Tuesday, December 31, 2019

Mary Baker Eddy Quotes Founder of Christian Science

Mary Baker Eddy, author of Science and Health with Key to the Scriptures, is considered the founder of the Christian Science religious faith. She also founded the newspaper, the Christian Science Monitor. Selected Mary Baker Eddy Quotations †¢ To live and let live, without clamour for distinction or recognition; to wait on divine love; to write truth first on the tablet of ones own heart - this is the sanity and perfection of living. †¢ The age looks steadily to the redressing of wrong, to the righting of every form of error and injustice; and a tireless and prying philanthropy, which is almost omniscient, is one of the most hopeful characteristics of the time. †¢ True prayer is not asking God for love; it is learning to love, and to include all mankind in one affection. †¢ Health is not a condition of matter, but of Mind. †¢ We classify disease as error, which nothing but Truth or Mind can heal. †¢ Disease is an experience of a so-called mortal mind. It is fear made manifest on the body. †¢ Give up the belief that mind is, even temporarily, compressed within the skull, and you will quickly become more manly or womanly. You will understand yourself and your Maker better than before. †¢ Spirit is the real and eternal; matter is the unreal and temporal. †¢ The time for thinkers has come. †¢ Science reveals the possibility of achieving all good, and sets mortals at work to discover what God has already done; but distrust of ones ability to gain the goodness desired and to bring out better and higher results, often hampers the trial of ones wings and ensures failure at the outset. †¢ A scientific mental method is more sanitary than the use of drugs, and such a mental method produces permanent health. †¢ If Christianity is not scientific, and Science is not God, then there is no invariable law, and truth becomes an accident. †¢Ã‚  As mortals, we need to discern the claims of evil, and to fight these claims, not as realities, but as illusions; but Deity can have no such warfare against Himself. †¢Ã‚  It seems a great evil to belie and belittle Christian  Science,  and persecute a Cause which is healing its thousands and rapidly diminishing the percentage of sin.  But reduce this evil to its lowest terms,  nothing,  and slander  33loses its power to harm; for even the wrath of man shall praise Him. †¢ Experience teaches us that we do not always receive the blessings we ask for in prayer. †¢ Know thyself, and God will supply the wisdom and the occasion for a victory over evil. †¢ Sin makes its own hell, and goodness its own heaven. †¢ Sin brought death, and death will disappear with the disappearance of sin. †¢ Belief is changeable, but spiritual understanding is changeless. †¢ I would no more quarrel with a man because of his religion than I would because of his art. †¢ Reject hatred without hating. †¢Ã‚  God is infinite.  He is neither a limited mind nor a limited body.  God is Love; and Love is Principle, not  person. †¢ Truth is immortal; error is mortal. †¢Ã‚  As mortals, we need to discern the claims of evil, and to fight these claims, not as realities, but as illusions; but Deity can have no such warfare against Himself. †¢Ã‚  Whatever holds human thought in line with unselfed  love, receives directly the divine power. †¢Ã‚  With armor on, I continue the march, command and countermand; meantime interluding with loving thought this afterpiece of battle.  Supported, cheered, I take my pen and pruning-hook, to â€Å"learn war no more,† and with strong wing to lift my readers above the smoke of conflict into light and liberty. Mark Twain on Mary Baker Eddy Mark Twain was, as this quote shows, highly skeptical of Mary Baker Eddy and her ideas. †¢Ã‚  There isnt anything so grotesque or so incredible that the average human being cant believe it. At this very day there are thousands upon thousands of Americans of average intelligence who fully believe in Science and Health, although they cant understand a line of it, and who also worship the sordid and ignorant old purloiner of that gospel -- Mrs. Mary Baker G. Eddy, who they do absolutely believe to be a member, by adoption, of the Holy Family, and on the way to push the Savior to third place and assume occupancy of His present place, and continue that occupancy during the rest of eternity. About These Quotes Quote collection assembled by Jone Johnson Lewis. Each quotation page in this collection and the entire collection  © Jone Johnson Lewis. This is an informal collection assembled over many years. I regret that I am not be able to provide the original source if it is not listed with the quote.

