Friday, May 31, 2019
Employability Skills:An Update :: Employer Work Job Essays
Employability Skills An UpdateThis project has been funded at least in part with Federal funds from the U.S. Department of development under Contract No. ED-99-CO-0013. The content of this publication does not necessarily reflect the views or policies of the U.S. Department of Education nor does mention of trade names, commercial products, or organizations imply endorsement by the U.S. Government. Digests may be freely reproduced and be available at http//ericacve.org/fulltext.asp. What skills do employers want? How do these skills match those that youth and adults argon growth through their school and make for experiences? How can education and training programs prepare individuals to enter a rapidly changing workplace? These and other questions are examined in this Digest that explores skills currently needed for employment. Since 1986 the authors of no fewer than six ERIC Digests and one Trends and Issues Alert have sifted through an increasingly prolific literature make to investigate the evolving topic of employability skills. The dual ch allenges of competing in a world market and rapid technological advancements have necessitated a redesign of the workplace into an innovative work environment known as the high-performance workplace. This environment requires a behavior and orientation toward work that go beyond step-by-step task performance. It expects workers at all levels to solve problems, create ways to improve the methods they use, and engage effectively with their coworkers (Bailey 1997 Packer 1998). Knowledge workers who demonstrate this highly skilled, adaptive blend of technical and human relations ability are recognized by employers as their primary competitive edge. Job-specific technical skills in a given field are no long-life sufficient as employers scramble to fill an increasing number of interdependent jobs (Askov and Gordon 1999 Murnane and Levy 1996). Many U.S. and international authors point out the importance of continuously d eveloping skills beyond those need for a specific job, and they identify employability skills that enable individuals to prove their value to an organization as the key to job survival. The volume of major studies undertaken in the past 2 decades to identify and describe employability skills underscores their criticality. (For a listing of some of these authors, organizations, and studies, see the references.) There are many definitions of the phrase employability skills. The following updated definition is deputy of a synthesis of definitions as they have evolved over time Employability skills are transferable core skill groups that represent essential functional and enabling knowledge, skills, and attitudes required by the 21st century workplace.
Thursday, May 30, 2019
Hinduism Essay -- Religion, Dharma, Atman
Hinduism is a religion filled with many philosophical thoughts about the instinct, pursual your duties, achieving liberation and understanding the consequences of karma. Many of the beliefs in Hinduism makes a soulfulness think of life and their own actions they do everyday since it can affect your next life. Hinduism sometimes overly makes one wonder if all of these unlike beliefs and philosophical thoughts are true or not and if you dont follow your duties (dharma), if consequences really do occur or not in the be life and the next life.Atman, which is the soul, is constantly craving for things and always wants something even after we obtain our desires it is a non-stop process (Embree 33). The Self (atman) is taken over by recreation and pain, which is true in life because there are always desires that give us pleasure and make us happy (Embree 36). But one also needs to remember that life has its ups and downs meaning, there always will be a time of pain in life. No one is ever at rest in life, we are always wanting more and more each day. According to the Upanishadic thinker the sensible world is not very important, only you, your soul, and the actions you do are important (Embree 36). Nothing else is more important in the world than your personality, which is the self (atman). I dont completely agree with the Upanishadic thinker that the secular world does not matter. It does matter because our actions and the way our soul feels at certain situations, it all comes from the material world. Yes, our actions are just as important but the material world drives us to our actions that the soul does.Every act we make, every thought and every desire, shapes this and our future lives. Karma, action and the consequences of action... ...rma at a young age. A person has to be able to follow their dharma no matter, because it may not always be the right action but it has to be fulfilled because it is your dharma. Arjuna in Mahabharata did not want to kill h is own people, because he knew it was a sin. Krishna convinced him that he would commit a sin if he failed to perform his own duty (dharma) as a warrior, because a warriors duty is to fight (Embree 281). Hinduism can relate everything to each other and that is why for many it is easier to understand the whole concept of Hinduism, the atman, following your duties, achieving liberation and understanding the consequences of karma. You must perform your dharma in your life and do good karma in order to either have a better soul in the next life or to escape the cycle of samsara. If one does not obtain or fulfilled, one may not achieve liberation.
Wednesday, May 29, 2019
King George I :: essays research papers
King George IKing George I was born in 1660 at Osnabuuck, the eldest son of Ernest Augustus-Duke of Brunswick-Lunchburg and first voter of Hanover. Because his father was the Elector of Hanover, George was the Electoral Price of the Empire. He was also in the imperial army, who faced battles against the Dutch, the Turks, Nine Years War, and in the War of Spanish Succession. George curtly became a talented and experienced General. He went on to command in many wars. He eventually became lector of Hanover in 1698(2001 World Book Encyclopedia).George I married Sophia Dorothea, heiress of Duchy of Brunswick and Zell, in 1682. He and his cousin Sophia had one boy and one girl before the marriage turned sour. George was a uncool husband with many mistresses while Sophia had many close guy friends. In 1694, George divorced Sophia and accused her of adultry. Being a prominent male in Hanover, the hereafter king of England had her put into prison for 32 years, where she died in 1726.Georg e I became King of England in 1714 when his distant cousin Queen Ann died. After Anns last survive child had died in 1700, many people claimed that only her half brother James Francis Edward Stuart, a Roman Catholic and son of King James II, had mightily to succeed her. In 1701, the parliament passed an Act of Settlement that made sure no Catholic would be Monarch. The act provided that Princess Sophia, a Protestant, would succeed Ann as principle of England unless Ann had another child. Sophias son George, became heir to the throne in August 1714(The Royal Heraldry of England).King George was 54 years of age when he took the throne. He was verbalise to be undignified without the slightest knowledge of the English language. This prevented him from taking part in cabinet councils. He never bothered to learn the language of his new kingdom, although he already knew Latin, French, and Italian. George also showed no appreciation for the English culture. Englishmen Samuel Johnson sum marized his thoughts on King George by saying, George I knew zipper and desired to know nothing do nothing and desired to do nothing,(Western Civilization Volume II).Due to Georges little interaction with parliament, it further asserted itself with a new coronation of oath, requiring each sovereign to swear to obey parliamentary statutes. It established a mandatory term of office for itself, gained tighter control over the budget and army, and produced a Bill of Rights that guaranteed citizens many liberties.
International Adoption Essay -- Social Issues, Adoption
The necessity of credence in the world is astounding. Currently, there is an estimated 143 million orphans worldwide (Wingert, vol.151). As of 2007, there were 513,000 children living in nurture care within the United States alone (Rousseau 2114). International adoption in the United States was jumpstarted post World War II as a way of helping those children who were left homeless, after war had reckonn their parents. Although there are thousands of healthy children awaiting adoption in the United States, several American couples tranquilize turn to foreign adoption when seeking potential children. Americans often fail to realize the need for intervention within their own country and their duty to take care of domestic affairs before venturing to other countries to attempt to rescue foreigners in need. International adoption in the United States must be abolished, since it is injurious to prospective parents and their potential children. Injustices surrounding international ado ption often results in a harmful impact on the children involved. Hollingsworth examines the harmful implications that are associated with international adoption The adoption of children from other countries by U.S. families presents the risk that these children will be deprived of an opportunity to know and have access to their birth families- an infringement on the introductory rights of these children compared with more advantaged children in their country of origin or in the United States. (48209)International adoption can result in a lost club to a childs culture. This loss of culture confuses the child who is now forced to grow up in an American society that is so unalike than what they are used to. Children, who can be domest... ...at is only seeking to profit, instead of to unite children with families who care. For young children to be removed from ones family of origin or be killed or forever ostracized is not a choice that should be imposed on the worlds children (Hollingsworth 48209). Just because the faces of the neglected offspring of America are not flashed across the television screen or plastered on posters, does not mean they do not exist. The ignored young person of America need people to care for them as if they were born into their family. Hollingsworth expresses his realization that childrens rights to be raised in a safe healthy purlieu by their biological families and in their cultures of origin are primary and should be equally available to all children(48209) especially those in the United States, where the protection of the spring chicken is crucial.
Tuesday, May 28, 2019
Journey To Self-Destruction in Ken Keseys One Flew Over the Cuckoos Nest :: One Flew Over Cuckoos Nest
Journey To Self-Destruction in One Flew Over The Cuckoos Nest In One Flew Over The Cuckoos Nest, the character of Randle P. McMurphy undergoes a gradual journey towards self-destruction. His actions go from the minuscule, such as changing minor ward policies, to the act of trying to suppress Nurse Ratched. All of his actions, minor and major, lead to his self-destruction. He continues this behavior even after he discovers hes only hurting himself with his actions. McMurphy begins by protesting minor but substantive defects of the ward policies. When he first arrives, he runs around in nothing but a towel and provokes shock and anger from the Big Nurse. His actions let the absorbs and patients drive in that he wont simply sit back and take the staffs cruel treatment to get the patients to conform quietly and without protest. He begins to gamble with the patients, first for cigarettes and eventually for IOUs, scorn the nurses rule of no gambling on the ward for m peerlessy (Kesey 102). He also convinces the spineless Dr. Spivey to allow the patients to open up a separate daylight room for their card games. He uses the doctor to implement these changes, which aggravates the nurse because it takes away her power. The resentment between McMurphy and Nurse Ratched continues to build. McMurphy brings about all these changes before he realizes one vital fact Nurse Ratched is the sole determiner of how long he must stay in the ward. Hes watching television while everyone else is completing their chores. The nurse says to him, Youre committed, you realize. You are ... under the jurisdiction of me...the staff...Under jurisdiction and control- (138). The nurse also says, Keep in mind that Mr. McMurphy is committed. The length of time he spends in this hospital is all in all up to us (150). McMurphy relaxes slightly however, he eventually continues to harass the nurse, despite his knowledge that she dictates the length of his confinement (Waldmeir 425). He crosses th e line and throws a party on the ward in the middle of the night, bringing in two prostitutes and intoxicating the patients with a mixture of cherry flavored alcohol and codeine cough syrup. He does so sharp that he will face consequences for this event. However, he feels he must continue this self-destruction in order for the other patients to find themselves and their sense of freedom ( 427).
