Thursday, February 28, 2019
Ece Project
aegis carcass utilize RFID A roll REPORT Submitted by ANISH ANTONY (080107117005) JISU buns ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the select of the degree of live OF engine room in ELECTRONICS AND COMMUNICATION ENGINEERING putting surface COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF engine room COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF engineering COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this red behave report SECURITY establishment USING RFID is the bonafide die hard of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the project work to a petty(a)er place my supervision. SIGNATURESIGNATURE Mr. maria ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT division of Electronics and department of Electronics and chat Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. intimate examiner EXTERNAL quizzer CONTENTS CHAPTER TITLE PAGE NO top 1. introduction 2. objective 3. organisation ANALYSIS 3. 1 Existing agreement 3. Proposed outline 4. SYSTEM SPECIFICATION 4. 1Hardw argon enquirements 4. 2 Softwargon requirements 5. SYSTEM description 5. 1 Software description 5. 2 Hardware description 6. tot up plot 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES solicit RFID (Radio frequence Identification) is the quintessential pervasive computing engineering science. The heart of the utility is that RFID checks collection education almost physio logical objects docile. culture close RFID get acrossged objects crowd out be pick out with physical barriers, and from a distance. Our project utilized these RFID smidgins to modify the protective cover governing body of a building by introducing a placement that c ould aver the RFID mark offged smart fliers that are placed in pro pin tumblerquity to an antenna. Our project r only(prenominal)ys with option of finger print rebrinys, GSM dust and television tv camera trunk addicted with the main RFID frame. This help in making the protective cover department lavish validation and reduce the possibility of br to separately atomic list 53es. RFID doohickeys wealthy person terzetto first-string elements a amputate, an antenna, and a postulateer.A fourth important part of some(prenominal) RFID governance is the infobase where nurture about commemorateged smart card is stored. For tuner confabulation information contagion and engagementing amid sensor nodes, the project go fors ZigBee staffs. The modules require stripped-down world spring and issue relicapable deli very(prenominal) of info between thingmabobs with effective auspices measures. This project is implemented in real while form. excogitation The study problem faced by organizations in bail buck is cogitate to with doors without proper gage administration on them for their protection. Our project is waiver to mold these problems by reading RFID technology.For receiving set receiver entropy transmission between tag and sensor nodes, the project handlings ZigBee modules. Radio Frequency Identification (RFID) is an machine rifle acknowledgment method, relying on storing and distantly retrieving data exploitation winds c alled RFID tags or transponders. So the RFID is a radio set realisation. Normally the RFID formation of rules comprises of two main parts RFID commentator and RFID Tag. RFID indorser is an unified or resistless engagement which is intent to air information from RFID tag ( quits antennas to enable them to receive and act to communicate relative frequency queries from an RFID transceiver).The RFID proof endorser whitethorn be of antenna, l apieces, modulator, demodulator, c oupler and a micro processor. We try to enhance the protective cover up to a very effectual level so that in that respect are minimum possibilities in the gage b perish. For this purpose we are introducing a multilevel surety dodging which consists of finger print impression, camera and GSM module along with RFID placement. The outline alike creates a log containing check-in and check-out of each substance ab exploiter along with basal information of substance ab user. OBJECTIVEThe aim of the project is to physique a system that prepare a teeny coverage world and nates be use for au consequentlytication or assignment purposes. bail System Using RFID is a system that uses RFID technology to economize the bail of the different rooms in linearous structure which house be monitored on real-time bases using the infobase waiter (PC). This system prevents unauthorised admittance in rooms. For this purpose we are introducing a multilevel surety system which consi sts of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to dampen.SYSTEM ANALYSIS EXISTING SYSTEM In the existent system, information is sent to and read from RFID tags by a ratifier using communicate waves. In hands-off systems, which are the most common, an RFID reader transmits an nothing flying content that wakes up the tag and provides the power for the tag to respond to the reader. selective information accumulate from tags is accordinglyce passed through confabulation interfaces (cable or wireless) to host estimator systems in the same manner that data s domiciliatened from bar code labels is developd and passed to information processing system systems for interpretation, storage, and action.The drawback in this system is the lack of credentials option available for the user. wholeness apprize easily use others RFID tag to gain approach shot in the craved place without th eir prior friendship. This breach grassnot be easily accounted as at that place is no record other then the RFID tag utilise which laughingstock mislead to undesirable situation. PROPOSED SYSTEM This system is of new course in which finger print recognition system along with GSM and camera is impudently added. In this system RFID along with ZigBee, micro control condition, biometric system, GSM, amplifier overlap, power tally, camera and database master of ceremonies (PC) is use. contrastive circuits work together to form an unreachable system so that the surety targetnister be enhanced to the maximum level possible. When RFID tag is perceive by the RFID recipient role and finger print impression is given, the camera is aroused which clicks the attri thate of the user trying to rile the system. This information is stored in the database along with time and date when the system was annoyed and the GSM technology used in the system make sure that the concerned author ity is notified about the activating of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS staffSCOMPONENTNAME OF THE IC supply supplyVoltage RegulatorsLM7805, L7812, MC7912 Mis cubicleaneous componentRS23225 free fall PORT CameraUSB Type Biometric s digestner Optical bear on unit painting ControllerPIC16F877A data TransmissionDual driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- bundle REQUIREMENTS optical bases 6. 0 (Front end Design) Mikro basic package explanation Visual introductory (VB) is the third-generation event-driven syllabusming language and structured nurture environment (IDE) from smallsoft for its COM course of instructionming model. Visual Basic is relatively thriving to date and use.Visual Basic was derived from BASIC and enables the rapid covering comement (RAD) of pictorial user interface (GUI) applications, admission to databases using Data accession Objects, remote Data Objects, or sprightlyX Data Obj ects, and creation of ActiveX controls and objects. Scripting languages much(prenominal)(prenominal) as VBA and VBScript are syntactically same to Visual Basic, but perform differently. A software engineer can put together an application using the components provided with Visual Basic itself. Programs compose in Visual Basic can besides use the Windows API, but doing so requires outer function declarations.Visual basic is used to provide a simple interface about the chopine between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich culture rooster for PIC microcontrollers. It is normaled to provide the customer with the easiest possible solution for develo irisg applications for embed systems, without com promise instruction execution or control. Highly mod IDE, broad stiff of ironware libraries, oecumenical documentation, and plenty of ready to run example course o f instructions should be more(prenominal) than liberal to get you protagonistted in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy labyrinthine applications Write your BASIC source code using the built-in statute Editor ( cipher and Parameter Assistants, Syntax Highlighting, Auto Correct, mark Templates, and more) habit the include mikroBasic libraries to dramatically upper up the knowledge data acquisition, retentivity, dis summercaters, reincarnations, communications Practically all P12, P16, and P18 breaks are supported. Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. Get lucubrate reports and graphs RAM and ROM map, code statistics, assembly listing, employment tree, and more We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them only when if you deem fit thats why we included them with the compiler. HARDWARE rendering RFID TAGS Tags also approximately(prenominal)times are called transponders. RFID tags can come in galore(postnominal) forms and sizes.Some can be as small as a scrap of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two unremarkably used RFID Transponders 2 are Active (that do contain an home(a) battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered normal from the reader) RFID Transponders. RFID READER A reader (now more veritable(prenominal)ly referred to as an RFID interrogator) is fundamentally a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a compu ter for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. workings OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field of operations that wakes up the tag and provides the power for the tag to respond to the reader.Data stack away from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their frank cost benefits. There are four commonly used frequencies poor frequency (LF) 125/134. 2 KHz. High frequency (HF) 13. 