to create aerobic respiration.

Wednesday, February 26, 2020

Issues In Criminology Essay Example | Topics and Well Written Essays - 3250 words

Issues In Criminology - Essay Example 295). Intense gender discrimination, like the refusal of numerous law schools to give access to women, the frequent segregation of women from juries, and the habit of imposing to female and male ‘offenders’ different punishments for the same offences went mostly unquestioned (Lanier & Henry, 1998, 279). The scale of the victimisation of girls and women indicated that the lack of attention on the role of violence in the lives of women was the prime issue to appeal to the interest of feminist scholars and advocates. Due to this, a large volume of literature exists on the issue of victimisation of women, particularly in the subject matters of sexual abuse, sexual harassment, and domestic violence. Meanwhile, the identification of the breadths and forms of female victimisation had a considerable influence on policy making, and it is perhaps the most concrete contribution of radical feminism to mainstream criminology (Almeder, Koertge & Pinnick, 2003, 18). The influence of cr iminology and especially criminological theory was varied, although, partly because these crimes did not at appear to challenge. The impact on the field of criminology and particularly criminological theory was mixed, however, in part because these offenses did not initially seem to dispute androcentric criminology as such (ibid, p. 18). Rather, the notions of ‘victimology’ and ‘domestic violence’, while crucial in the development of feminist perspective of criminology, also provided mainstream criminologists and several practitioners of criminal justice an alternative way of understanding criminology theory and research (Flavin, 2001). The objective of this essay is to discuss the development of feminist criminology, focusing on the post-war period, especially the 1960s and 1970s. More particularly, the essay will focus on the contribution of the three feminist perspectives, namely, (1) feminist empiricism, (2) standpoint feminism, and (3) feminist postmod ernism to British criminology theory and research. Feminist Perspectives of Criminology Feminist perspectives have remarkably grown in areas that have more established practices of interpretive knowledge like history and literature (Flavin, 2001). On the contrary, the tradition of criminology persists to be profoundly ingrained in the scientific method (ibid, p. 273). A great deal of British mainstream criminology is founded on principles that ‘science is value neural’ (Flavin, 2001, 273). Research can be duplicated, as argued by positivism, since researchers generate knowledge in related ways, making criminologists similar with each other (Almeder et al., 2003, 20). Richard Powers of the New York Times recognised the ‘vesting of authority in experiment’ (Flavin, 2001, 274) as the most outstanding thought of the new century. Yet, Powers (1999) argued that scholars â€Å"from Ludwig Wittgenstein to Thomas Kuhn and beyond† (ibid, p. 81) have mentioned, ... that fact and artefact may be closer than most empiricists are comfortable accepting... That great empiricists have rejected initial data on hunches, until their observations produced more acceptable numbers. That

Sunday, February 9, 2020

Education in China and America Essay Example | Topics and Well Written Essays - 1250 words

Education in China and America - Essay Example Literacy can be achieved through many ways which some include cultural, visual, internet, and information. Although many people in the society lack literacy skills, literacy remains an elusive target to all people. This paper discusses in depth about the difference between China education and American education. Although China has a high population, it has managed to excel in its basic education. It is depicted that China attaches a great significance to education. Education remains the first priority in China. Chinese high schools differ immensely with American high schools primarily in structure. An American school day tends to be shorter compared to a Chinese school day. Scholarly research denotes that American students spend only seven hours in school during the weekdays whereas as a Chinese student, I used to spend stay in school spending most of my time studying at times even until 10.00 at night. The class structure too varies between the two countries. In contrast to the Chin ese system where students remain in the same room all day, the teachers rotating in and out, the American students have each class in a different classroom with different classmates unlike Chinese students who have a set of the same classmates all day. This becomes advantageous to the students since the students are able to form a strong social bond between each other. I could have the same classmates even for the whole grade division. This made us live as a family like brothers and sisters. The two countries portray a different system of grade division. In essence, America’s most common system starts with kindergarten then proceeds to fifth grade as elementary school, sixth through eighth grade as junior high school, and ultimately ninth through twelfth grade as high school. In contrast to the American system, Chinese system begins with kindergarten through the sixth grade called the elementary school and finally the seventh grade through the twelfth grade, which is called t he middle school. The two countries differ in the way information passes from the teachers to the students. America always prefers a high personal expression. Most of the classes entirely revolve around discussion materials where the teacher expects the students to engage in dialogues. American education encourages classroom participation that contributes greatly to the performance of the students. In China, teachers do not put much emphasis on class discussions. As a Chinese student, observed the quietness in the room as the teacher came and lectured as we all listened. This reduces the teacher-student relationship since it was very rare to find a student engaging in a talk with the teacher. Some students even went to an extent of fearing the teacher. The students maintain respect amongst themselves and their teachers. The classroom is quiet as compared to the American classroom that is noisy and boisterous. Chinese classrooms emphasize on a more formal atmosphere compared to the A merican classrooms. American education always lays its basis on technology. It is depicted that in America, the progress in the field of technology and knowledge occupy’s about three-quarter of their productivity output. Unlike American education