Journey To Self-Destruction in Ken Keseys One Flew Over the Cuckoos Nest :: One Flew Over Cuckoos Nest
Journey To Self-Destruction in One Flew Over The Cuckoos Nest In One Flew Over The Cuckoos Nest, the character of Randle P. McMurphy undergoes a gradual journey towards self-destruction. His actions go from the minuscule, such as changing minor ward policies, to the act of trying to strangle Nurse Ratched. All of his actions, minor and major, lead to his self-destruction. He broadens this behavior take down after he discovers hes only hurting himself with his actions. McMurphy begins by protesting minor but significant defects of the ward policies. When he first arrives, he runs around in aught but a towel and provokes shock and anger from the Big Nurse. His actions let the nurses and patients know that he wont simply sit back and take the staffs cruel intervention to get the patients to conform quietly and without protest. He begins to gamble with the patients, first for cigarettes and eventually for IOUs, scorn the nurses rule of no gambling on the ward for money (Kesey 102). He also convinces the spineless Dr. Spivey to allow the patients to open up a separate day room for their card games. He uses the doctor to implement these changes, which aggravates the nurse because it takes out her power. The resentment between McMurphy and Nurse Ratched continues to build. McMurphy brings about all these changes before he realizes one vital fact Nurse Ratched is the sole determiner of how long he must stay in the ward. Hes watching television while everyone else is completing their chores. The nurse says to him, Youre committed, you realize. You are ... under the jurisdiction of me...the staff...Under jurisdiction and control- (138). The nurse also says, animation in mind that Mr. McMurphy is committed. The length of time he spends in this hospital is entirely up to us (150). McMurphy relaxes slightly however, he eventually continues to harass the nurse, despite his knowledge that she dictates the length of his confinement (Waldmeir 425). He crosses the line a nd throws a party on the ward in the middle of the night, bringing in two prostitutes and excite the patients with a mixture of cherry flavored alcohol and codeine cough syrup. He does so knowing that he will face consequences for this event. However, he feels he must continue this self-destruction in order for the other patients to find themselves and their sense of freedom ( 427).
Monday, May 27, 2019
An Adolescent Ailment
Gun Violence An Adolescent Ailment BY Arod56 On an unseasonably cold March morning in 1993, amply school sophomore Edward Gillom exited his first period classroom and made his way through the displace hallways of Harlem High School. After engaging in a heated argument, allegedly over a girl, with Ronricas Pony Gibson and Ricoh Lee, Gillom pulled out a . 38-caliber blast and opened fire. Gilloms shots fatally wounded Gibson and left Lee with a non-fatal gunshot wound to the neck (Washington Ceasefire, 2011 pg 1).The shooting in Harlem, Georgia s equatingked national attention as one of the first uplifted school shootings nd added to the alarmingly high rates of gun violence by adolescents during the 1990s. According to the Virginia Youth Violence Project, forty-two homicides took place in American schools in 1993 (2009 pg/par). While the rate of gun violence in American schools has accrued substantially since the early 1990s, the death rate for adolescents due to parts in the g et together States is still higher than in any other industrialized nation (Vittes, Sorenson, &ump Gilbert, 2003 pg/par).The current generation of American teenagers has grown up surrounded by gun violence in the ews in their video games and in the television programs they watch. In the last twenty years, the United States has seen an upsurge of gun related crimes among adolescents as a result, political leaders and their constituents rent become outraged at how accessible the nations gun laws make firearms to children and the mentally unstable to obtain, especially considering the dramatic decrease of gun control, which will inevitably lead to increased gun crimes involving teenagers and young adults.Thomas Jefferson, the third president of the United States once said, No free man shall be debarred the use of arms. The constitutional right to keep and bear arms stems from the right to self-defense, and in the 2008 Supreme Court slickness District of Columbia v. Heller, the courtr oom ruled that the Second Amendment protects a pre-existing individual right to keep and bear arms ncluding, the individual right to possess and carry weapons in case of confrontation (National Rifle Association, 2011 par 4). Although the Constitution gives individuals the right to bear arms, it does not exclude prohibitions on the possession of firearms by felons and the mentally ill, or laws forbidding the carrying of firearms in sensitive places or laws imposing onditions and qualifications on the commercial sale of firearms, (Romano ump Wingert, 2011 par 13).In recent years here has been much discussion among the nations lawmakers and their constituents as to whether or not the Second Amendment is still constitutional the question is whether or not the Second Amendment should be revised, to prohibit the sale of firearms to those who do not meet authentic conditions and qualifications, or even removed from the constitution. According to a national survey of 1 ,005 high school st udents, conducted by Vittes, Sorrenson and Gilbert, 63. percent of high school students guess that regulating he sale of guns does not violate the constitution (2003, pg 12). In the same survey, 64. 6 percent responded that they would support stricter laws addressing the sale of firearms, and 82. 2 percent of those surveyed, see that the government should make and enforce laws making it more difficult for criminals to obtain a guneven if it means law abiding citizens would have a harder time purchasing guns (2003, pg 9).While the probability ot the Second Amendment being removed trom the Constitution is highly unlikely, the regulations that pro-gun control lobbyists have suggested seem incredibly logical. But despite the seemingly widespread support of stricter gun control, the gun control legislation that many Americans would like to see has yet to be passed by congress. According to the Center for antiphonary Politics, in 2008 the National Rifle Association, the largest anti-gu n control agency, spent 2. million dollars lobbying for pro-gun legislation, which is forty one times more than what gun control lobbyist could spend (Romano &ump Wingert, 2011 par 7). The Gun Control Act of 1968, which is a revision of the National Firearms Act of 1934, established regulations for the selling of firearms and was passed in an effort to educe the amount of illegal firearm sales, to confine the sales of firearms to the buyers state and to restrict certain people from, buying, selling, or transporting firearms (National Rifle Association, 2011b pg/par).As a result, national law prohibits the sale of firearms to those whom are currently at a lower place indictment for a felony, have been convicted of a felony, an illegal alien, a fugitive from the law, has been dishonorably discharged from the military, addicted to illegal narcotics or are non- residents of the state in which they are trying to purchase a gun (National Rifle Association, 2011b pg/par). Despite these la ws, lack of enforcement allowed individuals like Seung-Hui Cho and Jared Loughner, the shooters at the 2007 Virginia Tech massacre and the 2011 Tucson, Arizona shooting, to obtain firearms and handle the lives of innocent people.The longer these laws go unenforced the longer gun violence crimes will continue to rise. There have been three noticeable periods in story during which the rates of adolescent gun violence peaked dramatically1972-74, 1980 and 1992-3, with 1992-3 being the most dramatic increase (Wilkinson &ump Fagan, 2001 pg 110). During the fourteen year timespan etween 1997 and 2011 there have been one-hundred and eighty-seven shootings on public school property in the United States (The Brady Campaign to Prevent Gun Violence, 2010).In their study of adolescents and their exposure to gun violence Wilkinson and Fagan give tongue to that, Although violence has been a recurrent theme for decades among urban delinquency, youth gun violence has become more prevalent and mor e concentrated spatially and socially in the past two decades. Starting in 1985, gun violence among teenagers rose sharply in prevalence it diffused quickly through a generation of teenagers it sustained a high prevalence and incidence for ver 5 years and it has declined steadily in the past several years.This patter resembles nothing little than the outbreak of a contagious disease (Wilkinson ump Fagan, 2001 pg 109). Although this study was conducted in 2001, its findings remain true, according to the National Institute of Justice since 2002 the prevalence of adolescent gun violence in America has risen steadily since 2000 (2010, chart 1). This outbreak of violence among youth is most prevalent and abundant in urban communities with high rates of low-income families and gang activity like Chicago, Illinois.In their 2009 report on youth violence in Chicago Roseanna Ander, Phillip Cook, Jens Ludwig and Harold Pollack stated that, Over the past 50 years, our society has made far less progress in understanding how to protect our citizens from violence than from all manner of disease.