Monday, December 23, 2019

Gender Equity Essay - 906 Words

Gender Equity From the day that individuals are born stereotypes of males and females are impressed upon them. Most people believe that males are supposed to be competitive, aggressive and logical thinkers among other masculine traits. Females on the other hand should be sociable, passive and emotional thinkers. People all over the world accept all of these stereotypes of females and males. These stereotypes also carry over into the way teachers conduct their classrooms. In education both genders have advantages and disadvantages in different areas. Most people believe that boys receive more attention then girls. Male students seem to talk more then females during class. They also tend to call out answers and therefore are given more†¦show more content†¦There was very little difference in the success rate between boys and girls before their first year of algebra (Silvey Smart, 1982). As students started to take higher-level math courses boys began to surpass girls. However, a study done by Fennema and Sherman (1978) showed that girls were achieving as well as boys in two of the four high schools and in three of the four middle schools selected to be examined. Another study conducted by Armstrong (California Assessment Program, 1978) showed that there was little or no difference in the results of a performance test given to both genders. On the other hand girls surpass boys in the areas of reading and writing. The main difference between male and females in this particular area is that girls just simple read more then boys. Reading is also strongly linked to social class and how much one is able to retain what he or she has just read (Barrs and Pidgeon, 1994). Boys mature slower then girls, especially in the area of verbal skills. The second difference relates to the content of the reading. Girls like to read fiction or fantasy stories and males like to read about sports, hobbies and science (Shapiro Kramer Hunerberg, 1981). Teachers need to recognize these prototypes and learn how to get both genders involved in every type of reading materials. The third difference is in the area of achievement becauseShow MoreRelatedGender Equity Issues1157 Words   |  5 PagesGender Equity Issues Case study Gather Information Gathering information to validate gender issues in the workplace is a better approach than merely assuming the validity of information provided. Gender discrimination is a problem across different countries, organizations, and cultures. It is rooted in traditional patriarchal norms, which put women as minor people in their respective workplaces and homes. Gender discrimination negatively affects women because it harms their social health,Read More Gender Equity Essay1321 Words   |  6 PagesGender Equity Are male students and female student’s receiving the same opportunities when it comes to Math and Science in the schools? I don’t believe they are. This is why gender equity is a major problem facing our schools today. Many girls are having very negative attitudes towards Math and Science. Through doing research on this topic I found out why. In the article How Research Helps Address Gender Equity, a very shocking and eye opening thing was written. I learnedRead MoreEssay on Gender Equity in Education1632 Words   |  7 PagesGender Equity in Education Gender equity issues in mathematics and science have been the focus of many educators and researchers for years. Women have often been denied an equal education in math and science for many reasons. Parents and teachers must realize this fact and change their habits wherever necessary. Girls must be given the same opportunity as boys from the beginning, particularly in math and science where girls tend to lag behind. First of all, the term gender equityRead MoreUnderstanding And Supporting Gender Equity754 Words   |  4 PagesMulticultural Education focuses on both understanding and supporting gender equity in schools. Supporting gender equality use to mean providing both equal access and equal outcomes for all students regardless of their gender; equality meant proving students with the exact same rather than providing students with opportunities and experiences based on what they needed in order to succeed and better themselves. Equality does not only focus on gender and understanding, it also includes other diverse aspects ofRead MoreFeminism And Gender Equality And Equity Based On Gender1060 Words   |  5 Pagesoften misinformed or given bad first impressions of feminism. However, feminism is equal rights for all people of different race, sex, gender, and sexuality. Many of the people that give feminism a bad name, include a self-proclaimed feminist that is running for presidency, and meninists who are satirical equal rights activists. In reality, feminism is pro-gender equality and opportunities for all types of people. Feminism is the belief that people of all different backgrounds should be treatedRead MoreEssay about Gender Equity in Education3139 Words   |  13 Pages Gender equity in terms of education is about the socialization of men and women and the results of this process on the life outcomes of the two genders (Husen Postlethwaite, 1994). In the United States, the education system is required to treat males and females equally. There has been much research done to compare the genders in all areas. In the past, research has found that women fall far behind men in many areas such as math, and science, but men lag behind women in certain areas as wellRead MoreEssay on Gender Equity in College Sports1139 Words   |  5 PagesGender Equity in College Sports â€Å"Gender Equality In College Sports?† An on going issue facing education today is the growing controversial topic of gender equality in sports participation and it’s so call quota for achieving equality. The most notable action that has taken place as women continue to strive towards equality in the athletic realm is what is known as, Title IX. The basic ideas underlying Title IX are that â€Å"if an institution sponsors an athletics program, it must provide equalRead More Gender Equity in Math and Science Essay2572 Words   |  11 PagesGender Equity in Math and Science From the research I have read while there is a disagreement on when and how much of a gender gap exists in math and science, there is definitely an equity issue that needs addressing. There seems to be an abundance of information about equity issues and as a future teacher I feel that it is important to examine these issues. If gender equity issues exist in todays’ classrooms why do they and what can be done to help correct it. Everything IveRead More Gender Equity in Education Essay examples2921 Words   |  12 PagesGender Equity in Education â€Å"It is early indeed that children show an awareness of the message that†¦ females are generally less interesting and important than males are†¦ The (often inadvertent) bearers of this message include parents, peers, and teachers.† (Lips, 1979, p. 128.) The absence of gender equity can be damaging to both males and females. Surprisingly most of the teachers and administrators are unaware of this problem. Organizations such as the American Association of University WomenRead MoreGender Equity Is Not More Equal Terms1755 Words   |  8 PagesMan has been known by some to be the dominate gender as men have been known to be the provider and the main support of most families and even to this day. Woman are in constant competition daily as they strive for gender equity in all facets of lives. Women’s pay, certain benefits, and the way they are perceived to the general public is a lot different than to that of a man. The place that we currently are with social r ights I believe that gender equity is not enough to bring us closer to equality

