Saturday, May 23, 2020

Empathy for the Character Hamlet in Hamlet by William...

Empathy for the Character Hamlet in Hamlet by William Shakespeare I believe deep down everyone has felt like they themselves where Hamlet. They can empathize with some of the emotions Hamlet was feeling, the grief and the sorrow, the abandonment and resentment. Not many carry their fantasy as far as Hamlet did. Shakespeare wrote of a man who had to face the great loss. Not the loss of his beloved father or of his lover Ophelia, but he lost himself in a world of make-believe where he could regain the control that he lost in his life. In the beginning Hamlet comes home to mourn the passing of his father. Then within two months the Queen, Hamlets mother, marries the brother of her old husband. This enrages Hamlet. His mother†¦show more content†¦It was as his friends had said; it did appear to be his fathers ghost. The one thing that changed Hamlet then happened. The ghost looked at him and divulged his secret. He told a story that a serpent crept into his garden while he was asleep, and that the serpent that did sting thy fathers life, now wears his crown. (I, v, 39) Hamlet did not take this news lightly. He could not believe his uncle could and would kill his father. The ghost then forced Hamlet to swear to get revenge. Hamlet cannot shake the feeling that the ghost might not have been who he said to be. So he conjured up a devious scheme. He decided the only way to get the information he wanted without looking like he was committing treason was by acting completely crazy. He asks Ophelias father if he had a daughter, and he walks around spouting nonsense. Polonius runs to the king and queen to tell them the very cause of Hamlets lunacy. (II, ii, 50) He claims Hamlet is crazy because of his undying love for his daughter. That Hamlet could not handle it when he told his daughter to ignore him. The king bought it but I think the queen knows her son better than the story would have you believe. Hamlet believed the only way to get the truth about his fathers suspicious death was by getting a reaction out of his uncle. He came up with an idea of a play where the characters acted a scene like what happened in real life.Show MoreRelatedShakesperes Hamlet and Humanism Essay885 Words   |  4 PagesHamlet and Humanism William Shakespeare, Hamlet, demonstrates human nature to be gluttonous, self-involved and merciless. Claudius is determined by his greed to commit murder. Polonius is always watching out for himself, without a care of the expense of anyone that gets in his way. Hamlet ponders only of retaliation from the second he finds out about Claudius murdered his father. Human nature has been several things throughout time, but it has also changed throughout the years. People can be immoralRead MoreShakespeare s Madness : A Timeless Reflection Of Society1535 Words   |  7 Pagesdementia, and psychosis; however, these illnesses prove not to be the exact cause of the various downfalls to the characters throughout the play Hamlet. The author, William Shakespeare, depicts a different type of insanity in the play, one that seems ambiguous but also feels eerily similar to ones that still affect others to this day. Shweta Bali, author of Mechanics of Madness in Hamlet, Macbeth, and King Lear, reiter ates this by stating, â€Å"Insanity—real or obfuscated—is integral to the fiber of manyRead MoreThe Gravedigger and the Inevitability of Death in Shakespeares Hamlet1397 Words   |  6 PagesHamlet:   The Gravedigger and the Inevitability of Death From the appearance of the Ghost at the start of the play to its bloody conclusion, Hamlet is pervaded with the notion of death. What better site for a comic interlude than a graveyard? However, this scene is not merely a bit of comic relief. Hamlets encounter with the gravedigger serves as a forum for Shakespeare to elaborate on the nature of death and as a turning point in Hamlets character. The structure and changing mood of the encounterRead MoreThe Significance of Death and Sex to William Shakespeare1482 Words   |  6 PagesThe Significance of Death and Sex to William Shakespeare In this essay, I will consider Death and Sin in Shakespearean drama and I would like to look at three of Shakespeares tragic plays: Hamlet, Othello and King Lear. Shakespeare uses many themes in all his play that attract audiences throughout history. The things he wrote about are as relevant now as they were in his time. Death and Sin were issues that are always around. In his plays, Shakespeare could comment on these things andRead MoreWilliam Shakespeare s Hamlet And Franco Zeffireli s Film Version Of The Story1216 Words   |  5 Pages William Shakespeare’s Hamlet and Franco Zeffireli’s film version of the story are different in many ways, but the basic characters and basic plot remain the same. Franco Zeffirelli’s screenplay is an edited, re-vamped version of the original tragedy in which lines are cut and scenes are modified. Additionally, Zeffirelli modifies Shakespeare’s ghost scenes and uses narrative and film techniques to both create an overall suspenseful atmosphere and generate empathetic feelings towards Hamlet. TheRead MoreThe Consequences Of Characters In William Shakespeares Hamlet1011 Words   |  5 PagesSet during the middle ages, William Shakespeare’s tragic drama Hamlet recounts the exploits of a young and enigmatic prince as he seeks to avenge the murder of his father, the King of Denmark. Prince Hamlet, overcome with feelings of anger and grief, embarks on a mission to kill Claudius, his uncle and successor to the Danish throne, whom he believes killed the D anish patriarch. Emotionally damaged by his father’s death and betrayed by those he loves, Hamlet becomes overwhelmed with anguish andRead MoreThe Sanity Of William Shakespeare s Hamlet1938 Words   |  8 Pagesmodern day society. There is a significant increase of mentally ill characters in modern texts. Throughout history, critics have found characters that have mental disorders that affect the play primarily because characterizing a protagonist or antagonist as mentally ill brings depth to the character’s essence. Many acclaimed critics question the sanity of the protagonist in one of William Shakespeare’s most famous plays, Hamlet. The question of Prince Hamlet’s sanity divides readers into two differentRead More Gertrude: The Tragic Heroine of Shakespeares Hamlet Essay3348 Words   |  14 PagesGertrude: The Tragic Heroine of Hamlet    Hamlet is perhaps English literatures most renowned play; a masterwork by the greatest of all masters, Shakespeare, from its very appearance Hamlet has not ceased to delight audiences and confound spectators. The complexity of the main character, prince Hamlet, is so vast that all who have attempted to decipher his character fulsomely have failed. Amidst his own grandeur, Hamlet makes the other characters pale. As they blur into literary oblivion dueRead MoreHis Moorships Ancient: Iago as the Protagonist of Othello1658 Words   |  7 PagesShakespeare is universally revered for his characterization of flawed and psychologically unstable protagonists. Hamlet is a crazed, murdering prince, Lear is narcissistic, senile, and a verbally abusive father, and Macbeth is a murderous traitor to his king and country. These unfavorable and evil attributes serve Shakespeares main characters by presenting them as realistically written men, and there always seems a degree, however small, of sympat hy associated with their respective downfalls andRead MoreThe Tragedy Of Hamlet By William Shakespeare1777 Words   |  8 Pageslearn the truth The Tragedy of Hamlet is one of the most confounding works ever written in the English language. William Shakespeare, written in many different nuances with this play. There are multiple perspectives to analyze Hamlet from; there is death, mental illness, revenge, a catastrophic ending to the play. The purpose of this assignment to examine the role of Hamlet’s emotional stability and how he handles ethical dilemmas with certain characters in the play. Hamlet is not mentally ill; but is