Sunday, May 26, 2019
Costco Case Study Essay
Jim Sinegal and Jeff Brotman in Seattle Washington founded Costco Wholesale in 1993. Costco merged with Price Club, and doubled their market sh atomic number 18 in the wholesale industry. They became an immediate leader in the industry. Costcos sales model is to sell a wide variety of products for low prices at a naughty great deal. These brand-name products are sold at a discounted price to their members. Customers of Costco must pay a membership fee in order to purchase their intersection. Their focus is on guest satisfaction and a guaranteed low price for its members. They have managed to maintain a large customer base using this balance where both depressed personal line of credit and personal needs undersurface be met simultaneous.Problem StatementCostco could addition their shareholders return on investment by making changes to their business model. They are currently doing favorably with their customers and employees, but need to maximizing their potency and increase revenue enhancement. Costco seeks to increase more of the market share in the industry from surface-to-air missiles Club, their largest competitor. This can be accomplished by continuing with their growth strategy to open more stores, increase their membership, and to upgrading their merchandising techniques to motivate members to shop more often. analysis* Costco currently has 429 warehouses US 82 warehouses in Canada and 81 warehouses internationally * They have realized an increase in comparable warehouse sales of 7% in the US and 16% internationally * 14.2% increase in net sales* Costco currently employs 92,000 full-time employees and 72,000 spot-time employees * Members include Gold star 25,000 business 6,300 business add-on primary4,000 and additional card holders 28,700 * The gross margin has increased by 10.69% as a percent of net salesAlternatives* Costco can increase revenue by raising membership fees * Revenues can also be increased by removing the 15% on product markup s * Reducing the number of employees receiving health benefits provide increase revenueRecommendationThe recommendation for Costco is to see changes in their wages for their employees, benefits packages, and raising membership fees.ImplementationThe recommended changes can be gradually implemented throughout the company. The increase in membership fees would be the easiest to do first. Negotiating new rates for employee benefits pull up stakes help reduce these costs associated with providing insurance. Costco can pay their employees less to be more competitive with the wages of surface-to-air missiles Club.SummaryCostcos current growth strategy is to open warehouses, execute merchandising techniques to increase customer shopping, and to increase their membership. These efforts are an attempt to increase their shareholders return on investment. Costco has focused more on customer satisfaction and pleasing their employees. They have managed to increase their revenues each year wi thout building many stores as Wal-Mart. Costco has 417 US warehouses while Wal-Mart has 3,800. Wal-Mart has been aggressive in pursuing international acquisition by increasing the human spirit sulfur Africa and the UK. Strategy to attract more members relies on the members doing a larger percent of their shopping with Costco.Chief Executive Officer Craig Jelinek has been keeping prices low and adding more assist areas, such as vision centers, to increase store visits. (Townsend, 2012) They want to reward these members by allowing them the opportunity to purchase big-ticket items at a low price. The members leave alone be motivated to return on a weekly or monthly basis in order to have the opportunity to purchase these peculiar(a) deals. Costco has been using the term treasure hunt for years to explain why up to a fifth of its stock is limited-quantity items that are in the store for as little as a week. (Gibson, 2011) This strategy has shown some increases, but will need modifi cations.StrengthsCostco currently has about 64 million cardholders and members. The company has managed to provide ample customer service, which has resulted in members renewing their subscriptions. Employees receive an array of benefits within a month of their starting date. The generous benefits package that employees receive help build obedience to the company and its mission to their customers. Members are taken care of by the employees, and employees are taken care of by the organization.This is fostered a positive environment that has landed Costco some(prenominal) awards. Costco provides their customers with one-time opportunities to purchase products and services that may not be available at other warehouses. The merchandise sold to Costcos members has rank to be of high flavour and low price. They continue to be dominant in the retail wholesaler market because of the selection and quality of the merchandise offered.WeaknessesCostco faces the burden of finding adequate merchandise in the current financial crisis. Consumers are not buying large ticket items callable to a decrease disposable income. The demand for large volume purchases has decreased with the increase of single-parent families. The high-volume low price model has continued to work, but the economic recession has slowed its growth. Costcos employees make a higher wage than Sams employees do. These employees also benefit from a multitude of costly benefits. These expenses have caused the company to accrue less revenue. It will be difficult to maintain their moolah margin under the circumstances. Any decline in membership renewals would decrease revenues. The plan to increase warehouses may infringe on their current stores. The expenses associated with building the warehouse could negatively affect their sales in such tough economic times. Although they are behind Sams Club in number of facilities, this is not the best time to expand.OpportunitiesCostco has the potential to continue to expand on their diverse offerings. By refining their business model, Costco have the opportunity to ride the broader economic trends to larger profits and take customers from their contentions. Consumers are being more selective among the discounters such as Costco and Wal-Mart. Wal-Mart has seen an increase in competition from Costco for market share.Despite efforts by rival Sams Club, a unit of Wal-Mart Stores Inc., to improve merchandise in its warehouse clubs, Costco continues to notch higher revenue out of fewer stores in the U.S. (Zimmerman, 2011) Providing value to its members could result in Costco stealing Sams Clubs customers. There are still opportunities for Costco to expand the number of warehouses. This is a major part of their growth strategy to assist in building a larger customer base. There are intelligent expansion ideas that will help Costco. They can increase their brand internationally through expansion and by becoming a leader in social responsibility.Th reatsA major threat for Costco is potential for continued economic downturns. Customers are being more selective with their disposable income, and have chosen to downsize. Smaller quantities products have become more attractive due to these bad economic times. Costco must continue to market to the more affluent customers. The presence of price competition amongst customers and vendors will require Costco to carefully negotiate reasonable prices for the merchandise. Costco has to walk a fine line between absorbing the costs and passing them to customers because of its positioning as a warehouse club that, while ply to generally higher-end consumers, does have a reputation for offering decent prices. Competing internationally, poses the threat of economic instability abroad. Costco does not have a global presence and Wal-Mart and Sams Club. Sams Club and BJs will always pose a threat to Costco.SolutionOur recommendation to the Costco management would be to implement an increase in th e membership fees. While the increased fees could add 20 cents to 25 cents to earnings per share over the bordering two years as memberships are renewed, Janney analyst David Strasser expects roughly half of the fee increase will be used to hold down prices(Wohl, 2011). Costco employees compensation should be familiarised competitively to their competitors. The number of employees receiving benefits reduced to relieve expenses. We recommend that Costco increased to 15% placed on the product markups to 20%. Implementing these recommendations will result in an increase in company revenue and the shareholders return on investment.Implementation* A 10% increase in membership fees will begin in the next quarter * Increased the product mark up from 15% to 20% * Adjust the employee compensation to 10% of the market value * Increased revenue will be added to the shareholders return on investmentReferencesGibson, E. (2011, July 09). Stores find success by focusing on the bargain hunt. USA T oday. Retrieved from http//usatoday30.usatoday.com/money/industries/retail/2011-07-09-stores-bargain-hunt_n.htmTalley, K. (2011, May 26). Costco feels pompousnesss effect.WSJ. Retrieved from http//online.wsj.com/article/SB10001424052702304520804576344900721794900.htmlTownsend, M. (2012, October 10). Costco profit tops estimates as low prices drive traffic. Bloomberg Businessweek. Retrieved from http//www.businessweek.com/news/2012-10-10/costco-profit-tops-analysts-estimates-as-prices-drive-trafficWohl, J. (2011). Costco raises membership fees profit misses view. Reuters, Retrieved from http//www.reuters.com/article/2011/10/05/us-costco-idUSTRE7942D620111005Zimmerman, A. (2011, September 02). Costco ceo to tempo down. WSJ. Retrieved from http//online.wsj.com/article/SB10001424053111903895904576544883964721042.html
Saturday, May 25, 2019
Freedom and Slavery
The United States promotes that freedom is a right deserved by every humanity. Throughout the history of America the government has found ways to deprive selected people this right by race, gender, class and in other ways as well for its own benefit. This is a boundary of freedom. Boundaries of freedom outline who is able to enjoy their freedom and who isnt. These people alter with time and as history unfolds. slavery and the journey of their freedom was a big part of the foundation of the United States. At the beginning of the Civil War, Lincolns goal was to restore the compass north and planned on keeping slavery present in the states.African Americans journey to freedom and what freedom means was a long and degraded one. With the British colonies being established in the New World, a source of cheap application was needed. The Slave Trade was introduced into the colonies from Africa. Slaves were an important part of the success of this rude(a) economy being built. 7. 7 milli on African Americans were estimated to be transported to the New World between 1492 to 1820. They were treated like other goods and were sold through the angulate trade route across the Atlantic. Slavery had its advantages to Englishmen.They couldnt claim the protections the English law offered, their time of work neer ended and their children were born into slavery and owned by the master as well. They also had encountered many diseases known to Europe and were less likely to capitulate to diseases. Slavery began to replace indentured servants on the Chesapeake plantations. To the figure plantation owner, it became more economical to buy motor for life, or a slave that you owned until they died. Slaves could be sold, passed on to family members, and leased. No black could own coat of arms or put their hands on a white or else they were faced with entire consequences.Also, if off the plantation, a white person could ask a black to provide their freedom certificate or a note o f permission to be off the plantation from the master they also faced extreme consequences. Slaves were like children to whites. They could not rebel without repercussions and could not betray or leave their owner. They had free labor that could not go anywhere slavery was a gigantic benefit and was like a dream for a plantation owner. They were essential to production and cultivation of crops and plantations. By 1700, slavery was existent in all of the colonies.The sept of Burgesses realized that slaves were an extremely important part of the labor force and therefore, to the economy. A new slave code was enacted in 1705 stating that slaves were property of their owners and to the white community. Slaves were the legal right of the master and if they started to rebel it was the masters obligation to keep them in line. Slavery also brought a new division of people to the New World. The slaves that were transported to the colonies for labor were not all from the same culture, race or society.They spoke different languages, had diverse customs and had many various religions. Many of these people would have never come in contact with each other if not for this slave trade. An overall stereotype of Africans was what they now where known as. There cultures and ideologies emerged into a single background and ancestry for people born into this lifestyle and they no longer came from different tribes or kinships. There new culture was based on African traditions, English fundamentals and American standards. This could almost be considered as the first installment of America becoming known as a warming pot.Slavery was a huge part of the development of the New World and to the rise of its commercial supremacy. In Britain the profits from the slave trade encouraged the issue of ports, banking, ship building and helped to finance the industrial revolution. It also boosted the colonies wealth and set the foundation for the strong economical society it would later becom e. As a historiographer would later transcribe The growth and prosperity of the emerging society of free colonial British America were achieved as a result of slave labor.
Friday, May 24, 2019
Notes of a Native Son Essay
Notes of a immanent Son SummaryJames Baldwin uses a lot of ethos in his essay to fork out his note as a black man encountering the hardships during his era. Despite being a generation of now free men, Baldwin tells his everyday situation and responses he received that show that he was not close at all to being free in the society. It is with this story we get to cope with his idea of fighting the injustice grow to bloom, and led him to become a well-known writer exploring the social issues in the mid-20th American era. Baldwin made it clear that before he developed a genuine hatred towards the whites, he never felt that there was a difference between his white friends and his black friends and everyone was treated the same. This is still a situation we analyse today where children would play with other children regardless of their background but as they grew up, society puts the stereotypes in their heads and saw the world differently, in which Baldwin would grow up to see the world different as well. If there is a revolving theme around this story, it is the theme of birth. In the beginning, there was a physical birth of James Baldwins sibling, moments after his father died. This could metaphorically translate as his fathers legacy being carried down through another child.James Baldwin Notes of a Native Son AnalysisThe ending was a birth of an idea, of how his fathers death and all the experiences Baldwin had encountered translated into an idea of fighting the injustice he was receiving. One term that stood out to me in the passage was perdition. Baldwins father claims that Baldwins nave perspective of the whites was going to send him to perdition. Perdition has an extremely strong meaning, and in the Christian context, it is used to describe people who chose to turn away from God and thus cannot be saved nor forgiven, in a way being sent to the constant pits of hell. Baldwins father is sending out a warning of what is yet to come for Baldwin, who wou ld see how his view about the world will be changed unceasingly by his life in New Jersey and that one American Diner situation. Baldwin would see the world the same way his father had seen, with the same tartness his father carried till his death. Baldwin said that he had contracted a blind fever, which I believe that the blind fever was a metaphorical way of describing the steamy build-up of the treatment he received as a black man.Works CitedHochstetler, J. M. Native Son. Grand Rapids, MI, Zondervan, 2005.Native Son. Wikipedia, Wikimedia Foundation, en.wikipedia.org/wiki/Native_Son.Wright, Richard. Native Son. New York, Harper &Amp Bros., 1940.