Sunday, December 15, 2019

E-Business and E-Commerce Free Essays

INTRODUCTION E-Business is important in future perspectives considering that the amount of trade conducted electronically have grown extraordinarily since the spread of the Internet. E-bussiness uses the internet and other networks as well as a variety of Internet technologies to support e-commerce and business processes. It includes e-commerce, which is the buying and selling of products or services over the Internet. We will write a custom essay sample on E-Business and E-Commerce or any similar topic only for you Order Now The Internet and related technologies have changed the way businesses are operated and people work. I. E-BUSINESS A. What is it Many businesses today are using Internet technologies to conduct business processes over the Internet. E-business can be defined as the use of the Internet and other networks, as well as Internet technologies to work and facilitate business processes, electronic commerce and enterprise collaboration within a company and with its customers, suppliers and business partners. Generally, any online exchange of information, money, resources and services is a part of e-business. B. E-business infrastructure E-business infrastructure made up of a variety of components. It includes hardware, softwares, support services, human capital and telecommunication networks. Examples of hardware are computers, servers and routers. Human capital, such as information system specialists and programmers, is important to operate e-business processes. In addition, many companies use networks such as intranet that is a private network inside a company for managers and employees, and extranet, which links a company with its customers, suppliers and business partners outside the company. Other companies use a virtual private network (VPN) which provides a private line through the internet. It uses the public Internet backbone as a channel for private data communication (3:20). Thus, a VPN allows remote offices, business partners and customers to use the Internet, rather than expensive private lines, to reach company networks by using tunneling software. This software encrypts data and then sends the data to their destination. II. E-COMMERCE A. What is it E-commerce is the buying, selling, marketing and servicing of products, services and information over the Internet and other networks. Many businesses use the Internet, intranet and extranet to support the commercial processes including advertising, sales, customer support and Internet security. Most advertisements on the Web are in the form of sending e-mails and banner ads, which is in shape of a long horizontal rectangle on the top of the Web page (3:10). These advertisements could attract a huge number of visitors to the advertised Web site. E-commerce website must help customers to welcome and serve them personally and efficiently in order to increase customer loyalty. B. E-commerce advantages and disadvantages E commerce has several advantages. For sellers, e-commerce is an effective way to reduce costs and enlarge their markets. They cut additional labor cost and they do not need to print and distribute mail order catalogs. In addition, e -commerce allows customers to compare prices at different websites. Then, they make purchases at their homes at any time. E-commerce websites offer variety of products for example electronic books, music files and computer softwares. However, e-commerce has some disadvantages. Consumers are not willing to buy some products over the Internet because of security and quality concerns. Online furniture businesses, for example, have failed because customers want to test the comfort of an expensive item such as sofa before they purchase it (1:1). How to cite E-Business and E-Commerce, Essay examples

Saturday, December 7, 2019

Essay Football vs Rugby free essay sample

When I was a senior in high school, I played on my school’s rugby team. It was really excite and funny while I played almost all weekend even though it is not popular in Colombia. But then when I came to the United States, it catch my attention that everybody likes and watches Football and it made me contrast these two aggressive sports Rugby and Football. These two sports are almost the same, for example the object of both games is score points by carrying the ball beyond the possessive touchline and the ball has a prolonged spheroid shape. Even though they are similar in some aspects, the first big difference is related with the source. Rugby proceeds from England and Football from the USA. Because of their foundation, many small differences have been created that show the importance of the characteristics of the society and their impact on sports. We will write a custom essay sample on Essay Football vs Rugby or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page First started with Football, this sport was created in the United State, which impacted the characteristics of the game. The major league of this sport is called the National Football League (NFL), and the major tournament is the Super Bowl. The rules of the game are; the game is formed by four 15-minute quarters with a half-time intermission, which shows that in the American mindset, it is better a lot of short times than a few very long halves. The field must had 120 yards long by 53. 3 yards wide, based on the measuring system used there. The ball is a prolonged spheroid, which is about 11 inches long and 22 inches in circumference and it, weight around 0. 875 lbs, to make the balloon aerodynamic so that it can travel longs distances. Each competitor must use helmets and padding during the game. The name of the things change, for example when you made a goal in Rugby it is called Try and in Football, touch down. Showing that the team can make unlimited substitution in each game but always having 11 players on the field, showing that in America the people believe that when anything stop working a hundred percent, it must be replaced by new ones One of the huge differences between Rugby and Football is that the number of substitutions that can be done by the coach in each game thanks to English cultural influence is 7. The other high-contact sport is Rugby, which was created in England. The major Tournament is the World Cup (Rugby Union) and the most known League is the Super 15; but there are a lot of leagues all over the world, among them are Aviva Prem, top 14, and in an international level NSW suburb rugby; Showing that the people play this sport all over the world not like Football, which is played only in a part of North America. The rules of this sport state that the ball must have the international 5 size, that means 27 cm long and 60 cm in circumference with a weigh around 1lb. The fields have 120 meters long by 70 meters wide according to the metric system. On the field there must be situated only 15 players. They play two halves of 40 minutes with a ten-minute half time. The additional difference is the size of the player, as they don’t use helmets or any other equipment except a mouth guard. They have wider backs, being the thinnest player just 81kg and the heaviest 201. 7kg. The name of a goal is Trying and after made a point one player kicks the ball between the goal posts to win more points. After seeing the specific characteristic of both sport and the reason why they have these differences, to summarize, Rugby and American Football are two sports with intense physical aggression and the same goal: carrying the ball beyond the opponents touch line and kicking the ball between the goal post after they make the point. Even though they are parallel in some aspects; there are differences based on the source, such as the size of the ball, the field and the players, the length of the game and the number of substitutions permitted per team. In my personal experience, the place where the sport is created has a huge relation with the characteristics of the game. Because for example as football was created in the US the people over there like it because it is according to their characteristics; however, in the opposite side if a sport was created in a different country and the people want to play it, they will face some things can be consider whether not loved and strange, since recreation with Rugby in Colombia is not popular.