Monday, May 18, 2020

Alternative Energy Solutions For Renewable Energy

With the ever increasing demand of fossil fuels, society has been faced with the problem of a quickly diminishing supply. We are scrambling for solutions in underdeveloped technology and overlooked industry. There is much debate on whether any alternative energy solutions are able to effectively replace fossil fuels. Even if they are, we are then faced with the problem of how renewable energy programs could be implemented and improved. There are many aspects of this debate to consider, including energy demand, financial support, and ecological factors. The push for alternative energies is essential and the need is eminent, therefore government subsidization should be made a greater priority in our nation. Over millions of years the fossilized remains of plants and animals have decayed and been stored in the form of petroleum, natural gas, or coal underground for our later extraction. This stored energy can then be burned to use as fuel (DOE 2008). Because these fuels take millions of years to form, the available supply is limited for our ever-progressing industrial society. Our usage is causing a lot of concern among the energy conscious all over the world due to the fact that many developed nations could not function without fossil fuels. The main solution to this problem goes by the name of â€Å"alternative†, â€Å"renewable†, or â€Å"clean† energy. This energy comes from sources apart from fossil fuels, this includes wind, solar, and geothermal among others (Utah 2013). TheseShow MoreRelatedAlexander Gibbs. Liberty Union High School1025 Words   |  5 Pages Alternative Energy Persuasive Essay Alexander Gibbs Liberty Union High School May 10, 2016 In today’s world, the topic of energy is dominated by one thing: ancient organic matter. Carbon and oxygen that existed in this matter when it was alive is still present and is released in the form of carbon dioxide when the coal and oil it was compressed into is burned. The problem is that the carbon that was buried over millions of years was never naturally supposed to be released back intoRead MoreEthanol Essay782 Words   |  4 PagesHow can the U.S. reduce dependence on imported fuels and diversify our energy supply? In recent months, the new focus is the investment in research and development of alternative or renewable energy. Google has announced its plans to spend tens of millions of dollars in 2008 on the project known as Renewable Energy Cheaper than Coal (Reuters, 2007). The U.S. government also has put in place two programs called, Solar Energy Technologies Program and The Wind and Hydropower Technologies Program. Read MoreImplementation Of Geothermal Energy As An Alternative Energy1459 Words   |  6 PagesTitle : Implementation Of Geothermal Energy As An Alternative Energy AHMAD HAFIZUDDIN BIN ISMAIL (EC15132) FIRDAUS BIN MAT SHUKRI (EC15133) MUHAMMAD SUHAIMI BIN MOKHTAH (EC) AMAR FAISSAL BIN KAMARUDDIN (EC15134) Faculty of Electrical and Electronic Engineering UNIVERSITI MALAYSIA PAHANG (UMP), 26600 PEKAN, PAHANG, MALAYSIA Abstract This report presents an alternative energy is any energy source that from fossil fuel. We need to turn to alternative energy in general. Firstly, we were in dangerRead MoreEssay Renewable Resources1576 Words   |  7 PagesRenewable resources are also known as alternative energy sources. Alternative Energy is any source of energy that can be renewed (Issit). Renewable Energies include hydrogen fuel, biomass fuel, hydropower, solar power, geothermic energy, and nuclear power. Hydrogen fuel is an amalgamation of hydrogen and oxygen which is used to produce electricity (Issit). Biomass fuel is made from materials which have already been used, such as compost, and can be used to generate electricity (Issit). HydropowerRead MoreOil Is The Lifeblood Of The Modern World878 Words   |  4 Pagesleft in the world’s major fields, which at present rates of consumption should last only 40 years (Lambo 1998-2016). There are ways we can reduce our intake on oil by using less oil than we need. We can use alternative energy that is renewable like wind, water, solar, and other renewable energy technologies. It took nearly hundreds of millions of years to create the world oil reserves. In less than a century, before oil became the commodity on which the world is power turned. The article writtenRead MoreShould The Uk Replace Nuclear Power? Essay1375 Words   |  6 Pagesseen as the most common alternative. Nuclear currently supplies 19% of the UK’s electricity and 11% in the world (NIA,2015). In the UK, all but one of the current nuclear plants are due to close by 2023. Should the UK replace their nuclear plants by a new generation of nuclear stations? Because of the accidents, costs and problems of nuclear waste, some people are opposed to this possibility. Their solution would be that Britain could achieve 85% of its power via renewable energy by 2030. This essayRead MoreThe Current Demand For Energy1237 Words   |  5 Pagesntroduction Europe experienced two energy crises during the 1970s, which led to escalating demand for energy resources (specifically, oil) that could not be adequately supplied (Bonny, 1987; Donatos Mergos, 1989). This led to a decrease in economic activity that reflected as a decrease in the demand for energy in the form of oil. Alternative energy sources needed to be considered in order to maintain the economic activities of society without further depleting the natural resources. Besides theseRead MoreNo Amount Of Monetary Resources : A Transition Away From Fossil Fuels, And Towards Renewable Energy Essay1031 Words   |  5 Pagesfuels, and towards renewable energy is required. To achieve this goal, deep and fundamental institutional changes are necessary. The main institutional obstacle that is blocking a transition to renewable energy is the oil sector. This sector is no small obstacle because it has deep pockets, and it is deeply enveloped in every developed country in the world. Per Muz io, natural gases make up an ever-increasing part of the world economy, and a staggering 41 percent of the energy sector [Source Muzio]Read MoreAlternative Sources Of Alternative Energy Sources1123 Words   |  5 PagesRough Draft: Alternative Energy Sources Imagine a world where sea levels have risen, a world where extreme weather happens more often and with more intensity, and a world that has very few species of animals left due to mass extinctions. (Environmental Protection Agency) But that future is still avoidable. The answer is renewable energy sources. Alternative energy sources are sources of energy that does not use fossil fuels, and generally are clean and renewable. (Jessa) Some examples include solarRead MoreOil Is The Lifeblood Of The Modern World894 Words   |  4 Pagesleft in the world’s major fields, which at present rates of consumption should last only 40 years (Lambo 1998-2016). There are ways we can reduce our intake on oil by using less oil than we need. We can use alternative energy that is renewable like wind, water, solar, and other renewable energy technologies. It took nearly hundreds of millions of years to create the world oil reserves. In less than a century, before oil became the commodity on which the world is power turned. The article written

Tuesday, May 12, 2020

Othello Analysis Othello By William Shakespeare

Riley Thompson Professor Grill LIT 200 2 November 2014 Othello Analysis Assignment Othello, a play that was written in 1604 by William Shakespeare, is an example of a type of story called a â€Å"tragedy.† Throughout the course of the work, Othello proves himself to be very easily misled, despite his heroic status. This causes him to lose his ability to make good judgments and decisions. Even though Othello had a reputation as a hero, he ends up being one of the most gullible characters in the play when he completely falls into the evil trap that Iago set for him. As the story unfolds Othello’s character evolves in an extremely tragic way as Iago manipulates him and leaves him to rot in his misery. Eventually, this leads to Othello’s suicide. As a character, Othello is tough, noble, and virtually fearless. He is recognized for his hard work as a soldier but at the same time manages to remain humble. Shakespeare makes him out to be a hero from the start of the play. For example, in Act One, Othello says, â€Å"Let him do his spite./ My services which I have done the signiory/ Shall out-tongue his complaints† (1.2.17-19). I think that this quote displays that Othello is confident enough with his value and importance to the city of Venice that he really is fearless of getting in trouble for marrying the one he loves, Desdemona. As the play progresses, Othello’s humility comes to the surface via the words he elects to use in order to explain his marriage to Desdemona. In Act One, SceneShow MoreRelatedAnalysis Of Othello By William Shakespeare Essay2413 Words   |  10 Pagesprocess, such as a process known as Classical Conditioning. Mind manipulation has been presented by villains throughout movies, novels, a nd even plays. The play Othello, written around 1603 by William Shakespeare, with the villain character Iago, is characterized as a jealous, hubris, sinister, crafty, and manipulative being. William Shakespeare has managed to write a tragic play where he used Iago’s malicious words to provide early Classical Conditioning, to cloud Othello’s mind of critical thoughtsRead MoreAnalysis Of Othello s Othello By William Shakespeare Essay2117 Words   |  9 Pages Racist Ideology As Seen In Othello As a writer, William Shakespeare possessed an uncanny ability to address topics that were, for the most part, unnoticed in society. Every one of his characters feels realistic because they are so complex and based on psychological motivations. When Shakespeare’s Othello was first written, there was undoubtedly a complicated relationship between white English citizens and so called â€Å"foreigners†. However, society’s inability to understand or accept different culturesRead MoreAnalysis Of Othello By William Shakespeare1579 Words   |  7 Pagesdiscriminated against due to your race? In Othello by William Shakespeare the theme of race is evident through out the play and is a very critical aspect towards the plot. Since Othello has a strong sense of self he is able to counter-balance the overt racism he is faced with in the beginning because he is respected and has high stature as a war general. Him and his wife lived happily without worrying what others though t of their bi-racial marriage. But, when Othello hears rumors of his wife’s possibleRead MoreAnalysis Of Othello By William Shakespeare1436 Words   |  6 PagesRasheed Patrick Ms. Milliner EES21QH-01 01/17/17 Final Paper In Othello every character has their own personalities that makes them the person they are. In Othello there are characters that show true grit, a fixed mindset, and a growth mindset. Each characters are different which makes the book even more interesting. True grit means to endure and push through to do something better no matter what it takes. An example of grit is studying for a long period of time for a test and enduring the amountRead MoreAnalysis Of Othello By William Shakespeare1240 Words   |  5 PagesRationale In Part Four of the course, Critical Study, we studied Shakespeare’s tragedy, Othello. This is a play that comprises of enduring themes of love, betrayal, jealousy, appearance versus reality, racism, and revenge. I chose to write a diary for this play because we are only presented with the facade of these characters. Throughout the play, the audience is left to wonder what goes on behind the scenes. And the only way to achieve this is to put ourselves in their shoes in order to experienceRead MoreAnalysis Of Othello By William Shakespeare865 Words   |  4 PagesHandkerchief William Shakespeare is a famous writer had written lot of poetry, stories, dramas etc. In his drama, he usually has a sad ending. He introduces a clue that diverts a character’s mind and thought. One of his plays named â€Å"Othello† he introduces a handkerchief as a clue that had diverted different characters’ thoughts. That handkerchief changed from a love token into a source of suspicion in Othello’s mind. In this story, main character named Othello, who gave that handkerchief to his wifeRead MoreAnalysis Of Othello By William Shakespeare1505 Words   |  7 PagesQuanisha Taylor Dr. Traylor English 1102 16 November 2015 Sadistic Motives In William Shakespeare’s play Othello Iago has the ability to charm and convince people of his loyalty and honesty. Iago immediately introduced his malicious desire for revenge, but he had no proven reason for his actions. Throughout the play Iago devises a devious plan to convince the other characters of his cunning contrivance. Iago treats others as the fool with no intentions of caring about their feelings. Behind hisRead MoreAnalysis Of Othello By William Shakespeare816 Words   |  4 PagesBell Eng. 1 Pre-I.B. 05 April 2015 Self-Confidence In the book, Othello, by William Shakespeare, the author expresses that without self-confidence a person cannot truly grow emotionally. He shows this theme throughout the book by giving Othello, the main character, the trait of low self-confidence. After the main antagonist Iago pushes Othello to his limits this trait turns out to be fatal and leads to the downfall and death of Othello. A small contribution to his low self-confidence is race, becauseRead MoreAnalysis Of Othello By William Shakespeare1171 Words   |  5 Pagesdrives Iago to plot against Othello. Jealousy is largely present in the appropriation too, the breaking point for Hugo comes at the moment when his dad, who is the coach, presents Odin with the award for ‘Most Valuable Player’, and announces to the team that â€Å"I love him (Odin), like my own son†. It is at this point that Hugo starts conspiring against Odin. Odin receiving the M.V.P award, is a representation of when Othello is promoted to a higher rank in the text. In Othello, Iago’s jealousy is bornRead MoreAnalysis Of Othello By William Shakespeare1353 Words   |  6 PagesMany have read â€Å"Othello† and can clearly see how divided the characters are by many aspects, but one that seems to be most important to the whole theme is gender roles. The role of women in â€Å"Othello† varies from eac h female’s point of view and is easily recognized through their status and upbringing. From the point of view of the reader a person can definitely tell that they are also separated by class and that’s how it determines part of the problem for gender roles in this play. Another problem