Thursday, May 23, 2019
Food technology portfolio sac paper Essay
To demonstrate satisfactory completion of Unit 3, Outcome 3, you mustiness(prenominal) present evidence of the development of a form instruct, evaluation criteria and a fancy plan. This document is a frame work for the development of the sit. It provides a step-by-step mount to completing wholly of the comp unriv allednts of the confinement so that you ar able to complete all of the assessment criteria to the elevatedest level. The task is more manageable if you type all your documents as you go. This leaveing save a helping of time and pull it easier to incorporate corrections from your draft.When setting up a newly folder for your SAT on your computer, separate folders for individual components of the task. However, it is recommended that the enquiry and the drudgery nones for severally individual feed item are watchful in the one document. This entrust enable you to hear that the footnoting in this document is sequential. REMEMBER TO SAVE YOUR WORK IN MORE T HAN ONE PLACE AND TO BACK-UP YOUR WORK EACH TIME YOU WORK ON THE TASK. As you undertake research, remember to record all sources of information you need employmentd and footnote any material that is directly cited or copied.Start you bibliography as curtly as you begin your work on the SAT. More information about citing reference and writing your bibliography will appear later in the booklet. It is al expressive styles instrumental to proof read your draft to pick up mistakes 4 Unit 3 / 4 intellectual nourishment and Technology SAT 2012 Criteria for Assessment Unit 3 Food preparation, processing and nutrient controls Area of examine 3 Developing a design plan Outcome 3 Develop a design brief, evaluation criteria and a design plan for the development of a victuals for thought product. Unit 4 Food product development and emerging tends Area of study 1 Implementing a design planOutcome 1 Safely and hygienically implement the output plans for a set of four to six viands item s that comprise the product, evaluate the sensory properties of the food items, evaluate the product using the evaluation criteria, and evaluate the efficiency and effectiveness of production activities. Criteria 1 Design drawing and Evaluation Criteria Criteria 3. Skill in developing a design brief and evaluation criteria ? Skill in developing a design brief including background and specifications (considerations and constraints) ? Skill in developing applicable evaluation criteria that relate to the design brief context and specifications.Very last Comprehensive, coherent and relevant information is provided in a actually well structured design brief with a clear and thorough description of the context. The specifications in the design brief (considerations and constrains) are very cl primeval identified. A array of very clearly expressed, relevant evaluation criteria reflect all the information contained in the design brief context and specifications. 5 Design Brief ? clear ly defines the context, aims and intentions of a new product? accommodates specifications considerations and constraints that train to be taken into account when making decisions in relation to the design of the new product ?Must be a problem that the learner will attempt to solve ? must be developed and written by the student (not by the t separatelyer) ? must allow students to demonstrate key knowledge and skills. There is no word limit on the length of the design brief. The VCAA has a PowerPoint demo In the beginning Developing an effective School-assessedTask design brief available at www.vcaa. vic. edu. au/vce/studies/foodtech/foodtechindex. html Example www. vcaa. vic. edu. au/vce/studies/foodtech/foodtechindex. html Of all the sports I aim ever played, surf is without doubt my favourite. I really apprizet remember a time when I suck upnt been able to surf. My grandma and Pa have had a ho hold at Torquay since I was just a toddler and so we have spent around weeke nds there every summer. My Pa was one of the original surfies at Jan Juc and other beaches a keen-sighted the surf coast and he taught me to surf when I was really young. both of my friends from school, Ben and Sam, are withal keen surfers and so we have decided to head to the surf for a couple of days after our last-place exams in early December for our own Shortboard Classic. My Nan and Pa have offered to let us stay at their house on Friday and Saturday but we will essential to take virtually of our own supplies as I dont want Nan to have to do all of the meal preparation. As I quite enjoy provision, I have decided to make some of the main food items we will eat over the two days. We will affect some food items for a day-to-day dinner on Friday and breakfast and lunch on Saturday.I will similarly need to prepare some savoury and sugariness snack items we cannister take to the beach, as we will no doubt be hungry after spending so long in the water. On Saturday night we will have a celebratory dinner with my Nan and Pa before we leave and so I will need to make a sweet to share for dinner. The dessert needs to be quite special and look spectacular so that it is the grand completion to a owing(p) weekend. Just as importantly, I can show my Nan that all the hours she spent teaching me how to cook while we were staying at Torquay werent wastedThe food will also need to be appealing to us and reciprocate our healthy appetites. As we will be leaving for Torquay substantial after our last exam, all of the food needs to be prepared several weeks in advance and have exhaustively keeping qualities. I also want to use a renewing of complex processes so that the products I produce are of a very high quality. My Nan is a great fan of television cooking shows and I want to show her that I am now quite a skilled cook too notwithstanding if not yet in the federation of the experts on her favourite show 6.IDENTIFY a theme, event or context. WHO Who has as ked you to prepare the product? This might be an individual or a representative of an organisation. Remember to outline or describe some background information about who the product is being prepared for to inform the reader. WHY Why is the product needed? Discuss the reason or purpose the product needs to be prepared. 7 WHAT What needs to be prepared? This should be a simple outline or general statement about the product. WHEN When the product is to be prepared by or served or available.WHERE Where the product is to be served, displayed or used. 8 Developing your brief Once you have established your ideas, use the 5 Ws chart to spare your detailed design brief. Remember to use complete sentences and paragraph format. These five components will form one or two paragraphs of the design brief. Scope of the task this information must also be included as a part of your design brief A range of 4-6 food items Use at least 4 different complex processes in the production work to produce s high quality food9 Specifications & Criteria for Evaluation You now need to use the information in your design brief to develop the criteria for evaluation. The first step is to identify the specifications (constraints and considerations) in your design brief. 1.On your design brief underline or highlight the specifications. Alternately you could make a list of the specifications. It is important that these are clearly identified. Specifications are the issues or barriers that have been identified in the brief. They will need to be addressed when working through the design process. Considerations are flexible restrictions issues or aspects that need to be taken into account when planning a product. Constraints are restrictions, over which the designer has little control, that affect the development of the product. 2. Using the specifications identified, develop approximately 5 to 6 relevant evaluation criteria questions.If you have a lot of specification you might want to combine more that one specification into a question. a. Must be relevant/related to your design brief. b. Must be written before the product or the food items are made c. Should be a set of open-ended questions that need more than yes or no as an answer d. Need to be well-written and clearly expressed 3. These questions will be used to evaluate the set of food items as a star product rather than individual items once you have completed your production work. Students should write clear and in depth responses to evaluation questions. These responses form part of the evaluation component of the task after all the food items have been made. 10 Example www. vcaa. vic. edu.au/vce/studies/foodtech/foodtechindex. html Of all the sports I have ever played, surfing is without doubt my favourite. I really cant remember a time when I havent been able to surf. My Nan and Pa have had a house at Torquay since I was just a toddler and so we have spent most weekends there every summer. My Pa was one of th e original surfies at Jan Juc and other beaches along the surf coast and he taught me to surf when I was really young. Two of my friends from school, Ben and Sam, are also keen surfers and so we have decided to head to the surf for a couple of days after our final exams in early December for our own Shortboard Classic.My Nan and Pa have offered to let us stay at their house on Friday and Saturday but we will need to take some of our own supplies as I dont want Nan to have to do all of the meal preparation. As I quite enjoy cooking, I have decided to make some of the main food items we will eat over the two days. We will need some food items for a casual dinner on Friday and breakfast and lunch on Saturday. I will also need to prepare some savoury and sweet snack items we can take to the beach, as we will no doubt be hungry after spending so long in the water.On Saturday night we will have a celebratory dinner with my Nan and Pa before we leave and so I will need to make a dessert to share for dinner. The dessert needs to be quite special and look spectacular so that it is the grand finale to a great weekend.Just as importantly, I can show my Nan that all the hours she spent teaching me how to cook while we were staying at Torquay werent wasted The food will also need to be appealing to us and satisfy our healthy appetites. As we will be leaving for Torquay straight after our last exam, all of the food needs to be prepared several weeks in advance and have good keeping qualities. I also want to use a variety of complex processes so that the products I produce are of a very high quality. My Nan is a great fan of television cooking shows and I want to show her that I am now quite a skilled cook too even if not yet in the league of the experts on her favourite show Research.Criteria for Evaluation 1. Have I been able to prepare a range of food items suitable for a casual dinner on Friday and breakfast and lunch on Saturday? 2. Was I able to produce some savoury and sweet snack items suitable to take to the beach? 3. Did the range of food items include a special dessert to share for dinner on Saturday night? 4. Will the food be appealing to young males and will it be filling enough to satisfy healthy appetites? 5. Was all of the food able to be prepared several weeks in advance and did it have good keeping qualities? 