Friday, November 29, 2019

A Look At Hollow Men Summary English Literature Essay Essays

A Look At Hollow Men Summary English Literature Essay Essays A Look At Hollow Men Summary English Literature Essay Essay A Look At Hollow Men Summary English Literature Essay Essay as in, TheA Is are non here. There are no independent personalities or egos among the group. Hope continues to melt, as the stars fade or die off. The vale leads us to believe of one a celebrated Psalm from the Bible, that goes, Even though I walk through the vale of the shadow of decease, I will fear no immorality, for you are with me ; your rod and your staff, they comfort me ( Psalm 23 ) . They are in a vale of decease, but there is no 1 at that place to soothe them because they neer joined with God. The Hollow Men each used to hold their ain lands literally or metaphorically but these lands have been lost or broken like a jaw. Why a jaw? We re non sureaˆÂ ¦maybe you can state us! At any rate, here the lone true land is the Kingdom of God, and they had their opportunity to fall in it but did non. Lines 57-60 In this last of meeting topographic points We grope together And avoid address Gathered on this beach of the tumid river We eventually larn where the Hollow Men are gathered: on the Bankss of a swollen or bombastic river. They are huddled together as if they were traveling to be washed off. The river is practically overruning with H2O, in contrast to the waterlessness of the work forces and the desert around them. This is the last topographic point that they will run into before they face some more awful destiny. The river most likely represents Acheron, subdivision of the fabulous River Styx in Greece that souls must traverse into decease. To do the trip, you would hold to pay Charon, the ferryman, a coin to take you on his boat. Unfortunately, no 1 has arrived to take these psyches across. They are stranded. There s nil left to state about their dire state of affairs, so they avoid address. InA Canto 3 of DantesA Inferno, Dante asks his usher Virgil why psyches are so eager to acquire across Acheron, and Virgil responds that God s justness spurs them on so that they really want to acquire to Hell Oklahoman. But the Hollow Men ca nt even acquire to Hell. Lines 61-67 Sightless, unless The eyes reappear As the ageless star Multifoliate rose Of decease s dusk land The hope merely Of empty work forces. The Hollow Men are eyeless, like a clump of belowground worms, but if the eyes return their vision could be restored. Their lone hope is if the celestial eyes come back as a star. This star would be ageless or ageless, unlike the attenuation or deceasing stars in the desert. By now you ve likely noticed that Eliot is throwing about symbols like confect at a Fourth of July parade. A multifoliate rose has many petals. Here once more Eliot is mentioning to conjecture who? Dante Alighieri. In DantesA Paradiso, the concluding vision of Eden is of a flower made up of saints, angels, and other illustrations of goodness and virtuousness. The community of Heaven is like a rose with petals made of people. Dante besides compares Mary, the female parent of Jesus, to a rose. The point of these lines is that the Hollow Men can non salvage themselves. They have no hope except for the Heavenly souls to come down and reconstruct their vision of truth and goodness. Lines 68-71 Here we go round the prickly pear Prickly pear bristly pear Here we go round the prickly pear At five oclock in the forenoon. Admit it: if you had to blindly wait on the Bankss of a river until the terminal of clip, you might fall in custodies and get down singing Here we go round the mulberry shrub, excessively. And if you did nt hold a mulberry shrub, good, so you d merely hold to sing about the bristly pear cactus. Here we go round the mulberry shrub is a kids s vocal about people dancing around the shrub so early in the forenoon. Eliot really gives the clip at which they are dancing: 5 oclock in the forenoon. Harmonizing to one commentary on the verse form, 5:00 a.m. is the traditional clip of Christ s Resurrection ( beginning ) . The Resurrection is the most of import minute in the Christ narrative, but here the Hollow Men are executing a kids s dance around a cactus, wholly incognizant of the significance of the clip. Lines 72-76 Between the thought And the world Between the gesture And the act Falls the Shadow If you look back to lines 12-13, you ll retrieve the list of losing necessities, or things that are missing some indispensable constituent, like gesture without gesture. In this concluding subdivision of the verse form, Eliot presents a similar thought. For the Hollow Men, some cryptic shadow has fallen between some possible for action and the action itself to forestall them forA doingA anything. They have thoughts but can non convey them into world. They can travel but non organize their motions into action. The shadow falls like an Fe drape to barricade their purposes. Line 77 For Thine is the Kingdom The Hollow Men get down to state portion of a supplication but do non complete it. For Thine is the Kingdom is portion of the stoping to theA Lord s PrayerA that goes: For thine is the land, and the power, and the glorification, for of all time and of all time. Amons. You get the feeling that if the Hollow Men couldA justA get to the terminal of the supplication, possibly they would be saved. You ll detect that the word land has been used a batch in this verse form. God has his everlasting land in Heaven, and the Hollow Men had their lost lands. Lines 78-83 Between the construct And the creative activity Between the emotion And the response Falls the Shadow Life is really long Here comes that Shadow once more. Concept is the minute of gestation or the beginning of thought, but creative activity is when that being comes into being. An emotion is a mental province, but a response is an action ensuing from that province. The shadow prevents one thing from taking of course to the other. If you went to the physician and he or she tapped your articulatio genus with that small gum elastic cock, and you had no physical response, it would be a job. The stanza ends with the beginning of another statement: Life is really long. You can about here the Hollow Men suspiring tiredly as they say that, as if they are bored and worn down. Compared to infinity, of class, life is pretty short. Lines 84-91 Between the desire And the cramp Between the authority And the being Between the kernel And the descent Falls the Shadow For Thine is the Kingdom The verse form gives three more illustrations of the Shadow s dirty work. It prevents desire from going the cramp of sexual satisfaction that is, climax. It besides comes between possible or authority and being, and between the higher kernel of things and the descent of this kernel into our physical universe. In instance Eliot is acquiring excessively philosophical, here s a simpler manner of seting it: the Shadow prevents things that should of course follow from one another from go oning. The stanza ends, once more, with a fragment of theA Lord s Prayer. They still ca nt state any more than this one portion of the supplication. Lines 92-94 For Thine is Life is For Thine is the The Hollow Men repeat the disconnected lines from the terminal of the last three stanzas, but this clip chopped down even further. They merely drag off, as if they ca nt retrieve how the remainder goes or hold slipped into some semi-conscious province. Cut them some slack, though: their caputs are filled with straw. Lines 95-98 This is the manner the universe ends This is the manner the universe ends This is the manner the universe ends Not with a knock but a whine. They pick up once more with another brainsick version of the Mulberry Bush vocal. The vocal provides small lessons about how to make jobs around the house, like This is the manner we wash our apparels and This is the manner we sweep the floor. ( Read the full vocal. ) ( Wow, that vocal is wholly merely a manner to flim-flam childs into making work! ) In Eliot s version, the Hollow Men are singing about how the universe ends as they dance around the bristly pear. These lines are the most celebrated and often repeated lines in the verse form. The universe ends non with a knock like you might anticipate, with some immense war between angels and devils, but with a whine, like a defeated puppy. The inquiry is, does the universe terminal this manner for everyone, or merely for the Hollow Men? Keep in head that they are the 1s singing. The terminal of the universe is, in a word, anticlimactic.