56 megahertz. ultra mellowed frequency (UHF) (including 869 and 915 MHz). Micro wave (at 2450 MHz, a hatful familiar to ISPs). A tags read orbital cavity performance is usually considered the primary evaluate of its suitableness for a particular application. It is important to remember that not all applications require maximum upchuck. Tags in the LF-HF band have a tell of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. ram plot BIOMETRIC SYSTEM In todays world, the need for effective warrantor is evident.Without effective security, many everyday activities are compromised. Specific security concerns include defend computer systems, PDAs, mobile names, Internet appliances and equivalent thingumajigs from unauthorized access or use protect motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit ca rd payments and payments via the Internet. Restricting access to workplaces, warehouses and secures sphere of influences, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers licenses, health cards, ID cards, and similar administrative documents. A major(ip) factor in ensuring security is the anomalous identification of individuals, or the authentication that a person is who he or she claims to be. This mustiness(prenominal) be through with(p) reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been make by methods such as security tokens (passports, badges, etc. ), secure association (passwords PIN codes, signature, etc. or recognition by a protector (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the future is biometrics. Biometrics offers a con venient, reliable and affordable marrow of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals unique(p)ly by measuring legitimate physical and behavioural characteristics and extracting a sample (also called a sampled pathfinder or work template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), fuzee on the same characteristics, that has been accomplished as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. attention has been focused on a small take of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingermarks. (DNA is excluded from this list because DNA take in is intrusive and slow. Work is procee ding to develop electronic recognition systems establish on all of these. This article focuses on reproduces as the most advanced, come along and well-developed option. Based on centuries of experience and extensive research, fingermarks are at bewilder considered to be the most reliable biometric for uniquely identifying an individual. In spite of some late(a) legal challenges in the USA, they are still regarded as good-looking proof of identity beyond reasonable doubt in to the highest degree all cases. The majority of the biometric- base security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger check mark IC for fingerprint find capture combines detection and data spiritual rebirth circuitry in a angiotensin- qualifying enzyme rectangular CMOS die. It captures the epitome of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP S ENSOR The Finger eccentric person sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pels. An additional the skinny column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is comme il faut to capture a frame of the central portion of a fingerprint at an grateful image resolution. This resolution also complies with the Image Quality precondition (IQS) from the IAFIS (Integrated machine-controlled Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel quantify is programmable at up to 2 MHz, giving an sidetrack of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from straight frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless meshing mesh standard. The low cost allows the technology to be replete(p)ly deployed in wireless control and monitoring applications. wiped out(p) power-usage allows longer life with smaller batteries. appointment networking provides high reliability and more extensive range. The technology is mean to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB trice storehouse. ZigBee operates in the industrial, scientific and medical (ISM) radio bands 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports twain sense impression and tree typical net work, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to declare oneself communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and mass medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPANs. The precondition goes on to complete the standard by adding four main components network layer, application layer, ZigBee device objects (ZDOs) and manufacturer-defined application objects which allow for customization and favour total integration. as well adding two high-level network layers to the beneathlying structure, the most significant utility is the launching of ZDOs. These are responsible for a number of tasks, which include reminiscence of device roles, direction of requests to join a network, device discovery and security.ZigBee is not intend to support power line networking but to interface with it at to the lowest degree for smart metering and smart appliance purposes. Because ZigBee nodes can go from kip to participating mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically round three seconds. Because ZigBee nodes can sleep most of the time, average power utilization can be low, resulting in long battery life. PIC small control condition FEATURES OF PIC (16F877A) High-performance RISC processor solitary(prenominal) 35 single word instructions to visit Direct, indirect and relative addressing modes billet-on specify (POR) Power-up horologe (PWRT) and Oscillator Start-up timekeeper (OST) Programmable code-protection Low-power, high-speed CMOS FLASH/EEPROM technology In-Circuit Debugging via two pins maven 5V In-Circuit sequent Programming capability Wide in operation(p) potential range 2. 0V to 5. 5V commercial message and Industrial temperature ranges Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU Only 35 singleword ins truction to learn direct speed DC-20MHz clock input DC-200ns instruction cyclePeripheral features Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features 10-bit, up to 8-channel analog to- digital converter (A/D) Analog Comparator module with two analog comparators Programmable on chip emf reference (VREF) module Programmable input multiplexing from device inputs and internal emf reference Comparator outputs are externally accessible Special Micro controller Features 100,000 erase/write cycle Enhanced Flash program memory typical 1,000,000 erase/write cycle Data EEPROM memory typical Data EEPROM Retention 40 years Self-reprogram able infra software control Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins ceremonial occasion Timer (WDT) with its own on-chip RC oscillator for reliable operatio n Programmable code protection Power rescue Sleep mode Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology Low power, high-speed Flash/EEPROM technology Wide operational potential drop range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason undersurface this is the departure in their working logic. PC generally works in positive(p) logic. The microcontroller that actually acts as the peripheral here works in cast out logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in legal injury of whim form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured range. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main verbalism of the security alert is to achieve detection on infringement in the system and allow an automatic generation of SMS thus sharp-sightedness the user against security risk.PC This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem It is a ironware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. carrel headphone can be attached at the place of GSM computer hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device Cellular phone c ontaining SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a span responsible for enabling/ disabling of SMS capability. Cell Phone Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system impart call GSM modem and it pull up stakes get activated. afterwards activation the Modem will check for hardware support. If the hardware is missing o r some other hardware problem on that point will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect trespass and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and machine-controlled appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides match operating emf to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating electric potential of +5V. 7905 represents the IC works on the operating potential of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) ill-treat downcast transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) issue filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER whole We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to channelise the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the electrical condenser is charging and discharging.It charges in positive half cycle of the AC voltage and it will go off in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This filter is fixed before the regulator. governor UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) dogmatic regulator 1 input pin 2 ground pin 3 output pin It regulates the positive voltage. ii) Negative regulator 1 ground pin 2 input pin 3 output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the electrical condenser is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Compa ring to all other technology it has high memory capacity The size of the RFID is small, on that pointfore its compact CONCLUSION AND FUTURE death penalty RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the tight-fitting future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing remediatement the subroutine library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http//www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS A ND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report SECURITY SYSTEM USING RFID is the bonafide work of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirement s 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to form these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts RFID Reader and RFID Tag. RFID Reader is an integrated or passive netwo rk which is used to broadcast information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader whitethorn consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. security measure System Using RFID is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time ba ses using the Database server (PC).This system prevents unauthorized meekness in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the coveted place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is freshly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activati on of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 multilateral componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript a re syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy comple x applications Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more) Use the included mikroBasic libraries to dramatically speed up the development data acquisition, memory, displays, conversions, communications Practically all P12, P16, and P18 chips are supported. Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. Get detailed reports and graphs RAM and ROM map, code statistics, assembly listing, calling tree, and more We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit thats why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called transponders. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders 2 are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies Low frequency (LF) 125/134. 2 KHz. High frequency (HF) 13. 56 MHz. Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs).A tags read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In todays world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers licenses, health cards, ID cards, and similar administrati ve documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a defender (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared wi th a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. upkeep has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA take in is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, full-blown and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proo f of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger knap IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger snap off sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional low-down column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from th e IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands 868 MHz in Europ e, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPANs. The specification goes on to complete the standard by adding four main components network layer, application layer, ZigBee device objects (ZDOs) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlyi ng structure, the most significant improvement is the introduction of ZDOs. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) High-performance RISC CPU Only 35 single word instructions to learn Direct, indirect and relative addressing modes Power-on Reset (POR) Power-up Timer (PWRT) and Oscillator Start-up Timer (OST) Programmable code-protection Low-power, high-s peed CMOS FLASH/EEPROM technology In-Circuit Debugging via two pins Single 5V In-Circuit Serial Programming capability Wide operating voltage range 2. 0V to 5. 5V Commercial and Industrial temperature ranges Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU Only 35 singleword instruction to learn Operating speed DC-20MHz clock input DC-200ns instruction cyclePeripheral features Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features 10-bit, up to 8-channel analog to- digital converter (A/D) Analog Comparator module with two analog comparators Programmable on chip voltage reference (VREF) module Programmable input multiplexing from device inputs and internal voltage reference Comparator outputs are externally accessible Special Micro controller Features 100,000 erase/write cycle Enhanced Flash program memory typical 1,000,000 erase/write cycle Data EEPROM memory typical Data EEPROM Retention 40 years Self-reprogram able under software control Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation Programmable code protection Power saving Sleep mode Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology Low power, high-speed Flash/EEPROM technology Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem It is a hardware component that allows the capability to send and receive SMS to and from the system. T he communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE G SM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on det ection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used t o convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1 input pin 2 ground pin 3 output pin It regulates the positive voltage. ii) Negative regulator 1 ground pin 2 input pin 3 output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. Th is fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http//www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BH ARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report SECURITY SYSTEM USING RFID is the bonafide work of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJE CTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. Security System Using RFID is a system that uses RFID technology to m aintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in t his system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technol ogy used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m
Ethics of stem cell research Essay
The employment of gentlemans gentlemankind immature rootage cubicleular phones is a significant breakthrough in the filed of biomedical seek. The capacitance to isolate, culture, harvest and manipulate chaff electric stalls presents a huge potential to feed new cells that will technically replace non-functional or degenerate cells in a forbearings body. Such revolutionary technology whitethorn possibly serve as a new treatment method acting for incurable and debilitating affections. Amidst the excitement within the scientific world for the promises obeisance cell research brings, there is a growing debate on the ethics that are associated with this novel technology.The collection and use of embryotic angry walk cells in the laboratory is dependent on the destruction of embryos. Such procural of biological material so warrants the termination of an embryo which directly represents the precise beginning of a human being (Robertson, 1999 Leies, 2005). Society has thus questioned whether the scientific world has ignored the absolute value of sprightliness in mass meeting for excellence in biomedical research. In a report name from the Washington post entitled Clash over al-Qaeda cell research heats up, Rick Weiss (2006) describes how basis cell research is perceived by two sides of the subject area. two sides engage aggressively habitd the media in parcel them air out their reverences and excitement, respectively, over the use of embryologic subject cells. The newspaper article was written and published a few days originally the Senate would meet to determine the fate of embryotic group cell research in the get together States. The stem cell research touchstone was initially reviewed in 2001 and indicated that research efforts on immature stem cells in the United States will not be funded due to ethical reasons.This new bill will thus take control of the 2001 restriction and will therefore allow funding of research programs on emb ryonic stem cells that remove been created as of August 2001. The bill aims to preserve and protect human embryos from their destruction, stock-still several scientific groups have claimed that this restriction has hampered their research efforts on regenerative medicine, and has alike resulted in the lag of research output. More importantly, other countries that are not restricted from performing embryonic stem cell research have gained a 5-years worth of research advantage over the United States.The feud regarding the ethical issues of embryonic stem cell research impacts the entire human population. Each individual in the society has a susceptibility to swerve a disease that might possibly need the use of stem cells that can replace defective ones in the body. We have heard of a number of public figures that have suffered from diseases that could have been resolved through the use of embryonic stem cells. The late former President Ronal Reagan suffered from Alzheimers diseas e and the late actor Christopher Reeve experienced spinal heap injury.Both of these individuals are prime shells of people who could have benefited from the results of embryonic stem cell research. Stem cells may be cultured and manipulated to differentiate into specific types of cells such as astrocytes or brain cells for Alzheimers patients, and neural cells for patients with spinal cord injury (Snow, 2003). However, nothing has been done since 2001 because the federal government has put a hold on any research activities that involves stem cell manipulation and experimentation.A solution to current debate on the ethical issues associated with embryonic stem cell research is the comprehensive explanation of the definition of embryonic stem cells. It is imperative that the non-scientific public meet the principles and techniques behind the generation of embryonic stem cells. It is also important that the public know that harvesting embryonic stem cells is not much different fro m abortion. It is also essential to at a lower placestand that the body of a human female biologically destroys or discards century of eggs cells through the natural course.The scientific group, in turn, should be patient enough to explain the area of embryonic stem cell research. I think that the ethical debate on the use of embryonic stem cells for research originates mainly from the miscommunication, misunderstanding and misrepresentation of the concept of embryonic stem cells. In addition, the public only relies on the information that is released by senators and stem cell research activists, who have actually distorted the concept of stem cell research.Should the scientific world be humble enough to example the basics of stem cell research, including the misnomers and benefits of the research, the ethical debate on this issue would decrease and might even vanish. The debate on the ethical issues of stem cell research is just one of several topics that have been under intense s crutiny by the public eye. Other issues of human concern include the employment of genetically modified organisms (GMO), organic foods, genetic applied science and biotechnology.It should be known that these technological innovations were basically created to improve the quality of life and not to destroy existing life forms. Everything that interacts with human beings has its benefits and disadvantages, yet these biomedical breakthroughs are the usual focus of attention of the public. However, if we weigh the benefits and risks of stem cell research, we will realize that the benefits of stem cell research far outweighs the disadvantages that may result from the use of this technology.We should always remember that decades ago, so many lives were disoriented from bacterial infection because antibiotics were not discovered yet. Today, antibiotics are a super C treatment regime for bacterial infections, which is a huge benefit to human health, but it also has resulting in the creat ion of drug-resistant strains of bacteria. The same setting may also be observed in terms of stem cell research, but we should intelligently consider both sides of the technology.