6. Did I use a variety of complex processes in the preparation of the products to produce high quality products?Constraint food items for dinner on Friday, and breakfast and lunch on Saturday Consideration types of food for brecky, lunch and dinner Constraint sweet snacks to take on the beach Consideration the type of sweet snacks Constraint dessert to share at dinner that looks spectacular Consideration the type of dessert Constraint food needs to look appealing and satisfy healthy appetites Constraint food will need to be prepared several weeks in advance and have good keeping qualities Constraint products of high quality Con sideration use a variety of complex processes 11 Criteria 2Design Plan Criteria 3. Skill in completing research relevant to the design brief, developing ideas, and documenting decisions. ? Skill in completing a range of research relevant to the specifications in the design brief. ? Skill in exploring ideas for possible food items in response to the design brief. ? Skill in selection and justification of the decision made for the set of four to six food items (the product) Very High Comprehensive range of relevant research related to the specification in the design brief. Very detailed exploration and creative formulation of a ample range of ideas in the selection of the set of food items (The product).Highly detailed documentation of thought processes and thorough justification of decision making related to the suitability of selected food items, and detailed reasons wherefore some have be en rejected. 12 Research and exploration After writing your design brief you will need to a sk yourself the following question What information do you need to know about your theme or idea to help scarper your food ideas and final selection?You will need to explore a range of ideas or alternatives in order to make informed decisions about what food items you would equivalent to produce to solve the problem outlined in your design brief. There needs to be creativity in the selection of food items and decisions made in order to solve the problem set out in the brief.This information must be directly related to the specifications in the design brief and should be no more than approximately one to two A3 pages. You will need to use a range of primary and secondary sources. When exploring ideas in order to make decisions students should make use of Existing solutions e. g. recipe books Guiding information from people, internet recipes, books, magazines, television etc Primary and secondary sources of information o Primary sources include ? tour a super commercialize or fres h food market to observe particular varieties of produce ?Interviewing a grower at a farmers market ? Interviewing a person with expert food knowledge ? A visit to a restaurant to sample new foods o Secondary sources include ? Books ? Magazines? Websites ? daybook articles It is very important that students acknowledge all sources of information using a recognized reference system with footnotes and a bibliography. 13 Example brainstorming ideas You must footnote all of the resources you have used to gather this information.Remember to write the information from your secondary research in your own words and do not include downloads or screen dumps from websites. Prepare a diagram to outline useful information about components or characteristics of the food items that will guide your recipe search and meet the needs of the design brief. You should include 4-5 ideas for each food item.This is not a recipe search but a way of documenting some of your thought processes after you have s tarted your research. This may be a simple, hand-drawn map mind map to capture your initial thought or it can be produced using a software package such as Inspiration or Mindmanager. 14 Selection of recipe ideas Now you must research possible recipe ideas based on the information in your mind map. You will need to have at least three (3) possible ideas for each food item that must also meet the specifications in the design brief. Your selection of the food items MUST be creative and of a Year 12 standard. You will need to make decisions about which products will be most appropriate.It will be helpful to consider the following points before you make your final decision You need to prepare a minimum of four and a maximum of six items Make sure you have the food preparation skills compulsory to prepare each food item to a high quality. Be creative with the selection of food items consider interesting combinations of ingredients, as well as the presentation of each item. Try to be objective in selecting products and dont just choose food items because they are ones you are familiar with or are special favourites Make sure that some food preservation techniques are included in the selection of products. You must also use a range of complex processes in the production processes as well as a variety of cooking techniques. Food solutions 3 & 4 Third reading 2010, pg172.Reference multifactorial Process Cooking proficiency / preservation Comments about how the product will creatively meet the needs of the design brief. Food degree 1 pattern stimulate Recipe find 15 Design Ideas Recipe Ideas Reference Complex Process Cooking Technique / Preservation Comments about how the product will creatively meet the needs of the design brief. Food Item 1 Recipe Name Recipe Name Recipe Name 16 Reference Complex Process Cooking Technique / Preservation Comments about how the product will creatively meet the needs of the design brief. Food Item 2 Recipe Name Recipe Name Recipe Name 17 Reference Complex Process Cooking Technique /Preservation Comments about how the product will creatively meet the needs of the design brief. Food Item 3 Recipe Name Recipe Name Recipe Name 18 Reference Complex Process Cooking Technique / Preservation Comments about how the product will creatively meet the needs of the design brief. Food Item 4 Recipe Name Recipe Name Recipe Name 19 Reference Complex Process Cooking Technique / Preservation Comments about how the product will creatively meet the needs of the design brief. Food Item 5 Recipe Name Recipe Name Recipe Name 20 The following will record your final selection of food items that will make up your product for production.Hint use your criteria for evaluation as a way of making decisions about which food items to select as part of your final product. Food Item Specification Complex Process Cooking Method Preservation Technique Item 1 Item 2 Item 3 Item 4 Item 5 Item 6 21 Justification of selected food items You must justify each of the food items you have selected individually. The justification for each food item should be approximately 100 to 150 words in length. Your discussion should outline how the item meets the specifications in the design brief and may include some or all of the following o identification of the product o how the product relates to the theme o how the product will meet the other specifications/needs of the brief o identification of any complex process that will be used to prepare the food item o identification and description of cooking methods o if applicable, discussion of the preservation techniques to be used for this item o a discussion of the creativity of the food item o an explanation of why each of the other two recipe ideas were not selected. 22 Criteria 6Overall production timeline, individual food item production plans and production work Criteria 6. Skill in development, organization and implementation of planning for production. ? Skill in developing an overall production timeline.? Skill in developing individual production plans for each food items to be made. ? Skill in organisation and implementation of the overall production timeline and individual food item production plans to complete the food items. Very High Completing of a cohesive, carefully considered sequence and clearly presented overall production timeline. Development of a very detailed individual production plans for each food items to be made. A very high level of organisation demonstrated throughout the completion of the food items. * Food orders, production plans all submitted by due dated.* Need to include presentation in any planning documentation. 23 Overall Production Plan The next step in the development of your design plan is to prepare an overall production timeline showing how you will prepare all of the 4 to 6 items you selected in the time you have available. This will help you to organize the sequence in which you will produce each of the chosen fo od items. It should take into account the length of time each food item takes to prepare along with other commitments Individual work plans will be prepared later.The type of information you will need to include on your overall production timeline is The date each food item will be produced Any preparation which needs to be done introductory to preparing the food item such as soaking dried fruit for jam, marinating of meat, selecting jars for preserved products, collecting props for photography.-Note any other important school or personal commitments you will have during this period which will have an impact on you over this time. 24 March 2013 SUN MON TUES WED THUR FRI 31 SAT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Notes 25 April 2013 SUN MON TUES WED THUR FRI SAT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 15 NotesMay 2013 SUN MON TUES WED THUR FRI SAT 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 15 Notes 27 June 2013 SUN MON.
Wednesday, May 22, 2019
Comptia a+
CompTIA A+ Essentials (2009 Edition) Objectives Exam Number 220-701 Introduction In say to receive CompTIA A+ certification a candidate must pass two trial runs. The first exam is CompTIA A+ Essentials, exam number 220-701. The CompTIA A+ Essentials scrutiny measures necessary competencies for an entry-level IT professional with the equivalent knowledge of at least 500 hours of hands-on experience in the lab or field.Successful candidates will have the knowledge required to understand the fundamentals of computer technology, webing, and security, and will have the skills required to identify hardware, computer peripheral, networking, and security components. Successful candidates will understand the basic component partality of the operating body and basic troubleshooting methodology, practice proper safety procedures, and will effectively interact with customers and peers. CompTIA A+ is ISO 17024 Accredited (Personnel Certification Accreditation) and, as such, undergoes regul ar reviews and updates to the exam documentals.The following CompTIA A+ Essentials objectives reflect the subject heavenss in the 2009 Edition of the exam and result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT professional. The percentages in this document live the relative importance of the subject areas (domains) in the associated body of knowledge, and together establish the foundation of an entry-level IT professional. This examination blueprint includes domain weighting, exam objectives, and example content.Example topics and concepts are include to clarify the test objectives and should not be construed as a comprehensive listing of all the content of this examination. Candidates are encouraged to use this document to decease their studies. The contents of the examination blueprint help prioritize topics and provide a guide of what to expect on the CompTIA A+ Essentials exam. The p rorogue below lists the domains measured by this examination and the extent to which they are represented. The CompTIA A+ Essentials (2009 Edition) exam is based on these objectives. Domain 1. 0 2. 0 3. 0 4. 0 5. 0 6. Hardware Troubleshooting, gear up & Maintenance Operating System and Software interlockinging Security Operational mental process Percentage of Examination 27% 20% 20% 15% 8% 10% 100% Total **Note The lists of examples provided in bulleted format below each objective are not exhaustive lists. Other examples of technologies, processes or tasks pertaining to each objective may also be included on the exam although not listed or covered in this objectives document. CompTIA is constantly reviewing the content of our exams and updating test questions to be sure our exams are current and the security of the questions is protected.When necessary, we will publish updated exams based on existing exam objectives. Please know that all related exam conceptualization materials will still be valid. CompTIA A+ 220-701 Objectives version 2. 