Monday, November 25, 2019

s Speech To Achilles In The Iliad

in hopes that he will see the foolishness of his actions and the toll it has taken on the forces. Achilles appreciates the spirit of the men behind the arguments, but finds that the negotiations fail in the unwillingness to persuade him. His response to Phoenix is that the idea that someone could have a shared loyalty to both him and Agamemnon is completely unacceptable to him. Ajax has the greatest affect on the w... 's Speech To Achilles In The Iliad Free Essays on Analysis Of The Embassy\'s Speech To Achilles In The Iliad Analysis of the speeches of the Embassy to Achilles (Book 9) The Greek word hubris, when translated to English, means an exaggerated pride. Achilles’ greatest flaw is completely exposed in Book 9 when Agamemnon sends forth humble terms in an attempt to heal the damage that has been done to his kleos. The result of Agamemnon’s desperate meeting with his assembly results in the decision, put forward by Nestor, to send Odysseus, Phoenix and Ajax on an embassy to convince Achilles to return to the Achaean forces. Of the three men Odysseus, known for his great skills as an orator, is the first to plead their case. Odysseus uses morality as the basis of his argument by appealing to Achilles through the words of his own father who urged him control his temper while in battle. He then goes on to list the gifts Agamemnon has offered in an attempt to show the king’s newly emerged growth as a leader; seeking the interest of his men over that of himself. Phoenix, an old tutor of Achilles, is able to relate the story of Meleager and Cleopatra to a tee because he shares a similar relationship of love with Achilles. He uses the parallels of the personas of Meleager and Achilles to show that the capacity to be loved can bring any man to sanity. He asks him to consider that it is better to return now and receive some glory than waiting too long and receiving no glory at all. The final argument is given by Ajax who speaks through emotion from one warrior to another. He tries to mirror Achilles’ rage through his words in hopes that he will see the foolishness of his actions and the toll it has taken on the forces. Achilles appreciates the spirit of the men behind the arguments, but finds that the negotiations fail in the unwillingness to persuade him. His response to Phoenix is that the idea that someone could have a shared loyalty to both him and Agamemnon is completely unacceptable to him. Ajax has the greatest affect on the w...

Thursday, November 21, 2019

Wounds Coursework Example | Topics and Well Written Essays - 250 words

Wounds - Coursework Example On the other hand silver sulfadiazine (Silvadene) increases wound healing time as compared to honey which reduces healing process. However, silvadene has not shown any evidence in inhibition of wound infection effectively but works by inhibiting the growth of bacteria from scattering to surrounding skin or to the blood and causing blood infection.(Kaufman, 2008) Besides that, pain is not uncommon and is felt by patients from time to time and clear fluid known as aseptic exudate may also form on the wound surfaces. In this scenario, the nurse will have to uphold the patients’ use of honey for wound healing this can be attributed to the fact that honey has lesser side effects as compared to silvadene, moreover, silvadene being an antibiotic, any misuse of this drug will lead to bacterial resistance. With that in mind it will not be prudent to reinstate the use of the drug after it was stopped prematurely since this will be increasing the possibilities of bacterial resistance occurring. Lastly, the use of silver sulfadiazine (Silvadene) possess much worse side effects as compared to honey which is the reason for upholding continued use of honey as an