Wednesday, May 6, 2020

Child Labor Is Not An Effective Way For India - 1533 Words

In today’s society, as Americans we don’t realize the toys and clothes we buy at the store are all being created by children who were forced to put themselves in that position in order for us to receive our goods. All around the world, child labor is one of the most widely social issues affecting the younger population, specifically, in India. For the children of India, work becomes a nightmare based on suffering and mistreatment. While children have no choice but to be independent and forced to work, it can be a big influence on the child’s education, life, health, and development. Where child labor is deeply rooted from tradition, the causes of child labor are difficult and complex beliefs and views of economic, social, and cultural matters that make it challenging for the welfare of the children to progress, but child labor is not an effective way for India and it’s people to develop and grow as a stable country. The influence of child labor has reached numerous problems and has become a vast concern in several countries but more importantly in India. India becomes a grounding place of poverty, scarce jobs, and unbearable conditions. Where poverty turned out to be the number one factor in which child labor increased, it is also caused by a long-term effect of instability and a lack of growth stemming from various reasons such as low income from jobs, agriculture, and social order. The basis of child labor stems from the hardships their parents had to undergo andShow MoreRelatedAnnotated Bibliography On Human Rights Abuses1747 Words   |  7 Pages Teacher signature: Topic -: Human rights abuses exist in many countries. Research the human rights situation in one country and evaluate the issues. Position-: Laws are still not effective to abolish child labor in India. Human rights are rights related with every person, whatever our nationality, spot of living arrangement, sex, national or ethnic root, color, religion, dialect, or some other status. We are all similarly qualified for ourRead MoreChild Labor in America773 Words   |  4 PagesMrs. S. Melton November 30, 2009 Child Labor in America Our child labor issue an ongoing world wide effect, currently among America’s society. Researchers even today and our up and down crisis we face economically, leave us with the understanding that poverty is a main cause of child labor. Still in America poor families depend heavenly upon their children working in order to improve their chances of attaining basic necessities. American history goes way back to explain that poverty and a child’sRead MoreEssay about The Globalization of Child Labor1517 Words   |  7 Pagescountries and people negatively. Child labor was once an immense issue in the United States; however, we now have laws protecting children from dangerous working conditions. Unfortunately, children in countries like India and Africa are still falling victim to harsh working conditions. These developing nations have the same problem that the United States had years ago; children are working long hours with little pay and are working in very dangerous e nvironments. India and Africa have industries thatRead MoreStudent Advocacy and â€Å"Sweatshop Labor†; the Case of Russell Athletic940 Words   |  4 PagesAnswers for the case study Student advocacy and â€Å"sweatshop labor†; the case of Russell Athletic Q1 * Culture of the particular country It is very important to study the different elements of culture of the country. When consider China and India, being large countries, the cultural diversity is higher and varies with the geographical areas. In some cultures, the value systems and ethics will be critically affected on the business. Some businesses are almost impossible to start in some regionsRead MoreDifferent Forms Of Gender Inequality939 Words   |  4 Pagesas effective as someone else (regardless of gender) they should make the same amount. In regard to roles, there is the perception that men should take on roles that require more physical strength or strength (as in the case of CEO who needs to be strong and lead the masses). With roles that are played, it has been typical that the woman are more fragile, nurturing, and emotional so it is not thought that they would be in positions that required someone to be strong (such as in manual labor positionsRead MoreIKEA Case Study1430 Words   |  6 Pagesflat-pack ed furniture from stores. IKEA to was able to reduce costs, as this costly part of the value chain was carried out by the customer. Adding to that, IKEA promoted the Swedish lifestyle. Many people associate Sweden with a fresh, healthy way of life. This Swedish lifestyle is reflected in the IKEA product range. The freshness of the open air is reflected in the colors and materials used and the sense of space they create: blond woods, natural textiles and untreated surfaces. Also IKEARead More Modern Day Child Labour Essay1383 Words   |  6 PagesModern Day Child Labour While we, as Americans, are currently living in the most advanced civilization up to this time, we tend to disregard problems of exploitation and injustice to nations of lesser caliber. Luckily, we dont have to worry about the exploitation of ourchildren in factories and sweet shops laboring over machines for countless hours. We, in the United States, would never tolerate such conditions. For us, child labor is a practice that climaxed and phased away during andRead MoreWhats going on in india?1397 Words   |  6 Pages Nor will many of us every really understand. In India, their citizens are suffering from many different types of violations. For instance, people are being tortured. Women are being raped and single handedly being deprived of their rights. Many women are being kidnapped, raped, tortured and some even end up being killed. Its very eye opening when you find out about these types of things because we never hear about these issues. Children in India are also facing v arious types of violations. KidsRead MoreIkeas Global Sourcing Challenge2533 Words   |  11 PagesIKEA’s Global Sourcing Challenge: Indian Rugs and Child Labor (A) Case Synopsis IKEA is a â€Å"privately held, international home products company that designs and sells ready-to-assemble furniture such as beds and desks, appliances and home accessories† (www.worldisyouroyster.com). The company was established in 1943 by Ingvar Kamprad in Sweden when he was just 17 years old. Kamprad himself, who still owns the private company, is rumored to be the world’s richest man. IKEA is currently the worldRead MoreProblems of Gender Inequality for Women in India and Other Countries1674 Words   |  7 Pages This paper talks about the problems women in India and other places around the world face in creating women. The major stem of this problem revolves around the gender inequality that still prevails in many countries. Due to less significance given to the working women, the unions made by them dont receive much important either. Provided are some examples of the SEWA and JFJ movements that have made significant changes in the working women in India an d America. Introduction The work force has