0 1 of 17 Copyright 2008 by the Computing engineering labor Association. both rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. 1. 0 Hardware 1. 1 Categorize storage devices and backup media ? FDD ? HDD o Solid state vs. magnetic ? optic efforts o CD / DVD / RW / Blu-Ray ? Removable storage o Tape effort o Solid state (e. g. humb drive, flash, SD separate, USB) o External CD-RW and hard drive o Hot swappable devices and non-hot swappable devices 1. 2 condone motherboard components, types and features ? Form Factor o ATX / BTX, o micro ATX o NLX ? I/O interfaces o Sound o Video o USB 1. 1 and 2. 0 o Serial o IEEE 1394 / Firewire o Parallel o NIC o Modem o PS/2 ? fund slots o RIMM o DIMM o SODIMM o SIMM ? Processor sockets ? Bus architecture ? Bus slots o PCI o AGP o PCIe o AMR o CNR o PCMCIA ? PATA o IDE o EIDE ? SATA, eSATA ? Contrast RAID (levels 0, 1, 5) ? Chipsets ? BIOS / CMOS / Firmware o POST o CMOS battery ?Riser circuit board / daughterboard 1. 3 Classify power supplies types and characteristics CompTIA A+ 220-701 Objectives adaptation 2. 0 Copyright 2008 by the Computing engine room effort Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. 2 of 17 ? ? ? ? ? AC adapter ATX proprietary Voltage, wattage and capacity Voltage selector switch Pins (20, 24) 1. 4 Explain the purpose and characteristics of CPUs and their features ? divulge CPU types o AMD o Intel ? Hyper threading ? Multi core o Dual core o Triple core o Quad core ? Onchip cache o L1 o L2 ?Speed (real vs. actual) ? 32bit vs. 64 bit 1. 5 Explain cooling methods and devices ? Heat sinks ? CPU and case fans ? Liquid cooling remainss ? Thermal compound 1. 6 Compare and contrast entrepot types, characteristics and their purpose ? Types o DRAM o SRAM o SDRAM o DDR / DDR2 / DDR3 o RAMBUS ? Parity vs. Non-parity ? ECC vs. non-ECC ? Single sided vs. double sided ? Single channel vs. dual channel ? Speed o PC100 o PC133 o PC2700 o PC3200 o DDR3-1600 o DDR2-667 1. 7 Distinguish between the different display devices and their characteristics ? Projectors, CRT and LCD ? LCD technologies o soundness (e. . XGA, SXGA+, UXGA, WUXGA) o Contrast ratio o Native resolution ? Connector types o VGA CompTIA A+ 220-701 Objectives Version 2. 0 Copyright 2008 by the Computing applied science Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. 3 of 17 ? o o o o Settings o o o o HDMi S-Video Component / RGB DVI pin compatibility Refresh rate Resolution Multi-monitor Degauss 1. 8 Install and configure peripherals and input devices ? Mouse ? Keyboard ? Bar code commentator ? Multimedia (e. g. web and digital cameras, MIDI, microphones) ?Biometric devices ? Touch screen ? KVM switch 1. 9 summarise the function and types of adapter cards ? Video o PCI o PCIe o AGP ? Multimedia o Sound card o TV tuner cards o Capture cards ? I/O o small computer organization interface o Serial o USB o Parallel ? Communications o NIC o Modem 1. 10 Install, configure and optimize laptop components and features ? Expansion devices o PCMCIA cards o PCI Express cards o Docking station ? Communication connections o Bluetooth o Infrared o Cellular WAN o Ethernet o Modem ? Power and electrical input devices o Auto-switching o Fixed input power supplies o Batteries ?Input devices o Stylus / digitizer CompTIA A+ 220-701 Objectives Version 2. 0 4 of 17 Copyright 2008 by the Computing engine room Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. o o Function keys Point devices (e. g. touch pad, point stick / track point) 1. 11 Install and configure new(a)spapermans ? Differentiate between printer types o Laser o Inkjet o Thermal o Impact ? Local vs. network printers ? Printer drivers (compatibility) ? Co nsumables 2. 0 Troubleshooting, Repair and Maintenance 2. Given a scenario, explain the troubleshooting surmisal ? Identify the line o Question the exploiter and identify user changes to computer and perform backups before making changes ? Establish a theory of probable scram (question the obvious) ? Test the theory to determine cause o Once theory is confirmed determine next steps to resolve problem o If theory is not confirmed re-establish new theory or escalate ? Establish a plan of action to resolve the problem and implement the solution ? drift full transcription functionality and if applicable implement preventative measures ?Document findings, actions and outcomes 2. 2 Given a scenario, explain and interpret universal hardware and operating trunk symptoms and their causes ? OS related symptoms o Bluescreen o System lock-up o Input/output device o Application install o Start or load o Windows specific printing problems ? Print spool stalled ? Incorrect / incompatible driver ? Hardware related symptoms o Excessive heat o Noise o Odors o Status timid indicators o Alerts o Visible damage (e. g. cable, plastic) ? enforce documentation and resources o User / installation manuals o Internet / web based o Training materials 2. Given a scenario, determine the troubleshooting methods and tools for printers ? Manage print jobs ? Print spooler ? Printer properties and settings CompTIA A+ 220-701 Objectives Version 2. 0 Copyright 2008 by the Computing engine room Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. 5 of 17 ? Print a test page 2. 4 Given a scenario, explain and interpret common laptop issues and determine the appropriate basic troubleshooting method ? Issues o Power conditions o Video o Keyboard o Pointer o Stylus o Wireless card issues ? Methods o Verify power (e. . LEDs, swap AC adapter) o Remove unneeded peripherals o Plug in external monitor o Toggle Fn keys or hardware sw itches o Check LCD shortcut switch o Verify backlight functionality and pixilation o Check switch for built-in WIFI antennas or external antennas 2. 5 Given a scenario, integrate common preventative tending techniques ? Physical inspection ? Updates o Driver o Firmware o OS o Security ? Scheduling preventative maintenance o Defrag o Scan record o Check disk o Startup programs ? Use of appropriate prepare tools and cleaning materials o Compressed air o Lint free cloth o Computer vacuum and compressors ?Power devices o Appropriate source such as power strip, surge protector or UPS ? Ensuring proper environment ? Backup procedures 3. 0 Operating Systems and Software Unless otherwise noted, operating systems referred to within include Microsoft Windows 2000, Windows XP Professional, XP nursing home, XP MediaCenter, Windows Vista Home, Home Premium, Business and Ultimate, Windows 7 Starter, Home Premium, Professional and Ultimate 3. 1 Compare and contrast the different Windows Operat ing Systems and their features ? Windows 2000, Windows XP 32bit vs. 64bit, Windows Vista 32 bit vs. 64bit, Windows 7 32-bit vs. 4-bit o position bar, Aero, UAC, minimum system requirements, system limits o Windows 2000 and newer upgrade paths and requirements ? Windows OS Upgrade Advisor ? Microsoft Assessment and Planning Toolkit CompTIA A+ 220-701 Objectives Version 2. 0 6 of 17 Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. o o o Terminology (32bit vs. 64bit x86 vs. x64) Application compatibility, installed program locations (32bit vs. 64bit), Windows compatibility stylus User interface, start bar layout 3. Given a scenario, demonstrate proper use of user interfaces ? Windows Explorer o Libraries in Windows 7 ? My Computer ? image Panel ? Command prompt utilities o telnet o ping o ipconfig ? Run line utilities o msconfig o msinfo32 o Dxdiag o Cmd o REGEDIT ? My Net work Places / Home Group ? Location of basic network settings between OS versions ? Task bar / systray ? Administrative tools o Performance monitor, Event Viewer, Services, Computer oversight ? MMC ? Task Manager ? Start Menu 3. 3 Explain the process and steps to install and configure the Windows OS ? File systems o FAT32 vs. NTFS ?Directory structures o bring to pass folders o Navigate orchestrateory structures ? Files o Creation o Extensions o Attributes o Permissions ? Verification of hardware compatibility and minimum requirements ? Installation methods o Boot media such as DVD, CD, floppy or USB o Network installation o Install from image o Recover CD o Factory recovery section ? Operating system installation options o File system type o Network configuration o Repair install ? Disk preparation order o Format drive o Partition CompTIA A+ 220-701 Objectives Version 2. 0 7 of 17 Copyright 2008 by the Computing Technology Industry Association.All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. ? ? ? ? ? o Start installation Device Manager o Verify o Install and update devices drivers o Driver signing User data migration User State Migration Tool (USMT) practical(prenominal) memory Configure power way o stave off o Wake on LAN o Sleep timers o Hibernate o Standby Demonstrate safe removal of peripherals 3. 4 Explain the basics of boot sequences, methods and startup utilities ? Disk boot order / device priority o Types of boot devices (disk, network, USB, other) ? Boot options o Safe mode o Boot to restore point o Recovery options ?Automated System Recovery (ASR) ? Emergency Repair Disk (ERD) ? Recovery console 4. 0 Networking 4. 1 Summarize the basics of networking fundamentals, including technologies, devices and communications protocols ? Basics of configuring IP addressing and TCP/IP properties (DHCP, DNS) ? Bandwidth and latency ? Status indicators ? Protocols (TCP/IP, NETBIOS) ? Full-duplex, half-duplex ? Basics of workgroups and domains ? Common ports HTTP, FTP, POP, SMTP, TELNET, HTTPS ? LAN / WAN ? Hub, switch and router ? Identify Virtual Private Networks (VPN) ? Basics class identification ? IPv6 vs. IPv4 o Address length differences oAddress conventions 4. 2 Categorize network cables and connectors and their implementations ? Cables o Plenum / PVC o UTP (e. g. CAT3, CAT5 / 5e, CAT6) o s.t.p. o Fiber o Coaxial cable CompTIA A+ 220-701 Objectives Version 2. 0 8 of 17 Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. ? Connectors o RJ45 o RJ11 4. 3 Compare and contrast the different network types ? Broadband o digital subscriber line o Cable o Satellite o Fiber ? Dial-up ? Wireless o All 802. 11 types o WEP o WPA o SSID o macintosh filtering o DHCP settings ? Bluetooth ?Cellular 5. 0 Security 5. 1 Explain the basic principles of security concepts and technologies ? Encryp tion technologies ? Data wiping / hard drive destruction / hard drive recycling ? Software firewall o Port security o Exceptions ? Authentication technologies o User name o Password o Biometrics o Smart cards ? Basics of data sensitivity and data security o Compliance o Classifications o Social engineering 5. 2 Summarize the following security features ? Wireless encryption o WEPx and WPAx o Client configuration (SSID) ? Malicious software protection o Viruses o Trojans o Worms o Spam o Spyware o Adware o Grayware ?BIOS Security o Drive lock CompTIA A+ 220-701 Objectives Version 2. 0 9 of 17 Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. ? ? ? o Passwords o Intrusion detection o TPM Password management / password complexity Locking workstation o Hardware o Operating system Biometrics o Fingerprint scanner 6. 0 Operational Procedure 6. 