Wednesday, November 20, 2019

Heritage Tourism Essay Example | Topics and Well Written Essays - 2000 words

Heritage Tourism - Essay Example It is in the 1990s that the tendency to boldly state the function of tourism and investigate the conscious and unconscious forces that foster tourism as an expression of a facet of human life became in vogue. During these period researchers working independently arrived at the nature of tourism as method of forming opinion on the nature of local people that the tourists visited. Moreover, the scholars also unearthed the social compulsions that make going to places as an essential ingredient of modern living and the pseudo-cultural experiences that are generated artificially to fuel the growth of a flourishing business activity. Many social scientists inspected "the use of tourism to make, re-make and/or de-make specific peoples, places or pasts." (Hollinshead, 2004, p. 25) The present study focuses on central ideas of four authors whose monumental contribution, to the understanding of the discipline of tourism, is a necessary backdrop for our learning of postmodern issues in tourism. They are AlSayyad N., Hewison R., Horne Donald and Dolan D. The authors are able to give a penetrating vision of the various aspects of post-modern heritage tourism. AlSayyad explores in his writing the heritage and tradition of tourism and contributes sig... Heritage today is created and propagated and it plays a major role in gaining national identity. He argues that 20th century has been a period of travel and tourism. Travel industry knows too well that it is selling only dreams. The industry knows that the tourists are too nave to realize that he or she is treated to a fake experience. The old concept of tourism as a quest for knowledge, self-improvement and authentic experience is hardly found in today's tourism. Instead, shopping, dining, wining and evening entertainment are becoming in many cases more important than the visiting of monuments. One of the appalling tragedies of postmodern tourism is the directed tour that a tourist is supposed to cover in a package. In the past travel was undertaken as a finishing school for a man of leisure and culture. Now the tourist is compelled to travel as a part of social norm and often the itinerary in such travels are unauthentic experience the tourist is forced to endure. Alsayyad (2001) c alls it " sites of 'authentic fakery' such as Las Vegas or manufactured heritage theme parks of 'fake authenticity'. There are many such symbols of modern tourism, which can vie with any monumental heritage site of the past. In fact McDonald's and Disney have more popularity as symbols of culture. In the era of increasing globalization Disney theme parks in many parts of the world stand for the weakened notion of statehood having been replaced by a plutocracy of the world governed by a multinational corporation. It is a paradox today that people travel to actual destinations for a virtual experience. Destinations could be Taj Mahal. Pyramids or the Great Wall of China but the experience is stage managed by recreational aspects of enjoyment rather

Monday, November 18, 2019

Methodology Term Paper Example | Topics and Well Written Essays - 2500 words

Methodology - Term Paper Example The aim of this analysis is to assess Sartre’s theory of the emotions and how he, in his arguments, follows general scientific standards and the use of (appropriate) methods for the enquiry. As a core requirement in the presentation of an argument any scientific work has to begin by introducing the topic chosen in terms of a â€Å"research question† and a â€Å"hypothesis† (a â€Å"preliminary†, i.e. ahead of the actual research, answer to the question). One then has to proceed by clearly stating the aim of the research and how one wants to â€Å"explore the problem† by comparing one or the other â€Å"literary source and concept†. Importantly, one also has to define the topic by qualifying it and the literature in terms of a particular set of â€Å"methods† to be used and deemed appropriate, be they person-oriented and qualitative, or of a more quantitative nature, or a mix of the two groups. At this stage, follows the â€Å"results- section†, an analysis and discussion of the data collected. Finally, conclusions and recommendations are made, and one also notes in which sense one’s study has tested the research question (Ellen, 1984). ‘ The Research Process Research, the search for knowledge and problem-solving, is a process whereby one continually adds to knowledge (Ellen, 1984). By this understanding, research is an ongoing process. There are, however, certain procedures to be followed and standards to be adhered to, be they of an â€Å"inductive† (experimental: â€Å"arriving at a theory based on facts†) or â€Å"deductive† (â€Å"facts are organized to match theory†) nature. Based on this division, one arrives at a â€Å"positivistic† and â€Å"relativistic stance†, resulting in a contrast of â€Å"explanation† (deduction, positivism, quantification) and â€Å"understanding† (induction, relativism, qualification) (Alexander, 1983; Gel lner, 1985)1. Thesis and hypothesis In his Sketch For A Theory Of The Emotions Sartre proposes a social and interactionist perspective by stressing the concept of â€Å"the social basis of emotions and the self†. His approach is inductive and grounded in arguments and examples to prove his thesis. His work is, he contends (and the present author tends to agree), an important critique of the â€Å"classic† literature on the constitution of emotions, consciousness and mind represented by such philosophers-psychologists as William James and Pierre Janet. Their focus is on the â€Å"individual† and his/her â€Å"consciousness†/†mind† as an analytical point of departure, an entity that exist a priori to one’s argument (Sartre, 1985, pp. 32 ff.)2. Opposed to this – and very revealing in terms of his empirical theory of emotions that are grounded in various fields of interaction with the social world (e.g., Mead, 1950) - Sartre states: â€Å" It [consciousness] arises as a relation of our psychic being and the world; and this relation –or rather our awareness of it – is not a chaotic relationship between the self and the universe, it is an organized and describable structure† (Sartre, 1985, p. 34) In the latter words, â€Å"organized and describable†, lie his procedure of proving his hypothesis regarding the social