Thursday, January 30, 2020

Working at Mcdonalds Essay Example for Free

Working at Mcdonalds Essay In the essay, â€Å"Working at McDonald’s,† Amitai Etzioni talks about his belief that working, especially at fast food chain restaurants can be bad for teenagers. Working, for teenagers under some circumstances can be bad for them but sometimes its good depending on the daily schedule of whomever is working. If the teen is still in school, working is bound to affect their involvement and attendance in negative ways. Though it’s true that while working you gain on the job experience, Etzioni believes it can’t really help if it comes at the cost of education while teens think the opposite. Fast food jobs do have an advantage earning money while also learning how to manage the money they make. It boils down to whether or not risks outweigh the benefits when working jobs like this which all depends on the current situation of the teen. To begin, the Etzioni writes how he believes jobs don’t go well with keeping up schoolwork and can get in the way of attendance. This is the same for nearly all extracurricular activities most are after school so it’s likely to get in the way. When I was in high school I had a friend John who tried to juggle a job, schoolwork and a football altogether but in the end he chose to give up football because he couldn’t make it to any of the practices. The author also takes into account that if students don’t have enough time to study their grades will drop without question. It comes down to the decision of which activity to give up to make room for work. More than half the time students will abandon the sport to find more study time like in my friend John’s case. Second, the author addresses the problem that I think has two sides to the coin. He believes that jobs generally don’t give any training that would help outside of the work they would be currently doing. This is true because most of the skills taught in fast food restaurants are for the simple things like running the register or working the fryer. Many of the jobs themselves could be done as good or better by a nine-year-old because of how simple the work is. Most aspects of this type of job wouldn’t help anyone in the future much less a teenager. Once they no longer work there  anymore, the skill is useless unless they still plan on working in the same type of job. There are a couple of things that can be learned from a fast food job that might help with other jobs the future. If you’ve ever been to a McDonald’s or any other fast food restaurant and had a bad worker serving you, you might have gotten a little annoyed. Work ethic is very important at a fast food place or any workplace for that matter. In other jobs, if you are not quick and efficient, you might not make it very far in your work. Also, workers learn how to work with different types of people this helps them in later experiences in a work force. Getting an impatient customer is a good example, when presented with a problem like this it helps prepare you for other situations like it in the future. This is not always easy but will serve as great experience for jobs in the future. Lastly, Etzioni explains that working doesn’t teach teens how to manage their money. This however is where I disagree, the best thing about having a job as a teen is that you learn the value of a dollar from your own mistakes. Having money and working for that money helps teens to understand that money isn’t free and shouldn’t be wasted. When teenagers want to buy something they’ll simply go buy it only to find later that they could have gotten it at half price had they waited on a sale. Also teens will try to rent things they want from â€Å"pay later† businesses like rent a center instead of buying it when they have the money to do so just to learn that not only is it more expensive this way but if they miss a payment the rightful owners could repossess it at any time. Often times this could lead to debt, but if they are lucky their parents might help them out. â€Å"Students who worked at least 25 hours per week while in school, their unemployment rate four years later was half of the seniors who did work.† This means that most of those that began in fast food jobs stayed in that area of work or simply became unemployed. There are plenty of pros and cons to working at an early age, while it could interfere with school it can also help teens develop a good work ethic and learn from their mistakes. If they don’t get the chance to make these mistakes before they move away, the consequences could be alot more devastating. The question the author wants the reader to consider in all this is, can the risk worth the reward?

Wednesday, January 22, 2020

An Image of Truth :: Essays Papers

An Image of Truth Plato teaches that reality is to be found in universal â€Å"forms.† Images of objects are therefore pale imitations of reality: that is, at least twice removed from the truth. Nevertheless, Jane Austen in Pride and Prejudice suggests that the image of a person can offer true insights that the actual person might not. In her very first meeting with Mr. Darcy, Elizabeth is left â€Å"with no very cordial feelings towards him† and after spending â€Å"four days in the same house with him† she still â€Å"think[s] him very disagreeable† (9, 53).1 Even after Mr. Darcy has directly and blatantly declared his love for Elizabeth she cannot consider him favorably and exclaims â€Å"I have never desired your good opinion† (125). Just to walk with him in the park â€Å"seem[s] like willful ill‑nature or a voluntary penance† (120). However, Elizabeth’s feelings for Darcy change after she views the portrait of him at Pemberley. She d evelops a â€Å"more gentle sensation toward the original† after seeing the painting and may even consider Darcy’s â€Å"regard with a deeper sentiment of gratitude than it had ever raised before† (162). Elizabeth needs the indirect image of Darcy in this portrait to view the man himself more accurately than she can when she faces him in person. The painting offers her time to contemplate Darcy’s true character. Furthermore, the frozen image creates a distance from which Elizabeth may consider Darcy without the interference of her intense emotions. When Elizabeth is face to face with Darcy, she must engage him in conversation, but when she examines the portrait, she does not have to speak: she can look at the painting for â€Å"several moments†¦in earnest contemplation† and even â€Å"return to it again† before leaving (162). Socially, great importance is placed on witty dialogue and polite conversation. At the first ball, the newly arrived Mr. Darcy is criticized for his reserve; rather than extend himself to form new acquaintances, he speaks only â€Å"occasionally to [a lady] of his own party† (8). Yet by refraining from conventional conversation, Mr. Darcy is able to form sound opinions. When he â€Å"wish[es] to know more of [Elizabeth]† he first â€Å"attend[s] to her conversations with others† before directly engaging her in dialogue (17). He even advises Elizabeth to take her time in getting to know him, urging â€Å"I could wish, Miss Bennet, that you were not to sketch my character at the present moment†¦the performance would reflect no credit on either.

Tuesday, January 14, 2020

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m