1 Outline the purpose of appropriate s afety and environmental procedures and given a scenario apply them ? ESD ? EMI o Network interference o Magnets ? RFI o cordless phone interference o Microwaves ?Electrical safety o CRT o Power supply o Inverter o Laser printers o unified power requirements of equipment with power distribution and UPSs ? Material Safety Data Sheets (MSDS) ? Cable management o Avoiding trip hazards ? Physical safety o Heavy devices o Hot components ? Environmental consider proper disposal procedures 6. 2 Given a scenario, demonstrate the appropriate use of colloquy skills and professionalism in the workplace ? Use proper language avoid jargon, acronyms, slang ? Maintain a positive attitude ? Listen and do not disrupt a customer ? Be culturally sensitive ? Be on time o If late contact the customer ?Avoid distractions o Personal calls o Talking to co-workers man interacting with customers o Personal interruptions ? Dealing with a difficult customer or situation o Avoid arguing with customers and/ or being defensive o Do not minimize customers problems o Avoid being judgmental o Clarify customer statements ? Ask open-ended questions to narrow the scope of the problem ? Restate the issue or question to verify understanding CompTIA A+ 220-701 Objectives Version 2. 0 10 of 17 Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. ? Set and meet expectations / timeline and communicate status with the customer o Offer different repair / replacement options if applicable o Provide proper documentation on the processs provided o Follow up with customer / user at a later date to verify satisfaction Deal appropriately with customers confidential materials o Located on computer, desktop, printer, etc. CompTIA A+ Acronyms Introduction The following is a list of acronyms which appear on the CompTIA A+ exams. Candidates are encouraged to review the complete list and attain a working kn owledge of all listed acronyms as a part of a comprehensive exam preparation program.ACRONYM AC ACL ACPI ACT ADSL AGP AMD APIPA APM ARP ASR ATA ATAPI ATM ATX BIOS BNC BTX CD CD-ROM CD-RW CDFS CFS CMOS COMx CPU CRT DAC DB-25 SPELLED OUT vary current introduction code reassure list advanced configuration and power interface activity asymmetrical digital subscriber line accelerated artwork port advanced micro devices automatic head-to-head internet protocol addressing advanced power management address resolution protocol automated system recovery advanced technology supplement advanced technology attachment packet interface asynchronous transfer mode advanced technology drawn-out basic input/output system Bayonet-Neill-Concelman or British Naval Connector balanced technology extended compact disc compact disc-read-only memory compact disc-rewritable compact disc blame system Central File System, Common File System, Command File System complementary metal-oxide semiconductor co mmunication port (x=port number) central processing social unit cathode-ray tube discretionary access image serial communications D-shell connector, 25 pins Version 2. 0 11 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. DB-9 DC DDOS DDR DDR RAM DDR SDRAM DFS DHCP DIMM flourish DIP DLT DLP DMA DMZ DNS DOS DRAM DSL DVD DVD-RAM DVD-ROM DVD-R DVD-RW DVI ECC ECP EEPROM EFS EIDE EMI EMP EPROM EPP ERD ESD EVGA EVDO FAT FAT12 FAT16 FAT32 FDD Fn 9 pin D shell connector direct current distributed denial of service double data-rate double data-rate random access memory double data-rate synchronous ynamic random access memory distributed file system self-propelled host configuration protocol dual inline memory module Deutsche Industrie Norm dual inline package digital linear tape digital light processing direct memory access demilitarized zone domain name service or domain name server denial of service dynamic random access memory digital subscriber line digital photo disc or digital versatile disc digital video disc-random access memory digital video disc-read only memory digital video disc-recordable digital video disc-rewritable digital visual interface error subject code extended capabilities port electrically erasable programmable read-only memory encrypting file system enhanced integrated drive electronics electromagnetic interference electromagnetic nervous impulse erasable programmable read-only memory enhanced parallel port emergency repair disk electrostatic discharge extended video artistic production adapter/ tramp evolution data optimized or evolution data only file allocation table 12-bit file allocation table 16-bit file allocation table 32-bit file allocation table floppy disk drive Function (referring to the function key on a laptop) Version 2. 0 12 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice.FPM FRU FSB FTP FQDN Gb GB GDI GHz GUI GPS GSM HAL HCL HDD HDMi HPFS HTML HTTP HTTPS I/O ICMP ICR IDE IDS IEEE IIS IMAP IP IPCONFIG IPP IPSEC IPX IPX/SPX IR IrDA IRQ ISA ISDN ISO ISP JBOD Kb KB fast page-mode field replaceable unit Front Side Bus file transfer protocol fully qualified domain name gigabit gigabyte graphics device interface gigahertz graphical user interface global positioning system global system for mobile communications hardware abstraction layer hardware compatibility list hard disk drive high definition media interface high performance file system hypertext markup language hypertext transfer protocol hypertext transfer protocol over capture sockets layer input/output internet control essage protocol intelligent character recognition integrated drive electronics Intrusion Detection System launch of Electrical and Electroni cs Engineers Internet Information Services internet mail access protocol internet protocol internet protocol configuration internet printing protocol internet protocol security internetwork packet exchange internetwork packet exchange/sequenced packet exchange infrared Infrared Data Association interrupt request industry standard architecture integrated services digital network Industry Standards Organization internet service provider just a bunch of disks kilobit Kilobyte or knowledge base Version 2. 0 13 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. LAN LBA LC LCD LDAP LED Li-on LPD/LPR LPT LVD MAC MAPI MAU Mb MB MBR MBSA MFD MFP MHz MicroDIMM MIDI MIME MMC MMX MP3 MP4 MPEG MSCONFIG MSDS MUI NAC NAS NAT NetBIOS NetBEUI NFS NIC NiCd NiMH NLX NNTP NTFS NTLDR ocal area network logical block addressing Lucent connector liquid crystal disp lay lightweight directory access protocol light emitting diode lithium-ion line printer daemon / line printer remote line printer terminal low voltage differential media access control / mandatory access control messaging application programming interface media access unit, media attachment unit megabit megabyte master boot record Microsoft Baseline Security analyser multi-function device multi-function product megahertz micro dual inline memory module musical instrument digital interface multipurpose internet mail appendage Microsoft management console multimedia extensions pitiable Picture Experts Group Layer 3 Audio Moving Picture Experts Group Layer 4 Moving Picture Experts Group Microsoft configuration material safety data sheet multilingual user interface network access control network-attached storage network address translation networked basic input/output system networked basic input/output system extended user interface network file system network interface card nickel c admium nickel metal hydride new low-profile extended network news transfer protocol new technology file system new technology loader Version 2. 0 14 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. NTP OCR OEM OS PAN PATA PC PCI PCIe PCIX PCL PCMCIA PDA PGA PGA2 PIN PKI PnP POP3 POST POTS PPP PPTP PRI PROM PS/2 PSTN PSU PVC PXE QoS RAID RAM RAS RDRAM RDP RF RFI RGB RIMM RIP RIS RISC RJNetwork Time Protocol optical character recognition original equipment manufacturing business operating system personal area network parallel advanced technology attachment personal computer peripheral component interconnect peripheral component interconnect express peripheral component interconnect extended printer control language Personal Computer Memory Card internationalist Association personal digital assistant pin grid part pin grid array 2 personal identification number human beings key infrastructure plug and play post office protocol 3 power-on self test plain old telephone service point-to-point protocol point-to-point tunneling protocol primary rate interface programmable read-only memory personal system/2 connector public switched telephone network power supply unit permanent virtual circuit preboot execution environment quality of service redundant array of independent (or inexpensive) discs random access memory remote access service RAMBUS dynamic random access memory Remote Desktop Protocol radio frequency radio frequency interference red jet plane blue RAMBUS inline memory module routing information protocol remote installation service reduced instruction set computer registered jack Version 2. 0 15 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. RJ-11 RJ-45 RMA ROM RS-23 2 or RS-232C RTC SAN SATA SC SCP SCSI SCSI ID SD card SDRAM SEC SFC SGRAM SIMM SLI S. M. A. R. T. SMB SMTP SNMP SoDIMM SOHO SP SP1 SP2 SP3 SP4 SPDIF SPGA SPX SRAM SSH SSID SSL ST STP SVGA SXGA TB TCP TCP/IP egistered jack function 11 registered jack function 45 returned materials authorization read only memory recommended standard 232 real-time clock storage area network serial advanced technology attachment subscription channel secure copy protection small computer system interface small computer system interface identifier secure digital card synchronous dynamic random access memory single edge connector system file checker synchronous graphics random access memory single inline memory module scalable link interface or system level integration or scanline interleave mode self-monitoring, analysis, and insurance coverage technology server message block or small to midsize business simple mail transport protocol simple network management protocol small outline dual inline memory mo dule small office/home office service pack service pack 1 service pack 2 service pack 3 service pack 4 Sony-Philips digital interface format staggered pin grid array sequenced package exchange static random access memory secure shell service set identifier secure sockets layer straight tip shielded depraved pair super video graphics array super extended graphics array terabyte transmission control protocol transmission control protocol/internet protocol Version 2. 0 16 of 17 CompTIA A+ 220-701 Objectives Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice. TDR TFTP TPM UAC UART UDF UDMA UDP UNC UPS URL USB USMT UTP UXGA VESA VFAT VGA VoIP VPN VRAM WAN WAP WEP WIFI WINS WLAN WPA WUXGA XGA ZIF ZIP ime domain reflectometer trivial file transfer protocol trusted curriculum module user account control universal asynchronous receiver transmitter user defined functions or universal d isk format or universal data format ultra direct memory access user datagram protocol universal naming convention uninterruptible power supply like resource locator universal serial bus user state migration tool unshielded twisted pair ultra extended graphics array Video Electronics Standards Association virtual file allocation table video graphics array voice over internet protocol virtual private network video random access memory wide area network radio receiver application protocol wired equivalent privacy wireless fidelity windows internet name service wireless local area network wireless protected access wide ultra extended graphics array extended graphics array zero-insertion-force zigzag inline package CompTIA A+ 220-701 Objectives Version 2. 0 17 of 17 Copyright 2008 by the Computing Technology Industry Association. All rights reserved. The CompTIA A+ 220-701 Objectives are subject to change without notice.