Intelligent Campus Using Rfid Free Essays

string(145) " information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc\." chapter 1 introduction 1. 1GENERAL With the increasing denial of time and space the RFID technology is gaining momentum day by day. RFID is a source of identification of individuals and unique products. We will write a custom essay sample on Intelligent Campus Using Rfid or any similar topic only for you Order Now The budding technology RFID proves to threaten even the cloning technique, through the chip insertion. New ways of improving the existing RFID technology are being found and implemented. This advancement of RFID technology is looked beyond the security purposes. 1. 2 PRESENT SCENARIO Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of unique serial number) of an object wirelessly, using radio waves. RFID technologies are grouped under the more generic Automatic Identification and Data Capture (AIDC). The RFID technology is used only in security, tagging goods, inventory purposes. Since the RFID technology is not well established in India, the introduction of new methodology in the field of RFID will indeed enhance the use of RFID technology in various areas of science and technology. . 3 PROBLEM An individual should be allocated to maintain registers in all places and appointment of staffs for coordinating with students in all occasions. The ID card can be duplicated even thought it has some other advancement which will be used in rare occasions. 1. 4 SOLUTION The best solution to the above problem is to develop a single RFID tag that can be used inside the college campus. Each and every RFID tag holds a particular number and it is integrated with the id cards of each and every individuals. The RFID tag reader can be fixed anywhere in campus and it is used to collect the information about the tag location. The collected data can be sent to centralized server to handle that information. Another added advantage is that the ID cards can’t be duplicated. This has several advantages and it is a time saving one for the institution, students and staff members. 1. 5 HARDWARE AND SOFTWARE REQUIRED The hardware required is: 1) Personal computer. 2) RS 232. 3) Reader. 4) Power supply unit. 5) IR transmitter and receiver pair. 6) Buzzer. 7) LCD. 8) Tags. The software required is: 1) AVR studio 3. 5. 2) Visual studio 6. 0. 1. 6 BLOCK DIAGRAM Figure 1. 1 block diagram of intelligent campus using RFID CHAPTER 2 RFID system 2. 1 INTRODUCTION Radio Frequency Identification or RFID refers to the set of technologies that use radio waves for identifying objects or people. The RFID system is used to identify individual objects or things in the environment which can be monitored through use of wireless technology. RFID is a generic term for technologies that use radio waves to remotely store and retrieve data. In other words, it is a combined term with RF and ID where RF means a wireless communication technology and ID means identification information of tag. So it is said that RFID is theoretically a wireless networking technology to transmit identification information stored at an electronic memory space. 2. 2 COMPONENTS OF RFID SYSTEM: ? An RFID device (transponder or tag), that contains data about an item. ? An antenna used to transmit the RF signals between the reader and the RFID devices. ? An RF transceiver that generates the RF signals. A reader that receives RF transmissions from an RFID device and passes the data to the host system for processing. Figure 2. 1: RFID SYSTEM 2. 3 GENERIC RFID TAG ARCHITECTURE The tag contains circuit to both rectify DC power from the incoming RF signal as well as to detect and extract the information modulated on the signal. The antenna load is a controlled resistance that changes the impedance of the dipole, enabling the backscatter. The tag IC is mounted on a carrier known as a strap and subsequently bonded to the antenna to form the fully assembled tag. The chip itself is very small, enabled by modem CMOS technology. The mounting of the die on a carrier has been made very inexpensive and capable of large volume by either flip-flop or by other innovative technique such as the Alien Technologies Fluidic self Assembly process. [pic] Figure 2. 2: Basic Tag IC Architecture 2. 4 Components of a tag The major components of the tag are 1) Microchip. 2) Antenna. 2. 4. 1 Microchip Microchip is electronic equipment consisting of a small crystal of silicon semiconductor fabricated to carry out a number of electronic functions in an integrated circuit. The microchip used in a HF tag is a contact less read/ write passive RFID device that is optimized for 13. 56 MHz RF carrier signal. The device needs an external LC resonant circuit for wireless communication with the interrogator. The device is powered remotely by rectifying an RF signal that is transmitted from the interrogator and transmits or updates its contents from memory-based on commands from interrogator. 2. 4. 2 Antenna The antenna emits the radio signal to activate the tag and reading and writing data to it. Antennas are the conduits between the tag and the transceiver, which controls the system data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built in a door frame to receive tag data from persons or things. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continuously. If constant interrogation is not required, the field can be activated by the sensor device. 2. 5 rfid readers RFID reader is like any other device that can be connected to a PC Or might be in built like an external or internal modem. The RFID reader can be powered by a power source using an adapter †Reader† or †Interrogator†, a device that is able to locate and activate tags so that the information that has been programmed onto the tag is transmitted back to the reader and subsequently to interface computing systems. The information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc. You read "Intelligent Campus Using Rfid" in category "Papers" Not only do reader locate activate and receive transmissions from RFID tags, a reader has the ability of sending data back to read/write capable tag in order to append or replace data. Readers exist that can also scan bar codes in environments where both bar codes and RFID are used. 2. 6 COMPONENTS OF A READER The reader has the following main components: ? Transmitter and Receiver ? Microprocessor ? Memory ? I/O channels for external sensors, actuators and annunciators ? Controller ? Communication interface ? Power. [pic] Figure 2. 3: BLOCK diagram of a reader 2. 6. 1 TRANSMITTER The reader’s transmitter is used to transmit AC power and the clock cycle via antennas to the tags in its read zone. This is part of the transceiver unit, the component responsible for sending the reader signal to the surrounding environment and receiving tag responses back via the reader antennas. The antenna ports of reader are connecting to its transceiver component. One reader antenna can be attached to each such antenna port. Receiver receives analog signals from the tag via the reader antenna. It then sends the signals to reader microprocessor, where it is converted to its equivalent digital form. 2. 6. 2 MICROPROCESSOR This component is responsible for implementing the reader protocol to communicate with compatible tags. It performs decoding and error checking of the analog signal from the receiver. In addition, the microprocessor might contain custom logic for doing low level filtering and processing of read tag data. 2. 6. 3 MEMORY Memory is used for storing data such as the reader configuration parameters and list of tag reads. Depending on the memory size, however, a limit applies as to how many such tag reads can be stored at one time. If the connection remains down for an extended period with the reader reading tags during this downtime, this limit might be exceeded an part of the stored data lost. 2. 6. 4 I/O channels Readers do not have to be turned on for reading tags at all time. A sensor of some sort, such as a motion or light sensor, detects the presence of tagged objects in the readers read zone. This sensor can then set the reader on to read this tag. Similarly, this component also allows the reader to provide local output depending on some condition via an annunciators or an actuator. 2. 6. 6 CONTROLLER A controller is an entity that allows an external entity, either a human or a computer program, to communicate with and control a reader’s function and to control annunciators and actuators associated with the reader. . 6. 7 COMMUNICATION INTERFACE The communication interface component provides the communication instructions to a reader that allows it to interact with external entities, via a controller to transfers its stored data and to accept commands and send back the corresponding responses. 2. 6. 8 POWER This component supplies power to the reader component. The power sources g enerally provided to this component through a power cord connected to an appropriate external electrical outlet. 2. 7 COMMUNICATION BETWEEN A READER AND A TAG Depending on the tag type, the communication between the reader and a tag can be one of the following: †¢ Modulated backscatter †¢ Transmitter type †¢ Transponder type The area between a reader antenna and one full wave length of the RF wave emitted by the antenna is called near field. The area beyond one full wavelength of the RF wave emitted from a reader antenna is called far field. Passive rfid systems operating in LF and HF use near field communication, whereas those in UHF and microwave frequencies use far field communication. The signal strength in near field communication attenuates as the cube of the distance from the reader antenna. In far field, it attenuates as square of the distance from the reader antenna. 2. 7. 1 MODULATED BACK SCATTER Modulated backscatter communication applies to passive as well as to semi active tags. In This type of communication, the reader sends out a continuous wave (CW) RF signal containing ac power and clock signal to the tag at carrier frequency. Through physical coupling, the antennas supplies power to the microchip. About 1. 2v are generally necessary to energize the tag microchip for reading microchips. For writing, the microchip usually needs to draw about 2. 2v from the reader signal. The microchip now modulates or breaks up the input signal in to a sequence of on and off patterns that represents its data and transmits it back. When the reader receives this modulated signal, it decodes the pattern and obtains the data. Thus, in modulated backscatter communication, the reader always â€Å"talks† first, followed by the tag. A tag using this scheme cannot communicate at all in the absence of a reader because it depends totally on the reader’s power to transmit its data. pic] Figure 2. 