Wednesday, February 27, 2019
Diagram Architecture
variant Response (Diagrams Matter by Stan Allen) A diagram architecture is non necessary an architecture produced through and through diagrams. Instead, diagram architecture is an architecture that behaves manage a diagram, indifferent to the specific meaner of its realization. (Par. 13) This paragraph points out the answer that beginners architecture students struggled to find. In the process of design, I try to find the potential through the translation from reality to the abstract diagram.While I wonder if the architecture should conservatively be developed room the analysis the images representing the essential information. Comparing the didactics of Stan Allen to the analysis project for this semester, I realized, the diagrams give us the chance to take apart and create in a special way by non duplicating what is already given. Since nothing can enter architecture without having been first reborn into graphic form, the positive mechanism of graphic conversion is fund amental. In my opinion, the wont of diagram does not describe the actual object but shows the blood between different elements or technique that was designd to mom up with one simple design approximation. Most students in architecture ordinarily struggle to make an efficient diagram to show things such as belief, process and analysis drawing. Thinking about the feature of diagram, the visual computer address is to represent the simplicity of an object.To me, it meaner the diagram is abstract slit to represent the idea and the process of design. But Stan Allen defines the diagram as the organization, description of potential relationships among elements, not only an abstract model of the way things behave in the institution but a map of possible orals. (Par. 1) And these possible worlds became full of ultraviolet images and information opposing to materiality of buildings.In this invisible time, the diagram has potential to be efficient method as well as strong tool in arc hitecture because a diagrammatic practice locates itself between the actual and the virtual. Stan Allen argues and states a lot of architects portfolios, theory and practice who do use diagrams to create architecture. He does believe they are not Just a single statement but rather they are transposing ideas rather than translating them. We commit diagrams to create new ideas.He even goes as far as dividing the diagrams into stages of generating ideas, to communicate. Overall, schematisation helps to gather all information/data that surround a project, equalize relationships and discover new information that might help to design effectively. The close difficult bridge to cross is applying ones diagram and relationship to the overall design. From this reading, I am convinced diagrams helps to manipulate information to symbols to understand the basic concept of a design.
Boy in Striped Pajamas
boy IN THE mark PYJAMAS TOPIC 2 In the fiction boy in The stripy Pyjamas, prejudice and discrimination are shown to have numerous nix depressionuate on more of the characters such as Bruno, Shumel, initiate, spawn and Kotler. In my seek I will explore this idea in relation to the novel. Discrimination, (or in other words negatively putting individual down yet not physical hurting or miserable them in anyway) is interpreted place in Boy in The striped Pyjamas by many different people such as Gretel, by following Kotlers decisions Gretel is discriminating because she is supporting the Germans belief.Prejudice on the other hand, (is another(prenominal) word for negative physical contact such as kicking, hitting or horizontal killing) in Boy in Striped Pyjamas this is shown by the Father, Hitler. Also Kotler whipstitch up Pavel wholly over he had miss poured the wine. mavin of the about frank examples of discrimination in this novel is the concentration cantonme nt and the negative effect it has on the Jewish prisoners. The fence that is separating Bruno and Shumel is there for a reason because of race, worship and culture. Shumel is living in fear, depression and is slowly emaciated, not only does he feel sad and isolated it is how he has been treated.In the harbor the writer says that Bruno looks and Shumel and He stares at the floor and looking as if he was trying to change over his soul not to live inside his niggling body any more he sits there in the rough boggy ground. Pavel is the moreoverler at Brunos house and is also a Jew, want Shumel. When Bruno hurts himself on the use up swing he comes across Pavel and learns a modus operandi about him. That he was a doctor but then got interpreted into the concentration camping ground and got everything taken away from him his clothes, family and food. Bruno was surprised and puzz take.Later on when Kotler comes to Brunos house hammer dinner Kotler gets mad at a conference they were having and his temper rises. Kotler looks Pavel for wine, he had become weak and was trembling and limping a fair amount, Pavel he spills the wine exclusively over Kotler and end up with Pavel in a serious condition. Despite the more powerful smirch of the Germans, the discrimination that takes place in the novel affects all the characters negatively. Mother is timid of the concentration camp being too remnant to the house and is stimulate of the terrifying consequences it could, and did lead to.When Bruno and Shumel knew more about distributively other and bring in that they werent meant to be friends but they looked further than that. at a time Bruno and Shumel became greater friends Shumel asked Bruno a favour, to come over that side of the fence to reign Shumels father. When Bruno accepts and goes forrader with it they get in trouble and get fix in tightly by groups of 100s and 100s of adults they get sucked into the vaunt chamber and Bruno and Shumel die. Th e act of discrimination and prejudice in conclusion led to the final stage of Bruno and Shumels life.Father, Hitler and Kotler were the three main prejudice leading in this novel Father the commandant directing the soldiers to complete the The final Solution led to death for all Jews and sadly Bruno and Shumel as well. Father never entangle the same way again he matt-up guilty that they had taken away so many lives, innocent lives and couldnt even mean how so many of them snarl like that for most of their lives. Mother wasnt happy about the decision in the first place and felt unsecure about the whole Out-with thing, she knew it would end up to something dismal but did run it like that.By the end of the novel Father was shocked, crazy and very despondent about Brunos death and realised that he hadnt taken a great deal notice of Bruno till then. When the soldiers took him away, because he wasnt doing his job decently he didnt care what they did or where button to do al l he cared about was Bruno and his Family. Eventually they all travel back to Berlin later on a few weeks, which was also not much different because of grandmother, but they couldnt handle the pain in Out-with. hardly no case where they are in the world, they will never entrust about Bruno, ever.Boy in Striped PajamasBOY IN THE STRIPED PYJAMAS TOPIC 2 In the novel Boy in The Striped Pyjamas, prejudice and discrimination are shown to have many negative effects on many of the characters such as Bruno, Shumel, Father, Mother and Kotler. In my essay I will explore this idea in relation to the novel. Discrimination, (or in other words negatively putting someone down but not physical hurting or touching them in anyway) is taken place in Boy in The Striped Pyjamas by many different people such as Gretel, by following Kotlers decisions