Saturday, November 16, 2019

An analysis of age gap relationships

An analysis of age gap relationships Views towards age-gap relationships should not be viewed through stereotypical eyes; instead they should be viewed with an open mind, for they are more than what you see. Age-gap relationships have been around since the dawn of human life. Historically age-gap relationships have been between an older male and younger female, and many cultures arranged marriages with this pattern. Age-gap relationships are not socially constructed, but have evolved. They are also seen often in nature. Stereotypes and negative opinions are heard often in media, by friends and by family. Many famous celebrities, royalty, and rock stars have been in age-gap relationships. In many cultures, arranged marriages have been between a young girl and an older man, this could have been to prevent marriage outside of the culture, to increase political power, for livestock, or to resolve inter political issues. Doing this helped to increase the number of the community members, because a young girl could produce many more children than an older woman. Older men had more resources to support the girl and her offspring than a young boy. By arranging the marriages in this way the parents were insuring a greater number of surviving grandchildren to pass on their genes, wealth, legacy and land. At an evolutionary stand point age-gap relationships should be more common as well as less criticized. .. men are predisposed to produce as many offspring as possible, to increase the probability that their genes will be passes onà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦women prefer a mate who has adequate resources, or the potential to obtain resources,à ¢Ã¢â€š ¬Ã‚ ¦.(Banks and Arnold 2001) By learning to seek these qualities we have subconsciously insured the survival of the human race. This evolutionary process is not much different from the way animals use to choose their mates. Mate preferences may have evolved, rather than being socially constructed (Banks and Arnold 2001), therefore age-gaps should be considered the social norm, and similar age relationships should be considered abnormal. Age-gap relationships have a rollercoaster history, where they were once accepted, then they werent, and now they are becoming accepted once again. Women older relationships however are still considered taboo, but that doesnt mean they should be discriminated more. Age-gap relationships whether female older or male older should be looked at as a regular relationship. The same challenges and problems should be considered when the relationship itself is being evaluated. Criticism of age gap relationships is similar in the way which different races and gay couples are criticized, people look at what is on the outside and not at what they really are. There is an old adage Dont judge a book by its cover and I feel that more people should follow this, not only when dealing with age-gap relationships but when dealing with all situations in which it is not as it appears. There are many different stereotypes put towards age-gap relationships. Such as: The younger partner is either looking for a parental figure or is in it solely for monetary gain, and the older partner is only after youth and physical attributes (Anisman-Reiner 2008). Sadly these stereotypes are true in some situations, but it does not mean that every age-gap relationship is like that. The relationship in question should be examined first, then the age of the partners. Many relationships that were healthy and actually had love in them, were broken up due to constant harassment from family, friends, and even strangers. Criticism that age-gap relationships receive are based on extreme instances. The older partner will get dirty looks and be called a cradle robber or be accused of cheating on their spouse (which other than the younger partner doesnt exist). Other things people say are: what could you possibly have to talk about, can they even keep up with you physically or they are holding you back from experiencing your youth this usually causes stress for the couple. These are not always true but it causes the couple to focus on what people say about them, instead of other things in their relationship. Its possible for couples with large age gaps to be able to have common interests, as well as have the same amount of physical activity. For example a 45 year old man can play a game of tennis at the same level as a woman in her 20s, or both could be into classic rock or horror movies. It is true that sometimes when you enter an age-gap relationship you are risking losing some life experiences, but yo u can create new ones that neither of you have had. That way the older partner is not repeating life experiences, and they younger partner is gaining life experiences. Either way age-gap couples get around these obstacles and have healthy lasting relationships. Many people will admit that they have been in an age-gap relationship or they know someone has. These relationships are becoming increasingly common nowadays and yet they still receive criticism. Although men and women report a preference for and openness to age gaps in their own relationships, they typically disapprove of age gaps in others relationships. (Lehmiller and Agnew 2008) Why would you be willing to consider something for yourself, but then tell your friend that they shouldnt do it? If it is because you know you could handle it and your friend couldnt, what makes you think you know your friends capabilities better than they do? Better yet if your friend doesnt know herself, then what makes you think you know your own self? These are questions you should ask yourself before you make the decision to discriminate against others being in age-gap relationships. My grandmother and her husband were 25 years apart and yet they did not receive criticism, but when I entered into a r elationship with a 14 year age difference she made a big deal about it. Sadly this occurs often to people by their family and friends. We are all born with an incest avoidance instinct, sometimes depending on your upbringing it could go away, but normally we tend to react to what we see before we have a chance to think about it. A difference in age of 15 years and greater would mean that a couple could, in terms of age be parent and child and so we suggest that social opposition to these age-differences will be greater, because people would wish to avoid the suggestion of incest (Banks and Arnold 2001). Due to the appearance of the couple we instantly think that the older partner could be the younger partners parent. Because of this instinct we become so focused on the difference in age that we dont notice anything else about the relationship. Parents are often worried that when and if their young son or daughter enters into a age-gap relationship, that the older partner will exploit them for sex and not truly love them, or that the partner is closer in age to themselves than their child. I feel that though the parents mean well, they should evaluate the relationship and get to know the older partner before being so quick to judge, and find out if it is healthy for their son or daughter. Let he who is without sin cast the first stone (John 8:7). Due to the different rates at which boys and girls mature, age-gap relationships could even be considered ideal to insure the survival of a relationship. Its possible for two people at different ages even with a 20 or 30 year age gap to be equally mature, however you define the term.(Anisman-Reiner 2008) Everyone growing up has heard that girls mature faster than boys, and it makes sense that this would make it easier for age-gap relationships to work and last. It also answers why many similar-age relationships (especially high school relationships) dont last. As you get older the age-gap in the relationship matters less, because both partners are maturing. Many famous couples both present and throughout history were involved in age-gap relationships. The gaps range from less to one year to more than thirty years. Billy Joel and Katie Lee had thirty-two years between them, and Tom Cruise and Katie Holmes have sixteen years between them. These are people we idolize, we watch on television, on movies, and whose music we listen to. One day the media will pick them for cutest couple and then the next day they criticize them, and we just go along with it, instead of using our own minds. The criticism increases more if the woman is the older partner, and they have been labeled by the media as cougars. Such as Demi Moore and Ashton Kutcher (15 years difference), they receive tons of criticism and yet remain happily married, so far for 5 years. It is not only in present times that age-gap relationships exist, they have been around for centuries. Cleopatra and Julius Caesar had more than 30 years between them when their romance began. Another co uple would be Frank E. Butler and Annie Oakley who had 22 years between them. During my personal experience in an age-gap relationship I have been lucky to have friends and family to support me, well most of my family. We do get dirty looks in public even though my boyfriend doesnt look that much older than me and definitely doesnt act older than me. If we just focused on what other people thought of us, we wouldnt last. Together we have accomplished so much, and continue to climb mountains! I guarantee that if we did not receive the support we have, we would not have made it. You should not discourage an age-gap relationship unless you know for an absolute fact that it would be damaging to one or both parties, you may find that age-gap relationships are a wonderful positive experience. In conclusion age-gap relationships are criticized, stereotyped, and put down. Even though they are becoming more common, have been around for centuries, occur in nature, and have proven to have lower divorce rates. Society should look at the relationship, not the ages of the people, and maybe more of these relationships would succeed. Age-gap relationships are just like normal relationships and should, according to evolution, be the social norm though due to social influences this is not the case. Nobody likes to be picked-on especially for something that makes them happy, so we should follow the golden rule Do onto others as you would have them do unto you. Age-gap relationships should be looked at for what they are, not what they seem.