4: backscatter communication 2. 7. 2 TRANSMITTER TYPE This type of communication applies to active tags only. In this type of communication, the tag broadcasts its message to the environment in regular intervals irrespective of the presence or absence of a reader. Therefore, in this type of communication, the tag always â€Å"talks† first rather than the reader. [pic] Figure 2. 5: T RANSMITTER communication 3. 4. 3 TRANSPONDER TYPE In this type of communication, the tag goes to a â€Å"sleep† or in to dormant stage in the absence of interrogation from a reader. In this stage, the tag might periodically send a message to check any reader is listening to it. When a reader receives such a query message, it can instruct the tag to â€Å"wake up† or end the dormant stage. When the tag receives this command from the reader, it exits its current state and starts to act as a transmitter tag again. The tag data is sent only the reader specially asks. [pic] Figure 2. 6: TRANSPONDER communication chapter 3 microcontroller 3. 1 INTRODUCTION The hardware includes the following components: ? Atmega162 (micro controller). ? Power supply. ? In system programming. ? Buzzer. Liquid crystal display. ? Reset. ? Max 232. 3. 2 Hardware details of ATMEGA162 controller Utilizes the AVR – RSIC architecture. 3. 2. 1 Features ? High-performance and Low-power Advanced RISC Architecture. ? Most single clock execution. ? 32 x 8 general purpose working registers. ? Fully static operation. ? On chip 2 cycle multiplier. ? Up to 16 MIPS throughput at 16 MHz. ? 131 powerful instructions. 3. 2. 2 Non-volatile Program and Data Memories ? 16K Bytes of In-System Self-programmable Flash. ? Endurance: 10,000 Write/Erase Cycles. ? 512 Bytes EEPROM. ? 1K Bytes Internal SRAM. Up to 64K Bytes Optional External Memory Space. ? Programming Lock for Flash program and EEPROM data Security. 3. 2. 3 Peripheral Features ? Two 8-bit Timer/Counters with Separate Modes. ? Two 16-bit Timer/Counters with Separate Compare Modes, and Capture Modes. ? Real Time Counter with Separate Oscillator. ? Six PWM Channels. ? Dual Programmable Serial USARTs. ? Master/Slave SPI Serial Interface. ? Programmable Watchdog Timer with Separate On-chip Oscillator. ? On-chip Analog Comparator. ? External and internal interrupt sources. 3. 2. 4 SPECIFICATION ? Low power high speed CMOS process technology. Fully static operation. ? Power consumption at 4 MHz, 3v, 25c. ? Active: 3. 0 MA. 3. 2. 5 Special Microcontroller Features ? Power-on Reset and Programmable Brown-out Detection. ? Internal Calibrated RC Oscillator. ? External and Internal Interrupt Sources. ? Five Sleep Modes: Idle, Power-save, Power-down, Standby, and Extended Standby. 3. 2. 6 I/O and Packages ? 35 Programmable I/O Lines. ? 40-pin PDIP, 44-lead TQFP, and 44-pad MLF. 3. 2. 7 Operating Voltages ? 1. 8 – 5. 5V for ATmega162V. ? 2. 7 – 5. 5V for ATmega162. 3. 2. 8 Speed Grades ? 0 – 8 MHz for ATmega162V. ? 0 – 16 MHz for ATmega162. 3. ATMEGA162 architectural overview The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. . 3. 1 features OF ATMEGA162 The 16K bytes of In-System Programmable Flash with Read-While-Write capabilities, 512 bytes EEPROM, 1K bytes SRAM, an external memory interface, 35 general purpose I/O lines, 32 general purpose working registers, a JTAG interface for Boundary-scan, On-chip Debugging support and programming, four flexible Timer/Counters with compare modes, internal and external interrupts, two serial programmable USARTs, a programmable Watchdog Timer with Internal Oscillator, an SPI serial port, and five software selectable power saving modes. The fast-access Register File contains 32 x 8-bit general purpose working registers with a single clock cycle access time. This allows single-cycle Arithmetic Logic Unit (ALU) operation. In a typical ALU operation, two operands are output from the Register File, the operation is executed, and the result is stored back in the Register File – in one clock cycle. Six of the 32 registers can be used as three 16-bit indirect addresses register pointers for Data Space addressing – enabling efficient address calculations. One of these address pointers can also be used as an address pointer for look up tables in Flash Program memory. These added function registers are the 16-bit X-, Y-, and Z-register, described later in this section. The ALU supports arithmetic and logic operations between registers or between a constant and a register. Single register operations can also be executed in the ALU. After an arithmetic operation, the Status Register is updated to reflect information about the result of the operation. [pic] Figure 3. 1: BLOCK Diagram. Program flow is provided by conditional and unconditional jump and call instructions, able to directly address the whole address space. Most AVR instructions have a single 16-bit word format. Every program memory address contains a 16 or 32-bit instruction. [pic] Figure 3. 2: BLOCK Diagram of the AVR Architecture Program Flash memory space is divided in two sections, the Boot Program section and the Application Program section. Both sections have dedicated Lock bits for write and read/write protection. The SPM instruction that writes into the Application Flash memory section must reside in the Boot Program section. During interrupts and subroutine calls, the return address Program Counter (PC) is stored on the Stack. The Stack is effectively allocated in the general data SRAM, and consequently the Stack size is only limited by the total SRAM size and the usage of the SRAM. All user programs must initialize the SP in the reset routine (before subroutines or interrupts are executed). [pic] Figure 3. 3: Data Memory Map 3. 3. 2 ALU – Arithmetic Logic Unit The high-performance AVR ALU operates in direct connection with all the 32 general purpose working registers. Within a single clock cycle, arithmetic operations between general purpose registers or between a register and an immediate are executed. The ALU operations are divided into three main categories – arithmetic, logical, and bit-functions. 3. 3. 3 Status Register The Status Register contains information about the result of the most recently executed arithmetic instruction. This information can be used for altering program flow in order to perform conditional operations. Status Register format [pic] Bit 7 – I: Global Interrupt Enable: The Global Interrupt Enable bit must be set for the interrupts to be enabled. The individual interrupt enable control is then performed in separate control registers. If the Global Interrupt Enable Register is cleared, none of the interrupts are enabled independent of the individual interrupt enable settings. The I-bit is cleared by hardware after an interrupt has occurred, and is set by the RETI instruction to enable subsequent interrupts. Bit 6 – T: Bit Copy Storage: The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T bit as source or destination for the operated bit. Bit 5 – H: Half Carry Flag: The Half Carry Flag H indicates a half carry in some arithmetic operations. Half Carry is useful in BCD arithmetic. Bit 4 – S: Sign Bit, S = N. V: The S-bit is always an exclusive or between the Negative Flag N and the Two’s Complement Overflow Flag V. Bit 3 – V: Two’s Complement Overflow Flag: The Two’s Complement Overflow Flag V supports two’s complement arithmetic. Bit 2 – N: Negative Flag: The Negative Flag N indicates a negative result in an arithmetic or logic operation. Bit 1 – Z: Zero Flag: The Zero Flag Z indicates a zero result in an arithmetic or logic operation. Bit 0 – C: Carry Flag: The Carry Flag C indicates a carry in an arithmetic or logic operation. 3. 3. 4 Stack Pointer The Stack is mainly used for storing temporary data, for storing local variables and for storing return addresses after interrupts and subroutine calls. The Stack Pointer Register always points to the top of the Stack. The Stack Pointer points to the data SRAM Stack area where the Subroutine and Interrupt Stacks are located. This Stack space in the data SRAM must be defined by the program before any subroutine calls are executed or interrupts are enabled. Stack Pointer FORMAT pic] The Stack Pointer is incremented by one when data is popped from the Stack with the POP instruction, and it is incremented by two when data is popped from the Stack with return from subroutine RET or return from interrupt RETI. The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The number of bits actually used is implementation dependent. 3. 3. 5 Reset and Interrupt Handling The AVR provi des several different interrupt sources. These interrupts and the separate Reset Vector each have a separate program vector in the program memory space. All interrupts are assigned individual enable bits which must be written logic one together with the Global Interrupt Enable bit in the Status Register in order to enable the interrupt. There are basically two types of interrupts. The first type is triggered by an event that sets the Interrupt Flag. For these interrupts, the Program Counter is vectored to the actual Interrupt Vector in order to execute the interrupt handling routine, and hardware clears the corresponding Interrupt Flag. Interrupt Flags can also be cleared by writing a logic one to the flag bit position(s) to be cleared. If an interrupt condition occurs while the corresponding interrupt enable bit is cleared, the Interrupt Flag will be set and remembered until the interrupt is enabled, or the flag is cleared by software. The second type of interrupts will trigger as long as the interrupt condition is present. These interrupts do not necessarily have Interrupt Flags. If the interrupt condition disappears before the interrupt is enabled, the interrupt will not be triggered. 3. 3. 6 In-System Reprogrammable Flash Program Memory The ATmega162 contains 16K bytes On-chip In-System Reprogrammable Flash memory for program storage. Since all AVR instructions are 16 or 32 bits wide, the Flash is organized as 8K x 16. For software security, the Flash Program memory space is divided into two sections, Boot Program section and Application Program section. [pic] Figure 3. 4 Programmable Memory Map The Flash memory has an endurance of at least 10,000 write/erase cycles. The ATmega162 Program Counter (PC) is 13 bits wide, thus addressing the 8K program memory locations. 3. 4 EEPROM Data Memory The ATmega162 contains 512 bytes of data EEPROM memory. It is organized as a separate data space, in which single bytes can be read and written. The EEPROM has an endurance of at least 100,000 write/erase cycles. The access between the EEPROM and the CPU is described in the following, specifying the EEPROM Address Registers, the EEPROM Data Register, and the EEPROM Control Register. 