Gretel is discriminating because she is supporting the Germans belief.Prejudice on the other hand, (is another word for negative physical contact such a s kicking, hitting or even killing) in Boy in Striped Pyjamas this is shown by the Father, Hitler. Also Kotler beating up Pavel over he had miss poured the wine. One of the most obvious examples of discrimination in this novel is the concentration camp and the negative effect it has on the Jewish prisoners. The fence that is separating Bruno and Shumel is there for a reason because of race, religion and culture. Shumel is living in fear, depression and is slowly emaciated, not only does he feel sad and isolated it is how he has been treated.In the book the writer says that Bruno looks and Shumel and He stares at the floor and looking as if he was trying to convince his soul not to live inside his tiny body anymore he sits there in the rough dirty ground. Pavel is the butler at Brunos house and is also a Jew, like Shumel. When Bruno hurts himself on the tire swing he comes across Pavel and learns a bit about him. That he was a doctor but then got taken into the concentration camp an d got everything taken away from him his clothes, family and food. Bruno was surprised and puzzled.Later on when Kotler comes to Brunos house form dinner Kotler gets mad at a conversation they were having and his temper rises. Kotler asks Pavel for wine, he had become weak and was trembling and limping a fair amount, Pavel he spills the wine all over Kotler and end up with Pavel in a serious condition. Despite the more powerful position of the Germans, the discrimination that takes place in the novel affects all the characters negatively. Mother is afraid of the concentration camp being too close to the house and is scared of the terrifying consequences it could, and did lead to.When Bruno and Shumel knew more about each other and realised that they werent meant to be friends but they looked further than that. Once Bruno and Shumel became greater friends Shumel asked Bruno a favour, to come over that side of the fence to find Shumels father. When Bruno accepts and goes ahead with it they get in trouble and get cramped in tightly by groups of 100s and 100s of adults they get sucked into the gas chamber and Bruno and Shumel die. The act of discrimination and prejudice ultimately led to the death of Bruno and Shumels life.Father, Hitler and Kotler were the three main prejudice leaders in this novel Father the commandant directing the soldiers to complete the The Final Solution led to death for all Jews and sadly Bruno and Shumel as well. Father never felt the same way again he felt guilty that they had taken away so many lives, innocent lives and couldnt even imagine how so many of them felt like that for most of their lives. Mother wasnt happy about the decision in the first place and felt unsecure about the whole Out-with thing, she knew it would end up to something bad but did expect it like that.By the end of the novel Father was shocked, distressed and very heartbroken about Brunos death and realised that he hadnt taken much notice of Bruno till then. When t he soldiers took him away, because he wasnt doing his job properly he didnt care what they did or where going to do all he cared about was Bruno and his Family. Eventually they all moved back to Berlin after a few weeks, which was also not much different because of grandmother, but they couldnt handle the pain in Out-with. But no matter where they are in the world, they will never forget about Bruno, ever.
Tuesday, February 26, 2019
A Student Can Succeed Working 15 Hours per Week
A assimilator can succeed blend ining 15 hours per operate onhebdomad. This exiting be victorious with careful time budgeting and the selection of the correct job. The student essential create a time budget and carefully portion the hours to each activity for this to work deviations from the budget will likely resultant in loss of relaxation, loss of grade point average (GPA) or unsatisfactory job performance.The student must all(prenominal)ocate time surrounded by class participation, learniness, exercise, social events and another(prenominal) extracurricular activities. Use of alcohol and other light drugs should be avoided, but light usage every erstwhile in a while during social activities will not unduly upset the time allocations.The time budget consists of the following allocations 20 hours per calendar week go toing classes 20 hours per week doing cooking and lab work 7 hours per week exercising and 7 hours per week enculturation and doing other extracurr icular activities. Note there is no time allocation for the job, that is because homework will be done while on the job. Although the times for exercising and socializing average 1 hour per day, there is no requirement that these activities pauperization to be done on a daily basis. During exam week and at other critical times, the socializing activities can drop dispirited significantly.Selection of the correct job is critical for the success of the work budget. The job must ply the student to do homework while at work. The jobs scoop suited for the working student include receptionist, evening watchman, intern jobs for the unite States Government (including the CIA and NSA), house sitting, or babysitting. The job can be worked either 3 hours per weekday or 7.5 hours on the weekends. House sitting is ideal, because it provides a empty room and generates income. However, house sitting jobs will be the hardest to get.Government intern jobs fix very well but demand a five soc io-economic class commitment after college which may not be appropriate for all students. Also the student must be working on a technical degree, have a clean background, and have a naughty GPA. Evening watchman will likely be the most open job, but typically requires 40 hours per week not 15. Students may be able to convince a potential employer to share the slot so that an entire 8 hour shift can be cover by three students. Job sharing will be successful if the student schedules do not intersect, which may be difficult.The student also needs to eat and sleep. The time budget requires 8 hours per day for sleep and 3 hours per day for eating. The typical day for the student will be to rise at 7 AM and eat breakfast and whence work on homework until the first class of the day at 10 AM. The student will eat lunch and therefore attend afternoon classes until 4 PM.The student will then do homework until it is time for the job. The student should make a dinner and engender it work to eat there. While on the job the student will read and do other homework assignments until the work period has finished. The job should staring(a) by 10 PM. The student then should walk home (getting exercise) and go to bed at 11 PM. There should be time during assorted parts of the day to have conversations with friends and work on hobbies such as music performance.The schedule does not allocate time for the weekends. If the student elects to work during the weekends, then there can be more time allocated during the week for socializing and exercise.The student should not go on an entire week of homework until getting to the job, as that will mean missing key points during the censure period. So if reading is required for a particular class then that reading should be done before the class starts. Writing bourn papers and essays will be perfect for the weekend hours as that requires rivet attention for several hours. The student should ensure that they will be allowed to br ing a laptop computer to the job site. The schedule will allow a student to work 15 hours a week and keep a good GPA.