Tuesday, May 21, 2019
Ece Project
auspices trunk victimisation RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial derivative fulfilment for the award of the degree of BACHELOR OF engineer in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF engineering COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this forecast report SECURITY SYSTEM USING RFID is the bonafide work of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the make work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT segment of Electronics and Department of Electronics andCommunication engineering science, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER title of respect PAGE NO ABSTRACT 1. presentment 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardw be requirements 4. 2 package requirements 5. SYSTEM translation 5. 1 Softw be description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. death 9. REFERENCES ABSTRACT RFID (Radio Frequency assignment) is the quintessential distri scarcelyive computing engineering science. The heart of the utility is that RFID makes gathering information about bodily objects easy.Information about RFID get behindged objects crumb be rake through physical barriers, and from a distance. Our project utilized these RFID tags to improve the auspices strategy of a building by introducing a establishment that could read the RFID tagged smart teases that are placed in proximity to an antenna. Our project comes with option of thumb patsy outline, GSM dust and photographic tv camera arranging attached with the main RFID establishment. This help in qualification the trade protection full proof and reduce the possibility of b sacrificees. RFID devices endure lead primordial elements a chip, an antenna, and a indorser.A fourth pregnant part of any RFID carcass is the entropybase w present information about tagged smart card is stored. For wireless data transmission and reaching betwixt detector nodes, the project uses ZigBee modules. The modules require minimal exponent and countenance reliable delivery of data in the midst of devices with in effect(p) hostage measures. This project is implemented in real time dodging. INTRODUCTION The major problem face up by organizations in security good luck is related with doors without proper security organization on them for their protection. Our project is going to solve these pr oblems by employ RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency appointment (RFID) is an automatic identification method, relying on storing and remotely retrieving data victimization devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID governance comprises of dickens main parts RFID reader and RFID Tag. RFID Reader is an unified or resistless net income which is utilize to interrogate information from RFID tag (contains antennas to enable them to aim and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may harp of antenna, filters, modulator, demodulator, coupler and a small processor. We try to advance the security up to a very effective take aim so that there are token(prenominal) possibilities in the security breach. For this purpose we are introducing a multilevel security strategy which consists of finger pri nt impression, camera and GSM module along with RFID trunk. The system withal creates a log containing harmonise-in and check-out of each exploiter along with basic information of substance ab substance abuser. OBJECTIVEThe aim of the project is to design a system that capture a small coverage area and spate be use for au sotication or identification purposes. pledge System Using RFID is a system that uses RFID technology to maintain the security of the different rooms in same structure which peck be monitored on real-time bases use the Database waiter (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader apply radio waves. In pas sive systems, which are the close to common, an RFID reader transmits an elan vital field that wakes up the tag and provides the origin for the tag to respond to the reader. Data collected from tags is wherefore passed through parley interfaces (cable or wireless) to host computer systems in the same manner that data s shadowerned from bar cypher labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the wish of security option available for the user. One can tardily use others RFID tag to gain regain in the desired place without their prior knowledge. This breach can non be easily accounted as there is no participate other accordingly the RFID tag utilize which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print perception system along with GSM and camera is newly added. In this system RFID along with ZigBee, micro withstandler, biometric system, GSM, am plifier circuit, power fork out, camera and database server (PC) is used.Different circuits work to croakher to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the stick out of the user act to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned allowance is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power submitVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 capitulation PORT CameraUSB Type Biometric scanner visual Processing unit film ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS vi sual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION ocular Basic (VB) is the third-generation event-driven programming language and incorporate development environment (IDE) from Microsoft for its COM programming rooml. Visual Basic is relatively easy to learn and use.Visual Basic was derived from raw material and enables the rapid practical application development (RAD) of in writing(p) user interface (GUI) applications, access to databases use Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and psychiatric hospital of ActiveX go fors and objects. Scripting languages such as VBA and VBScript are syntactically confusable to Visual Basic, but bring to pass differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can besides use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a mere(a) interfac e about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO rudimentary MikroBasic is a powerful, feature well-off development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for develo crepusculeg applications for embedded systems, without compromising movement or control. Highly in advance(p) IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic suspends you to promptly develop and deploy complex applications Write your BASIC source code using the built-in mandate Editor (Code and controversy Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more) Use the included mikroBasic libraries to dramatically speed up the development data acquisition, store, displays, conversions, communications Practically all P12, P16, and P18 chips are supported. Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. Get lucubrate reports and graphs RAM and ROM map, code statistics, assembly itemizationing, calling tree, and more We switch provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you take for fit thats why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called transponders. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders 2 are Active (that do contain an inner battery power source that powers the tags chi p) and passive (that does not have an inner(a) power source, but are outwardly powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the roughly common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner t hat data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unaccredited frequencies for their obvious cost benefits. on that point are four commonly used frequencies measly frequency (LF) 125/134. 2 KHz. High frequency (HF) 13. 56 MHz. extremist high frequency (UHF) (including 869 and 915 MHz). cook (at 2450 MHz, a band familiar to ISPs). A tags read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, maculation passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In todays world, the need for effective security is evident.Without effective security , many everyday activities are compromised. limited security concerns include Protecting computer systems, PDAs, smooth phones, Internet appliances and similar devices from unauthorized access or use Protecting motor vehicles and other blue-chip items from unauthorized access or use preventing stealth and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. book binding access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This mustiness be done reliably, rapidly, non-intrusively and at reasonable cos t. In the past, this has been done by methods such as security tokens (passports, badges, and so on ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the prox is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals unambiguously by measuring certain physical and behavioural characteristics and extracting a essay (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), establish on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between s ample and template confirms the identity of the individual. Attention has been focused on a small phone number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingermarks. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most(prenominal) advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some fresh legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The absolute majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb picture show FINGERCHI P TECHNOLOGY find Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is brush vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive picture elements. An additional dummy column is used for calibration and vagabond identification. The pixel pitch of 50 _m by 50 _m provides a resolution of d dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 fra mes per second. This is more than adequate for a typical wholesale velocity. An image of the entire fingerprint is re-constructed from attendant frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh profit standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less big-ticket(prenominal) than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash storehouse. ZigBee operates in the industrial, scientific and medical exam (ISM) radio bands 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. at heart star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and median(a) access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPANs. The specification goes on to complete the standard by adding four main components network layer, application layer, ZigBee device objects (ZDOs) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant amelioration is the introduction of ZDOs. These are responsible for a number of tasks, which include kee control stickg of d evice roles, management of requests to join a network, device denudation and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from repose to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, add up power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) High-performance RISC CPU whole 35 single word instructions to learn Direct, indirect and relative addressing modes Power-on Reset (POR) Power-up Timer (PWRT) and Oscillator Start-up Timer (OST) Programmable code-protection Low-power, high-velocity CMOS FLASH/EEPROM technology In-Circuit Debugging via two pins undivided 5V In-Circuit Serial Programming might Wide operate pote ncy range 2. 0V to 5. 5V Commercial and Industrial temperature ranges Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU tho 35 singleword instruction to learn Operating speed DC-20MHz clock comment DC-200ns instruction hertzPeripheral features public synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER linear features 10-bit, up to 8-channel analog to- digital transmuteer (A/D) Analog Comparator module with two analog comparators Programmable on chip voltage reference (VREF) module Programmable arousal multiplexing from device inputs and internal voltage reference Comparator outputs are externally accessible Special Micro controller Features 100,000 erase/write vibration Enhanced Flash program memory typical 1,000,000 erase/write cycle Data EEPROM memory typical Data EEPROM Retention 40 years Self-reprogram able under software control Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation Programmable code protection Power saving Sleep mode Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology Low power, high-speed Flash/EEPROM technology Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the end in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to deviate the logic between them when they communicate with each other. RS232 is very important for standard concomitant interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follo ws. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from transmitter to receiver. SMS send and receiving is used for omnipresent access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. stall phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device kioskular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridgework responsible for enabling/ disabling of SMS capability. Cell Phone Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in club to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and by and by connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provi des corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step dash off transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step rectify uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER social unit We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will pink slip in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This filter is fixed in front the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1 input pin 2 ground pin 3 output pin It regulates the positive voltage. ii) Negative regulator 1 ground pin 2 input pin 3 output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This fiter is fixed aft(prenominal) the regulator. MERITS It is an advanced technol ogy used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its confederacy CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensibility Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http//www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report SECURITY SYSTEM USING RFID is the bonafide work of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed Syste m 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements a chip, an antenna, and a rea der. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. Security System Using RFID is a system that uses RFID technology to maintain the security of the different rooms in same structure whi ch can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickl y develop and deploy complex applications Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more) Use the included mikroBasic libraries to dramatically speed up the development data acquisition, memory, displays, conversions, communications Practically all P12, P16, and P18 chips are supported. Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. Get detailed reports and graphs RAM and ROM map, code statistics, assembly listing, calling tree, and more We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit thats why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called transponders. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders 2 are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In pas sive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies Low frequency (LF) 125/134. 2 KHz. High frequency (HF) 13. 56 MHz. Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs).A tags read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In todays world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers licenses, health cards, ID card s, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPANs. The specification goes on to complete the standard by adding four main components network layer, application layer, ZigBee device objects (ZDOs) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDOs. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) High-performance RISC CPU Only 35 single word instructions to learn Direct, indirect and relative addressing modes Power-on Reset (POR) Power-up Timer (PWRT) and Oscillator Start-up Timer (OST) Programmable code-protection Low- power, high-speed CMOS FLASH/EEPROM technology In-Circuit Debugging via two pins Single 5V In-Circuit Serial Programming capability Wide operating voltage range 2. 0V to 5. 5V Commercial and Industrial temperature ranges Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU Only 35 singleword instruction to learn Operating speed DC-20MHz clock input DC-200ns instruction cyclePeripheral features Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features 10-bit, up to 8-channel analog to- digital converter (A/D) Analog Comparator module with two analog comparators Programmable on chip voltage reference (VREF) module Programmable input multiplexing from device inputs and internal voltage reference Comparator outputs are externally accessible Special Micro controller Features 100,000 erase/write cycle En hanced Flash program memory typical 1,000,000 erase/write cycle Data EEPROM memory typical Data EEPROM Retention 40 years Self-reprogram able under software control Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation Programmable code protection Power saving Sleep mode Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology Low power, high-speed Flash/EEPROM technology Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide se curity on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectif ier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1 input pin 2 ground pin 3 output pin It regulates the positive voltage. ii) Negative regulator 1 ground pin 2 input pin 3 output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesnt allow the D C voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http//www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117 055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report SECURITY SYSTEM USING RFID is the bonafide work of ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore 641659. Coimbatore 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODU CTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of br eaches. RFID devices have three primary elements a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identificati on. Normally the RFID system comprises of two main parts RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. Security System Using RFID is a system that uses RFID te chnology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that wakes up the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and th e GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m
Subscribe to:
Posts (Atom)