3. 4. 1 EEPROM Read/Write Access The EEPROM Access Registers are accessible in the I/O space. A self timing function, however, lets the user software detect when the next byte can be written. If the user code contains instructions that write the EEPROM, some precautions must be taken. In heavily filtered power supplies, VCC is likely to rise or fall slowly on Power-up/down. This causes the device for some period of time to run at a voltage lower than specified as minimum for the clock frequency used. In order to prevent unintentional EEPROM writes, a specific write procedure must be followed. The EEPROM Address Register [pic] Bits 15. 9 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bits 8. 0 – EEAR8. 0: EEPROM Address The EEPROM Address Registers – EEARH and EEARL specify the EEPROM address in the 512 bytes EEPROM space. The EEPROM data bytes are addressed linearly between 0 and 511. The initial value of EEAR is undefined. A proper value must be written before the EEPROM may be accessed. The EEPROM Data Register –EEDR [pic] Bits 7. 0 – EEDR7. 0: EEPROM Data For the EEPROM write operation, the EEDR Register contains the data to be written to the EEPROM in the address given by the EEAR Register. For the EEPROM read operation, the EEDR contains the data read out from the EEPROM at the address given by EEAR. The EEPROM Control Register – EECR [pic] Bits 7. 4 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bit 3 – EERIE: EEPROM Ready Interrupt Enable Writing EERIE to one enables the EEPROM Ready Interrupt if the I bit in SREG is set. Writing EERIE to zero disables the interrupt. The EEPROM Ready interrupt generates a constant interrupt when EEWE is cleared. Bit 2 – EEMWE: EEPROM Master Write Enable The EEMWE bit determines whether setting EEWE to one cause the EEPROM to be written. When EEMWE is set, setting EEWE within four clock cycles will write data to the EEPROM at the selected address. If EEMWE is zero, setting EEWE will have no effect. When EEMWE has been written to one by software, hardware clears the bit to zero after four clock cycles. See the description of the EEWE bit for an EEPROM write procedure. Bit 1 – EEWE: EEPROM Write Enable The EEPROM Write Enable signal EEWE is the write strobe to the EEPROM. When address and data are correctly set up, the EEWE bit must be written to one to write the value into the EEPROM. The EEMWE bit must be written to one before a logical one is written to EEWE; otherwise no EEPROM write takes place. The following procedure should be followed when writing the EEPROM (the order of steps 3 and 4 is not essential): 1. Wait until EEWE becomes zero. 2. Wait until SPMEN in SPMCR becomes zero. 3. Write new EEPROM address to EEAR (optional). 4. Write new EEPROM data to EEDR (optional). 5. Write a logical one to the EEMWE bit while writing a zero to EEWE in EECR. 6. Within four clock cycles after setting EEMWE, write a logical one to EEWE. The EEPROM can not be programmed during a CPU write to the Flash memory. The software must check that the Flash programming is completed before initiating a new EEPROM write. Step 2 is only relevant if the software contains a Boot Loader allowing the CPU to program the Flash. If the Flash is never being updated by the CPU, step 2 can be omitted. Caution: An interrupt between step 5 and step 6 will make the write cycle fail, since the EEPROM Master Write Enable will time-out. If an interrupt routine accessing the EEPROM is interrupting another EEPROM access, the EEAR or EEDR Register will be modified, causing the interrupted EEPROM access to fail. It is recommended to have the Global Interrupt Flag cleared during all the steps to avoid these problems. When the write access time has elapsed, the EEWE bit is cleared by hardware. The user software can poll this bit and wait for a zero before writing the next byte. When EEWE has been set, the CPU is halted for two cycles before the next instruction is executed. Bit 0 – EERE: EEPROM Read Enable The EEPROM Read Enable Signal EERE is the read strobe to the EEPROM. When the correct address is set up in the EEAR Register, the EERE bit must be written to a logic one to trigger the EEPROM read. The EEPROM read access takes one instruction, and the requested data is available immediately. When the EEPROM is read, the CPU is halted for four cycles before the next instruction is executed. The user should poll the EEWE bit before starting the read operation. If a write operation is in progress, it is neither possible to read the EEPROM, nor to change the EEAR Register. 3. 5 Timing External memory devices have various timing requirements. It is important to consider the timing specification of the external memory device before selecting the wait-state. The most important parameters are the access time for the external memory in conjunction with the set-up requirement of the ATmega162. [pic] Figure 3. 5: External Data Memory Cycles without Wait-state. 3. 6 Crystal Oscillator XTAL1 and XTAL2 are input and output, respectively, of an inverting amplifier which can be configured for use as an On-chip Oscillator. Either a quartz crystal or a ceramic resonator may be used. C1 and C2 should always be equal for both crystals and resonators. The optimal value of the capacitors depends on the crystal or resonator in use, the amount of stray capacitance, and the electromagnetic noise of the environment. The Oscillator can operate in four different modes, each optimized for a specific frequency range. [pic] Figure 3. 6: Crystal Oscillator Connections 3. 6. 1 Low-frequency Crystal Oscillator The Low-frequency Crystal Oscillator must be selected by setting the CKSEL Fuses to â€Å"0100†, â€Å"0101†, â€Å"0110† or â€Å"0111†. The crystal should be connected as shown in Figure. If CKSEL equals â€Å"0110† or â€Å"0111†, the internal capacitors on XTAL1 and XTAL2 are enabled, thereby removing the need for external capacitors. The internal capacitors have a nominal value of 10 pF. When this Oscillator is selected, start-up times are determined by the SUT Fuses (real time-out from Reset) and CKSEL0 (number of clock cycles) as shown in below tables [pic] Table 4. 1 Start-up DELAYS from Reset when Low-frequency Crystal Oscillator is selected . 7 Watchdog Timer If the Watchdog Timer is not needed in the application, this module should be turned off. If the Watchdog Timer is enabled, it will be enabled in all sleep modes, and hence, always consume power. In the deeper sleep modes, this will contribute significantly to the total current consumption. Chapter 4 Intelligent campus using rfid 4. 1 INTRODUCTION This project describes about the efficient used of RFID technology around us, it also describes about the use of both hardware and software. In addition we also focus on monitoring every individual inside the campus. 4. 2 Basic setup [pic]Figure 4. 1 basic setup The basic external setup for the project is shown in figure 8. 1. The HF reader is connected to microcontroller through RS-232 cable and the IR pairs are connected to the port pins of microcontroller. The microcontroller is then connected to the host computer (server) through RS-232 cable. The detailed explanation of the blocks are given below 4. 3 PERIPHERALS 4. 3. 1 I/O PORTS All AVR ports have true read-modify-write functionality when used as general digital I/O ports. This means that the direction of one port pin can be changed without unintentionally changing the direction of any other pin with the SBI and CBI instructions. Port A Port A is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port A, one each for the Data Register – PORT A, SIB($IB($3B), Data Direction Register – DDRA, $1A($3A) and the Port A. Input Pins – PINA, $19($39). The Port A Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port B Port B is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port B, one each for the Data Register – PORT B, $18($38), Data Direction Register – DDRB, $17($37) and the Port B Input Pins – PINB, $16($36). The Port B Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port C Port C is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port C, one each for the Data Register – PORT C, $15($35), Data Direction Register – DDRC, $14($34) and the Port C Input Pins – PINC, $13($33) The Port C Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port D Port D is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port D, one each for the Data Register – PORT D, $12($32), Data Direction Register – DDRD, $11($31) and the Port D Input Pins – PIND, $10($30). The Port D Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. 4. 4 USART (Universal Synchronous and Asynchronous serial Receiver and Transmitter): The Universal Synchronous and Asynchronous serial Receiver and Transmitter (USART) is a highly flexible serial communication device. The main features are: ? Asynchronous or Synchronous Operation ? Master or Slave Clocked Synchronous Operation ? Odd or Even Parity Generation and Parity Check Supported by Hardware ? Data Overrun Detection ? Framing Error Detection ? Three Separate Interrupts on TX Complete, TX Data Register Empty and RX Complete ? Multi-processor Communication Mode ? Double Speed Asynchronous Communication Mode The ATmega162 has two USARTs, USART0 and USART1. USART0 and USART1 have different I/O Registers. Portd0 is the receiver pin and portd1 is the transmitter pin. Here we are using IC MAX232 as a UART driver. [pic] Figure 4. 2 uart driver. 4. 4. 1 AVR UART – Compatibility The USART is fully compatible with the AVR UART regarding: ? Bit locations inside all USART Registers ? Baud Rate Generation ? Transmitter Operation ? Transmit Buffer Functionality ? Receiver Operation 4. 4. 2 USART Initialization The USART has to be initialized before any communication can take place. The initialization process normally consists of setting the baud rate, setting frame format and enabling the Transmitter or the Receiver depending on the usage. For interrupt driven USART operation, the Global Interrupt Flag should be cleared (and interrupts globally disabled) when doing the initialization. The TXC Flag can be used to check that the Transmitter has completed all transfers, and the RXC Flag can be used to check that there are no unread data in the receive buffer. 4. 