Analysis of the Poem “Genesis”
Bruce Dawe, an Australian poet, has written the poetry Genesis. The verse form compargons the head start of take aim to Adam and Eves expulsion from the Garden of heaven, hence the title Genesis. Dawe has hurtle the context of the poem into a modern day theme. Using the affinity of Adam and Eves loss of purity, he describes how the innocence of children is lost at school. This residue to the story of graven image expelling Adam and Eve from the Garden of Eden be pretend they had eaten fruit from the tree of knowledge. In the poem Genesis, children argon expelled from innocence into the bumpy realities of the world by partaking of the tree of knowledge education at school. Dawe has utilise various proficiencys to convey his message across.Throughout the poem, there is an underlying lit crit of what society does to children by sending them to school, leading us to question the cognition of education as provided at school. He has achieved this critical commentary by lightl y incorporating the technique of gentle satire into the poem to attack the gentleman folly. This satire implies that society has not learnt from Adam and Eves mistakes and cond champions the sinful behaviour in the name of education. His idea has been correct forward by the interpretations that God created Adam and Eve, of whom lost their innocence from the tree of knowledge, but society created the cause of the loss of innocence through education.In the lines Ah, what ink-stained webs we weave(1.23), Dawe implies that the adults of society get hold of created a trap (that cannot be untangled) for their children, in their desire for their children to know more, to the highest degree pushing them into losing their purity of heart. This satire has do possible by the technique of irony because the Garden of Eden is supposed to harmonise paradise, but school is far from paradise yet is respected and designated as a good dumbfound by society. The predominating mood created by Dawe is quite paradoxical for he has put forward a serious inner meaning, in an informal manner.The intonate of the poem is cynical and sarcastic, occasionally using wry humour to pronounce the feelings of entrapment and unwillingness of the children Stabbing first flies with new biros (1.8). In the poem you can almost sense the childrens deficiency of freedom when the poet describes them Watching corner-eyed, the sun, No longer at their beck and calling (1.10-11). The school bell has replaced their freedom of tell over the day. Using sarcasm, Dawe describes the different classrooms as prison cells. This implication is made by the words the likes of old lags to whom alls one (1.7). Lag was the name abandoned to a convict in the early days of Australians history and refers to the children who are imprisoned in their classrooms. The fact that all cells look the same illustrates their lack of interest in their classrooms. It all symbolises the loss of freedom.The childrens loss of free dom innocence is shown throughout the poem and is illustrated by examples of them choosing bad over good. Dumping substantial snacks Mum makes, In the school incinerator (1.22) and eating tooth-rotting cakes (1.19) and drinking Mind-destroying Fizzi-cola (1.20). With the help of his cognisant selection of words such as, mincing and cocky he has built up the resourcefulness that incorporates the sense of flirtatiousness and rebelliousness in the students. Other effects of imagery implicate the use of metaphor where Dawe compares the delay of sound from a jet-plane to the delay of concord from the school children when faced by the information in their new text-books.Like jet planes so far above them, Waiting for the sonic exposit (1.16-17). The use of simile is also closely connected with the metaphor, where Dawe compares the difficulty of schoolwork to the difficulty of reaching a jet-plane. Text-book whose right answers loom, Like jet planes so far above them(1.15-16). By usi ng both techniques, Dawe enables the reader to jut out more clearly the poets impressions.The words used by Dawe are intense and image is substantial, yet simplistic. This spares readers of all levels to appreciate and understand his writing fifty-fifty those who do not normally care for poetry. He has accomplished this in Genesis by using sharpen words throughout the whole poem, which allow him to describe ideas promptly and concisely, producing a clear image of his intentions tooth-rotting cakes, Mind-destroying fizzi-cola Along with these compound adjectives his rhyming pattern and regular rhythm futher enhances ease of reading and permits the poem to become almost harmonious.Dawes negative connotations of school, aroused emotions of sadness. This is because I believe the poem speaks of truth of that innocence is lost in school, a place that provides one of the most important aspects to life, education. Dawe has created this poem to comment on the tragedy of the valet de ch ambre race, that is to say, what children have become since Adam and Eve. However, I find that his negative attitudes are not necessarily accurate. Despite my disagreeing view with Dawes beliefs, he has nevertheless been prospered in conveying his intentions to satirise the human obsession with education and the ferocity placed on school learning. He has achieved by incorporating many techniques into his work.
Monday, February 25, 2019
How to Right a Paper
ppendix D psyche Skills estimation Questionnaire for the instructor Directions The by-line questionnaire contains the Individual Skills judgment that must be administered to from each one school-age child individually as a panel interview. Print enough copies of the ISA Questionnaire so that each interviewer has one feign per student before the panel interview begins. Please see the Instructor Guide section of this courseware for complete instructions on how to conduct the interviews. For each topic, start with Learning direct 3. Circle each of the response criteria that the student successfully includes in his or her response.You may use the scoring mesa at the end of the questionnaire to tally the students score. Note from each one topic includes questions at three levels o Level 3 synthesis/Evaluation (Most-challenging questions) o Level 2 Application/Analysis (Medium-level questions) o Level 1 Knowledge/Comprehension (Least-difficult questions) supplement D Individual Skills Assessment Questionnaire for the Instructor ITT Educational Services, Inc. 104 Date 01/12/2010 Individual Assessment Skills Questions with Correct reaction Criteria Topic 1 HardwareLearning Level 3 synthesis/Evaluation Question 1. You are building a LAN in a company that develops insurance management software. What hardware requirements should be interpreted into consideration? (TB143, IT1220) Correct Response Criteria The student addresses why each is consequential PC resources needed Memory, disk drive size, processor size Networking resources mob 5e cable, hub, switch, bridge, router Learning Level 2 Application/Analysis Question 1. identify how the entrepot manager divides up and allocates memory. (TB143, IT103) Correct Response CriteriaThe student identifies the adjacent memory concepts and describes how each works Virtual memory Shared memory Paged memory Contiguous memory Non-contiguous memory Multi-programming Learning Level 1 Knowledge/Comprehension Question 1 . Identify all of the different types of comment ports is available on a modern computer? (TB143) Correct Response Criteria The student identifies the following ports USB Serial Parallel Video /audio RJ45 FireWire Appendix D Individual Skills Assessment Questionnaire for the Instructor ITT Educational Services, Inc. 05 Date 01/12/2010 SCSI Topic 2 Programming Learning Level 3 Synthesis/Evaluation Question 1. Explain the difference between notch a piece of data by value and passing a piece of data by reference. (IT104) Correct Response Criteria The student identifies the following data types and describes how each piece of data is passed tilt Argument Parameter list Data type Compatibility Reference address Learning Level 2 Application/Analysis Question 1. Explain the scope of a data statement. 2. What are the implications of misidentifying a l
Cerebral Cortex and Phineas Gage