5 SENSOR Sensors are the devices that are used to convert the physical parameter into signal that can be measured electrically and it can be easily given as an input to the microcontroller. The effectual sensor should have the following properties namely, ? Sensor should be sensitive to measured property. ? It should be insensitive to any other property. ? It should not influence any other property. An IR sensor is used. It uses IR LED as an IR transmitter, which emits IR rays in the wavelength of 940 nm and a phototransistor is used as IR receiver, which detects IR rays and the output comes in collector. If the receiver is receiving IR rays the output will be low otherwise output is high. The output of the receiver is given to the comparator chip LM393, which compares the receiver output with the prefixed voltage signal. The output of the comparator is given to microcontroller. [pic] Figure 4. 3 CIRCUIT DIAGRAM OF IR SENSOR 4. 5. 1 IR TRANSMITTER LED, a special type of semiconductor diode that has a pn junction acts as a transmitter. The wavelength and the color of the light depend on the band gap energy of the material forming pn junction. The materials used for a LED have a direct band gap energy corresponding to near IR, but Germanium and silicon are indirect band gap materials resulting in a non – radiative recombination. Hence does not emit light. The advantages of LED over incandescent sources are: ? Less costly Long life span ? Insensitive to vibration and shocks. 4. 5. 2 IR RECEIVER A phototransistor is used to detect the IR rays from the LED. It is a bi polar junction that is encased in a transparent case so that light can reach the base collector junction. The phototransistor works like a photodiode with a very high very high sensitivity for light, because the electrons that are gene rated by photons in the base collector junction are injected to base and amplified like a transistor. It has a slower response time than photodiode. [pic] Figure 4. 4 BLOCK DIAGRAM OF IR SENSOR 4. 5. 3COMPARATOR The comparator is a circuit which compares a signal voltage applied at one input of an op-amp with a known reference voltage at the other input. For an inverting comparator the reference voltage is applied to the (+) input and input is given to the (-) terminal. The common mode voltage range includes ground, and the differential input voltage equals power supply voltage. [pic] Figure 4. 5: PIN CONFIGURATION OF LM 393 4. 6 BUZZER It is a transducer which converts electrical signal to sound signal. Piezoelectricity is the ability of certain crystals to produce a voltage when subjected to mechanical stress. The effect is reversible (i. . ) crystals when subjected to external applied voltage can change shape by a small amount and the effect is of nanometers. [pic] Figure 4. 6 circuit diagram of buzzer 4. 7 RS-232C RS-232 stands for Recommend Standard number 232 and C is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. [pic] Fig ure: 4. 7. RS-232 CONNECTOR 4. 7. 1 DB9 INFORMATION The DB9 connection has 9 pins which are each described in the below table. The illustration below is an example of the female serial connector, which would usually be located on the connector that would connect to the computer. 9 pin connector on a DTE device (PC connection) | |Pin No |Direction of the signal | |1 |Carrier(CD) ( from DCE) incoming signal from the modem | |2 |Received data (RD) incoming data from DCE | |3 |Transmit data (TD) outgoing data to a DCE | |4 |Data terminal ready (DTR) outgoing handshake signal | |5 |Signal ground common reference voltage | |6 |Data set ready (DSR) incoming handshaking signal | |7 |Request to send (RTS) outgoing flow control signal | |8 |Clear to send (CTS) incoming flow control signal | |9 |Ring indicator (RI) (from DCE) incoming signal from a modem | Table: 4. 1: DB9 connector DTE stands for Data Terminal Equipment, and DCE stands for Data Communications Equipment. These terms are used to indicate the pin-out for the connectors on a device and the direction of the signals on the pins The RS-232 standard states that DTE devices use a 9-pin male connector, and DCE devices use a 9-pin female connector. 4. 8 LCD LCD is an output device which is used to display a character or a text through microcontroller. So, the LCD is connected in the output port pins of microcontroller. A 2 line LCD display has totally 32 pins. 32 characters can be displayed in our LCD. [pic] Figure 4. 8: 16Ãâ€"2 LCD DISPLAY The starting address for the first line is $80 and for end address is $8F and for second line the starting address is $C0 and the end address is $CF. Pin no |Pin name |I/P or O/P |External connection |Function | |1 |VSS |– |Power supply |GND | |2 |VDD |– | |+5V | |3 |VO |– | |V lcd adjustment | |4 |RS |I/p |MPU |Register select signal | |5 |R/W |I/p |MPU |Read/write select signal | | | | | |Read-1; write-2. | |6 |E |I/p MPU |Operation enable signal | |7-10 |DB0-DB3 |I/p |MPU |Lower order lines | |11-14 |DB4-DB7 |I/p |MPU |Higher order lines | |15-16 |LED,,+,, |I/p |LED backlight power supply |LED,,+,, voltage | | |LED,,-,, | | |type : 4. 2V;Max: 4. 5V | | | | | |LED,,-,, : GND | Table 4. 2 discription of lcd terminals Chapter 5 VISUAL BASIC 5. 1 INTRODUCTION The Visual Basic language is quite powerful – if one can imagine a programming task; it can probably be accomplished using Visual Basic. Once the basics of Visual Basic are understood then one becomes productive. 5. 2 About Visual Basic The â€Å"Visual† part refers to the method used to create the graphical user interface (GUI), Rather than writing numerous lines of code to describe the appearance and location of interface elements, simply add pre built objects into place on screen. The â€Å"Basic† part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more programmers. Visual Basic has evolved from the original BASIC languages and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to accomplish anything that can be accomplished using any other Windows programming language. The Visual Basic programming language is not unique to Visual Basic. The Visual Basic programming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The Visual Basic Scripting Edition (VB Script) is a widely used scripting language and a subset of the Visual Basic language. The investment one makes in learning Visual Basic will carry over to many other areas. Whether the goal is to create a small utility for an individual, a work group a large enterprise-wide system, or even distributed applications spanning the globe via the Internet, Visual Basic has the required tools. 5. 3 ADVANTAGES ? Data Access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ? ActiveXTM Technologies allow you use the functionality provided by other applications, such as Microsoft Word Processor, Microsoft Excel spreadsheet, and other Windows applications. Even applications can be automated and objects can be created using the Professional or Enterprise editions of Visual Basic. ? Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within the application, or to create Internet server applications. ? The finished application is a true. exe file that uses a Visual Basic Virtual Machine that you can freely distribute. 5. 4 Program description The front end is visual basic and this programming concept is chosen because it is more users friendly. The information or the status about the persons is displayed and the same can be stored in a database so that it can be accessed later. [pic] Figure 5. : output and database creation, checking form Chapter 6 conclusion RFID technology is a budding technology that is fast growing world wide. RFID proves to be cutting edge technology through its applications. This project moves a step ahead in RFID’s application and presents a new dimension to view through. This project proves to be entirely different and innovative of RFID technology with the existing components. Such an introduction of a new methodology in the RFID technology enhances its use and improves the present knowledge. The project â€Å"INTELLIGENT campus using RFID† will sure make a great difference in the present industrial applications of RFID. It will provide the ultimate solution for the problems that exists in various cases. This is a prototype of the proposed idea wherein the entire reason behind it is to provide a fully compact, covering larger distance. 6. 1 PROCESS EXPLANATION The various processes that take place during the working of the project are as follows: The RFID tag is a passive, high frequency device in which some unique data’s can be stared in the form of serial numbers known as ELECTRONIC PRODUCT CODE (EPC). Whenever the RFID tag comes in the field of a particular reader, the reader detects the tag and sends the detected information about the EPC to the microcontroller. ACTIVITY FLOWCHART Figure 6. 1: activity flow chart The received information will be fed into the microcontroller which compares the epc number to specific information’s about group of individuals. If the received information is already in the list, it will allow the user to enter inside the campus and also maintains a database for storing this information. The reader refreshes its data continuously checks after certain amount of time interval and when the RFID reader detects the absence of a tag it will remove the tag details from the list. The database can be created with the help of visual basic programming. [pic] Figure 6. 2: database creation of persons entering into the campus Whenever the tag enters into a specific location such as class rooms, library etc, the reader present in that location will detects the tag. Two IR transmitter – receiver pairs are used for the purpose of monitoring whether the person is entering the room or leaving the room. The IR rays interfering sequence is fed to the microcontroller and it is used for detecting the status of the person having that particular tag. The details or the status are also saved into database using visual basic coding. The databases can be shared in the network and it can be used for finding or monitoring each and every individual belonging to that campus. [pic] Figure 6. 3: database creation of persons entering into PARTICULAR LOCATION. The same can be used to find the individual location using search option. 6. 2 FUTURE ENHANCEMENTS The project could further be developed and enhanced in an effective way by suitable polarization RFID reader antennas and increasing the frequency range so that it would not only provide the solution for monitoring persons in a smaller area as mentioned in this model. The security can also be increased by replacing IR devices by some bio-metric ideas. ———————– 162- MICRO CONTROLLER LCD I/O P O R T S I/O P O R T S BUZZER IR 1 IR 2 USART USART PC RFID END CREATES A DATA BASE (In/Out) 1-2 OR 2-1 Yes No Interruption Occurred CHECHS FOR IR SIGNAL CREATES A DATA BASE (Present inside the campus) INFORMATION TRANSFER FROM RFID READER TO M162 Yes RFID TAG PRESENT No READER SIGNAL TRANSMIT START How to cite Intelligent Campus Using Rfid, Papers