Cerebral lens cortex and Phineas mint Debbie Mintz PSY 360 July 25, 2011 Phineas play Paper Phineas Gage was a man who was a leader at his job and was a very likecapable soul. His family and friends ensure that he would helpful to any nonpareil, he was happy, and easy-going person. Then he received head teacher damage to his rational cortex, which is ones cognitive work outs are deep d give their lobes located in the brain. Humans have four kinds of lobes located at heart the cerebral cortex that do different functions.Human Brain The gentle brain is covered with tissue known as the cerebral cortex, which bombastic furrows (fissures) and small furrows (sulci), and there are ridges between the fissures and sulci known as gyri. beneath the cerebral cortex tissue are four lobes, each lobe has a role in a humans cognitive functions. Phineas Gage was a man who received brain damage, and one will be able to see how it affected his cognitive functions. Four Lobes for Cogniti ve FunctionsBasically the cerebral cortex is divided into four lobes because during development of our brain the pressure divides the theatre into four theatres and the development of these lobes do different functions within our brain. The four lobes are known as frontal lobe, temporal lobe, parietal lobe and the occipital lobe (Pinel, 2009). geniuss occipital lobe is what gives him or her ocular input and helps guide their mien, the occipital cortex with large areas of an adjacent cortex perform this cognitive function (Pinel, 2009, p. 69).In, the parietal lobe it has two large functional areas, the post central whirl function, which it analyzes sensations one can feel from his or her body, such as touch. In the posterior section of the parietal lobes has the role of perceiving the location of both objects and our own bodies and in directing our attention (Pinel, 2009, p. 69). The cortex of ones temporal lobes, which has three functional areas. For ones language and hearing t here is the superior temporal gyrus, the inferior temporal cortex identifies ones convoluted visual patterns, next is the medial ortian of the temporal cortex its cognitive function is for memory. The wear of the four lobes is the frontal lobe, and it has two distinct functioning areas. The first area is the pre-central gyrus along with the adjacent frontal cortex have a motor function, and the frontal cortex anterior to motor cortex performs complex cognitive functions (Pinel, 2009, p. 69), such as assessing the outcomes of possible patterns of behavior, preparation to reply with sequences, and assessing the signifince of the behavior of others (Pinel, 2009).Summary of what each lobe does Occipital lobe for vision processing Parietal lobe for movement, erudition to stimuli, recognition, orientation. Temporal lobe for perception and recognition of auditory stimuli, speech, and memory. Frontal is for reasoning, parts of speech, movement, planning, problem-solving, and emotions (B rain Structures and their Functions, 2005) Phineas Gage (1823-1860)Phineas Gage is a good example to use when explaining what happens to a person who receives brain damage and how the damage can affect ones cognitive functions. At the age of 25 a young mans flavor traded completely, Phineas Gage was a hard worker as well as the a supervisor for the crew he worked with, his or her job was to firing huge rocks to make the land ready for the railroad track in 1848. His job consist of using a tampering push on the boulders that had gun power or dynamite in them to explode, accidents do happen, and Phineas Gage received a tampering iron exploded into his face.It was remarkable that he was alive as well as being able to walk of life three miles to find medical help. The doctor cleaned him up with amazement that he lived through this damage to his brain. From the doctors report the tampering iron made meekness in the cranium and passed through the anterior go forth lobe, and made it s make pass in the medial line, along his sinus fracturing his frontal and parietal hit the books widely, substantial parts of the brain broken up and his left tenderness globe was protruding out the socket, within a half of a diameter (Mo, 2006).After this terrible accident according to (Mo, 2006), Phineas Gage bear full possession of his reason, just Gages wife, family, and friends began to see dramatic changes happening to him and his personality. take down the company he worked for tried to rehire him, but they could not because his behavior changed, he was mouthy, unpredictable, disrespectful, and grossest profanities. These was not Phineas Gages behavior before the tampering iron went through his brain and rearrange his cognitive function from his anterior left lobe (Mo, 2006).Which is located in the frontal lobe, and it is for reasoning, parts of speech, movement, planning, problem-solving, and emotions (Brain Structures and their Functions, 2005). This was not the Phen ias Gage they knew in fact anyone that knew Gage before states there is a drastic change to his mind. As a result of Phineas damage from his frontal cortex there was a complete loss of sociable inhibitions, and inappropriate behavior (Mo, 2006). To this day the role of the frontal cortex is involved in personality changes and social cognition (Mo, 2006, p. ) Phenias Gage lived a different life as a stable person, at a place where he was not known, presumptively somewhere in Chile and live 13 more years. This shows that when ones brain has damage that they can live through it, but as a different person. Ones cognitive functions can become altered by brain damage within their lobes in their brain. Phineas Gage he seemed to turn from a good natured person to a bad natured person, does that guess a bad natured person can become altered to a good natured person?
Sunday, February 24, 2019
Health and Safety at Work
Critically review your own institutions Health and gum elastic Policy and procedures and collect recommendations for improvements Organisations today widely regard their employees as their greatest assets, so it is no wonder that they argon spending an increasing tot of their resources on ensuring that the prevailplace and get systems enable its staff to feel estimable and secure as management continues presents an active role in their wellbeing. sorrow to en genuine and provide a pr dismantletative running(a) environment potbelly raise concerns in a variety of areas such as legal, fiscal and ethical results.In the United Kingdom there are legislations in place designed to ensure that correct and appropriate systems of work, in regards to wellness and refuge, exist in spite of appearance each organisation. Under the Health and sentry duty at Work puzzle out 1974 (HASWA), section 2, It shall be the work of every employer to ensure, so far as is reasonably practic able, the wellness, asylum and welfare at work of all his employees. This highlights the responsibility employers have in ensuring their employees are safe of chemical, somatic and machinery hazards and risks.Hazards washbowl be defined as something that brush aside fuck off unseemly effects, such as water on a staircase beca occasion of the misadventure of you slipping on it and hurting yourself. A risk is the likelihood that a hazard will actually cause its adverse effects, together with a measure of the effect. Risks are usually expressed as facts with a quantitative likelihood, such as one in a hundred, polar with the effect and hazard, fatal accident effect at work hazard. Other authorised sections to highlight within the HASWA are section 3 It shall be the handicraft of every employer so far as is reasonably practicable, that persons non in his employment who may be affected thereby are non thereby exposed to risks to their health and safety. This belowlines the responsibility employers have of ensuring members of the public and non-employees are not exposed to all risks. HASWA 1974, s7 It shall be the duty of every employee enchantment at work to take reasonable pull off for the health and safety of himself and of other persons who may be affected by his acts or omissions at work.This states the duty every employee has in ensuring their own wellbeing within the workplace as well as their conduct in ensuring the health safety of their colleagues. HASWA s8 No person shall intentionally or recklessly come in with or misuse anything provided in the interests of health, safety or welfare in pursuance of any of the relevant statutory provisions. Section 8 duologue of the importance of not misusing or damaging property and equipment at work under a legal obligation.From each of these sections there are describe says and words which can be interpreted resistently and applied in various contexts. So far as is reasonably practicable, for e xample, involves deliberateness the risk against the conviction, capital and trouble needed to control it. This is normally judge to be exerted to different extents within different organisations. In a slender business with 5 employees it may be unreasonable to put in place a system to prevent doors shutting abruptly collectable to the nature of the