Sin and Humanity Essay Example For Students

Sin and Humanity Essay Sin and Humanity Essay In most novels, old and new, a few general themes can be interpreted. The Scarlet Letter is a novel filled with many contrasting themes. The most prominent theme in the book is that of the many sides of sin. Through the book it is shown that sin is inescapable, un-confessed sin destroys souls, and that there can be different types of sin. Although there are many more themes in The Scarlet Letter, these are most prominent. When stripped to basics there are only two reasons for sin. Love and Hate. These are the only two reasons sin is committed. Although these are rather broad feelings in the spectrum of human emotion, these two emotions seem to control all others. In The Scarlet Letter, this idea of sin is made clear. Sin is portrayed by love and hate. For instance, one of the major parts of the plot is the fact that Hester and Dimmesdale commit ery. This sin wasnt about hate. It was purely about love. Although this sin is one of love, it doesnt seem to be and easier to bear by the couple. Another sin of love is the defiance of an entire religion for someone you love. Dimmesdale shows this as he confesses in front of the town. Along with the sin of ery, the book shows a great example of a sin of hate. Chillingworth seems to embody this sin. He is even referred to as the black man (devil). As if a reference to the Devil was bad enough, he was described as having a crooked hunch. Which only translates to his Crooked soul. Over the course of the book, Chillingworth, Hesters long lost husband, seeks revenge on the man who had sinned with Hester. His anger and jealousy are purely driven by hate. The Scarlet Letter teaches another lesson about sin in one of its themes. It shows that sin is inescapable. The novel has a few examples to let the reader know this. One example is Pearl herself. Pearl is the embodiment of Hester and Dimmesdales sin. Hester felt that she couldnt let Pearl leave her sight. She also felt that although everything was stripped away from her, she still had her little to love. This shows how sin is something that Hester has learned to embrace instead of shunning. Another example that Hawthorn puts in the book is when Hester and Dimmesdale try to escape from Chillingworth. They even try to go across the Atlantic so that they can live in peace but they find out that Chillingworth knows and is after them. The third and most prevalent theme is that un-confessed sin destroys ones soul. There are many examples of how sin can be destructive. One of which is how Chillingworth deals with his obsession for revenge. In the end it is his hate and rage that kills. This example shows that not only can sin destroy your soul, but can also harm you physically. Another great example is how Hesters appearance seems to go from absolutely gorgeous to ugly and plain. The sin that has been trapped inside of her has changed her physical being as well as her spiritual one. Yet another perfect example of how sin destroys is how Dimmesdale gets very ill while he is under the care Chillingworth. He cannot confess to his because of the terrible things he thinks will happen. It is very clear that The Scarlet Letter is filled with forms and lessons of and about sin. It shows how all sins branch from love or hate. It also has some great examples that prove that sin cannot be escaped no matter what one does. And finally Hawthorn shows us that in order to preserve our souls we must be able to confess our sins. .u2eef9882c7b65db6c6decb8cb5544d3b , .u2eef9882c7b65db6c6decb8cb5544d3b .postImageUrl , .u2eef9882c7b65db6c6decb8cb5544d3b .centered-text-area { min-height: 80px; position: relative; } .u2eef9882c7b65db6c6decb8cb5544d3b , .u2eef9882c7b65db6c6decb8cb5544d3b:hover , .u2eef9882c7b65db6c6decb8cb5544d3b:visited , .u2eef9882c7b65db6c6decb8cb5544d3b:active { border:0!important; } .u2eef9882c7b65db6c6decb8cb5544d3b .clearfix:after { content: ""; display: table; clear: both; } .u2eef9882c7b65db6c6decb8cb5544d3b { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2eef9882c7b65db6c6decb8cb5544d3b:active , .u2eef9882c7b65db6c6decb8cb5544d3b:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2eef9882c7b65db6c6decb8cb5544d3b .centered-text-area { width: 100%; position: relative ; } .u2eef9882c7b65db6c6decb8cb5544d3b .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2eef9882c7b65db6c6decb8cb5544d3b .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2eef9882c7b65db6c6decb8cb5544d3b .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2eef9882c7b65db6c6decb8cb5544d3b:hover .ctaButton { background-color: #34495E!important; } .u2eef9882c7b65db6c6decb8cb5544d3b .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2eef9882c7b65db6c6decb8cb5544d3b .u2eef9882c7b65db6c6decb8cb5544d3b-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2eef9882c7b65db6c6decb8cb5544d3b:after { content: ""; display: block; clear: both; } READ: Paleontology (9th-10th Grade Paper) Essay If we dont confess, we will decay from the inside out.**

Sunday, May 3, 2020

Roger McGough Essay Example For Students

Roger McGough Essay The poem is written in first person, and tit the use of colloquial language, such as have your belly shot away, successfully persuade the readers to re-evaluate attitude towards war. The poem argues that lives are good for you by providing examples of enjoyments In life, such as going out with girls. The humorous comment on going to bed with girls targets a specific age group, as these people are mostly likely to be sent to war. This allows the poem to be more engaging, and a more friendly way to communicate to readers. The strong Image of seeds spreading over the field reinforces the Initial argument, that patriots re a bit nuts in the head. My Obstruction describes a day of the bus conductors Journey, whose life is soon going to end. It reminds readers that death Is Inevitable, and Invites the readers to see life through new glasses. This allows the poem to be more engaging, and a more friendly way to communicate to readers. The strong image of seeds spreading over the field reinforces the initial argument, that patriots are a bit nuts in the head. My Obstruction describes a day of the bus conductors Journey, whose life is soon going to end. It reminds readers that death is inevitable, and invites the readers to see life through new glasses. The images of the bus conductor holding a ticket like a rose and put it into the bag like a child putting the shilling into the gas meter shows the bus conductors attitudes towards the finite life, with the repetition in the last two lines one day hell clock on and never clock off or clock off and never clock on also emphasizes the bus conductors approach to the last stage of life. The poem Extremis comments on how the grading of students at school is inappropriate. McHugh argues that, once people die, they are of no differences. McHugh uses misspell words and colloquial to indicate that the narrator has limited academic ability and is in the bottom stream. This narrator effectively persuades the readers as it is ironic to have divisions during lifetime when they all even out at the end. These poems by McHugh deliver the message effectively with his style of using colloquial language and first person narrator. Why Patriots Are a Bit Nuts in the Head persuades readers to believe that to be a patriot is to spread your seeds over the field by emphasizing lives are good for you. My Obstruction ask readers to see life differently, by showing us the bus conductors work Journey when approaching to death. Extremis expresses McCullough thoughts of having divisions at school to separate students of different academic ability. Through a voice of a not bright student, he mocks the streaming system by suggesting that people are all the same at the cemetery. With his engaging approach, these poems are easy to digest and ar e persuasive.