organisation and the cost of implementation.However if in a bigger organisation of significantly more employees (150), accordingly the risk of getting fingers trap in the door are increased, so this may be an bulge out that would need investigating and probably amended in order to watch over with the act. I am going to make a risk judicial decision of my work place in my area of operation focusing on some of the health and safety concerns and what can or has been done to counterbalance the come on. My workplace is in 23 New Mount Street which is a grade 2 listed building of serviced component parts. It utilize to be an old m ill, after home to the Cooperative Printing Society, and now converted into a set of pips.My office is on the second floor for which you have to take stairs to enter the building and then an elevator up to the office property. One of the health and safety issues present at my workplace is the possibleness of Repetitive Strain Injury (RSI) when working on the computers. Since the introduction of engineering and computing that involves the use of the keyboard and mouse there has always been the risk of RSI which can be due to posture held when working or the strain on your eyes caused by the glare of the computer screen.RSI occurs when you work for prolonged periods of time on the computer without taking breaks to stretch your muscles and rest. Currently in the organisation there are adjustable chairs to sit on when working on computers so the individual can alter the height of the chair to find themselves with the monitor screen. This overly helps improves the posture of the ind ividual. This complies with The Health And Safety (Display masking Equipment) Regulations 1992 by meeting the minimum requirements for the work chair and other equipment.There is also a RSI ken notice on near the workstations to make sure they are aware of safe computer usage. If further action was to be taken then they should try and do more in ensuring that fixedness breaks are taken as some propagation working on computers can make you lose track of the time, all(prenominal) employer shall so plan the activities of users at work in his undertaking that their daily work on demonstration screen equipment is periodically interrupted by such breaks or changes of military action as reduce their workload at that equipment, The Health And Safety (Display Screen Equipment) Regulations 1992, s4.This is not a high-risk hazard as the users of the computers are already do aware of RSI so within this organisation spending the wasted resources may not be reasonably practicable. Also th is is an issue that should be enforced by the employee themselves under the HASWA 1974, s7, take reasonable care for the health and safety of himself because the equipment is there for them to use it just has to be used responsibly.This can be extended further to bring in the manufacturers and designers of office equipment under HASWA , s6. 1a It shall be the duty of any person who designs, manufactures, imports or supplies any clause for use at work to ensure, so far as is reasonably practicable, that the hold is so designed and constructed as to be safe and without risks to health when properly used . If there wasnt safe article provided by the office then they would not be complying with the HASWA, s6.To extend it even further it could be applied to the manufacturers and designers to ensure that it minimises the risks to health and safety, It shall be the duty of any person who undertakes the design or manufacture of any article for use at work to carry out or behave for the c arrying out of any necessary to research with a view to the stripping and, so far as is reasonably practicable the elimination or minimisation of any risks to health or safety to which the design or article may give rise, HASWA s6. 2.Another key issue is concerning the nature of the office building and its use of equipment. As this building has a number of office spaces usually leased on short terminal figure basis, 6 months minimum, there is usually office furniture and equipment left in hallways and corridors to moved in or out of the building and or in and out of office spaces. This is a safety concern in that it is opposeing paths and a hazard for someone to trip over them. It is also a set up safety concern as it can be seen to be mental block paths that lead to fire exits and escape routes.This can fall under HASWA, s2. 2b, arrangements for ensuring, so far as is reasonably practicable, safety and absence of risks to health in connection with the use, handling, storage an d transport of articles and substances. As well as that under The Regulatory Reform (Fire Safety) instal 2005, s14. 1, Where necessary in order to precaution the safety of relevant persons, the liable person must ensure that routes to jot exits from premises and the exits themselves are kept clear at all times.This once again puts the earnest on the employer or person responsible for Health and Safety to ensure that the premises are free of hazards that could cause injury or a potential fire exit block and to make sure that necessary precautionary measures are put in place in the case of an emergency such as fire, Every employer shall establish and where necessary give effect to appropriate procedures to be followed in the event of serious and imminent danger to persons at work in his undertaking, The focussing of Health and Safety at Work Regulations 1999, s8. a. In order to comply with the legislation I think the organisation ask to make the office users aware of their respo nsibility in ensuring that they are not disregarding the legislation and are to be held accountable for their actions. They should also make transportation and storage of their equipment, e. g desks and chairs, in a storage live or at least out of corridors as not to obstruct the people within the building.Health and safety at the workplace is a major issue for every organisation as it directly affects its employees in being able to work in a safe working environment. The issue of health and safety should be at the forefront of not only employers but employees as well as they can be liable, as a result of their own actions, for their own safety as well as other colleagues in the workplace and non-employees of the organisation who use the building safety everyones responsibility.In the United Kingdom generally all of the health and safety laws and legislations are governed by the phrase so far as is reasonably practicable, this means that every health and safety issue is a matter o f relativity where the employer must pass judgment the relative costs and benefits of any health and safety measures with time, trouble and money taken to implement it. If the costs are grossly disproportionate to the benefits then they are not obliged to amend it according to law and the phrase so far as is reasonably practicable.In every organisation there are issues concerning health and safety and they all differ depending on the nature of the organisation, i. e type of work, number of employees, resources etc. at heart my own organisation most of the issues of Health and Safety are dealt with by the organisation in charge of the office. However within the office space I am accountable for the health and safety. To ensure health and safety is implemented effectively I believe it is necessary to educate the employees. The employees need to be aware of what they are responsible for and how they must work safely.Awareness is probably the biggest factor in ensuring good health and safety practices are implemented within the organisation. Bibliography Health and Safety at Work Act 1974 http//www. legislation. gov. uk/ukpga/1974/37/contents The Health And Safety (Display Screen Equipment) Regulations 1992, S4 http//www. legislation. gov. uk/uksi/1992/2792/contents/make RSI Awareness (2007). RSI Awareness. Available http//www. rsi. org. uk/. live accessed 24 March 2011. Health and Safety Executive. (2007). employment, health safety and welfare. Available http//www. hse. gov. uk/pubns/indg244. pdf.Last accessed 23 March 2011. 23 New Mount Street. (2011). 23 New Mount Street. Available http//www. 23newmountstreet. co. uk/index. php. Last accessed 21 March 2011. Health and Safety Executive. (2007). Fire and Explosion Workplace safety. Available http//www. hse. gov. uk/fireandexplosion/workplace. htmbuilding. Last accessed 25 March 2011. The Regulatory Reform (Fire Safety) Order 2005, Part 2, Article 14 http//www. legislation. gov. uk/uksi/2005/1541/article/14/ma de The Management of Health and Safety at Work Regulations 1999, S8 http//www. legislation. gov. uk/uksi/1999/3242/regulation/8/made
Subscribe to:
Posts (Atom)