Wednesday, November 13, 2019

Free Epic of Gilgamesh Essays: Character of Gilgamesh -- Epic Gilgames

Analysis of the Character of Gilgamesh  Ã‚     In the epic of Gilgamesh, there are many complex characters.   Every character involved in the story has their own personality and traits.   The main character in the novel is Gilgamesh.   Gilgamesh is a character who is very self-confident.   He feels that he is superior to others, due to the fact that he is two-thirds god, and one-third man.   This arrogance leads to his being cruel at the beginning of the story.   Gilgamesh is described as, à £two-thirds of him divine, one-third human... Gilgamesh does not allow the son to go with his father; day and night he oppresses the weak... Gilgamesh does not let the young woman go to her mother, the girl to the warrior, the bride to the young groomà ¤ (tablet I, column ii, 1, 12-13, 27-28).   Gilgamesh is a man with no equal, so he feels superior.   Although Gilgamesh starts out cruel he develops into a very kindhearted man.   He is extremely supportive of Enkidu and encourages him in various situations.   When the men are fighting Humbaba Gilgamesh says, à £[you] will surpass all of them... a fri... Free Epic of Gilgamesh Essays: Character of Gilgamesh -- Epic Gilgames Analysis of the Character of Gilgamesh  Ã‚     In the epic of Gilgamesh, there are many complex characters.   Every character involved in the story has their own personality and traits.   The main character in the novel is Gilgamesh.   Gilgamesh is a character who is very self-confident.   He feels that he is superior to others, due to the fact that he is two-thirds god, and one-third man.   This arrogance leads to his being cruel at the beginning of the story.   Gilgamesh is described as, à £two-thirds of him divine, one-third human... Gilgamesh does not allow the son to go with his father; day and night he oppresses the weak... Gilgamesh does not let the young woman go to her mother, the girl to the warrior, the bride to the young groomà ¤ (tablet I, column ii, 1, 12-13, 27-28).   Gilgamesh is a man with no equal, so he feels superior.   Although Gilgamesh starts out cruel he develops into a very kindhearted man.   He is extremely supportive of Enkidu and encourages him in various situations.   When the men are fighting Humbaba Gilgamesh says, à £[you] will surpass all of them... a fri...

Monday, November 11, 2019

Love and Marriage Between Wickham and Lydia

Love and marriage between Wickham and Lydia Pride and Prejudice is the most successful and popular novel written by Jane Austen. It revolves around the intricacies of courtship and marriage between members of social classes, which, in this case, is her own class – the middle class. In Pride and Prejudice, Jane Austen describes many different loves and marriages. Whereby, she can express her viewpoint that one’s character often reflects his or her marriage and attitudes towards love.In this essay, I want to focus and analyse the sex-oriented marriage between a dissolute Wickham and an empty-minded Lydia. Wickham first appears as a very charming fellow. As an officer in the regiment stationed at Meryton, Wickham is quickly judged to be a perfectly good and amiable man because of his friendliness and the ease of his manners. Initially, his sexual fascination is so great that Elizabeth, who is normally very critical in judging people, sees at first absolutely nothing in him but makes him seem the most charming man she has ever met.Wickham’s constant attention to Elizabeth makes her feel sure that she is in love with him. He even makes Elizabeth to be inclined to believe his made-up story about Darcy. However, his true nature, on the contrary, gradually shows itself to be mean and wicked. â€Å"A curious degree of sexual attraction often goes with a lively, unreliable disposition, which may either be somewhat superficial but perfectly well-meaning, or driven by circumstance which it has not the strength to withstand, become that of a scoundrel. (Douglas Bush, 1956)Wickham’s love was short-lived. After being realized the real person by Elizabeth, he is immediately reported to court another lady, Miss King, who possesses ten thousand pounds. A sharp contrast emerges between his agreeable appearance and mean character. He regards love as nothing but a tool to acquire wealth. His elopement with Lydia is very sudden. It really leaves us some rooms to contemplate his real motivation. Lydia is not rich. It seems that Wickham’s elopement with her was beyond understanding.Nevertheless, further reading clarifies the obscurity and tells us his whole character. There are two motivations behind it. Firstly, he is a dissolute man who never stops seeking sexual passion. Secondly, he availed himself of a chance to flee his creditors. His flight was rendered necessary by distress of circumstances rather than by his affection to Lydia. Lydia is the youngest of the Bennet’s sisters. She is gossip, immature, and self-involved. She is also the favorite of her mother because the two have such similar characters. Mrs.Bennet’s affection has brought her into public at an early age; therefore, makes her become a stout, well-grown girl of fifteen. She has high animal spirits, and a sort of natural self-consequence, which the attentions of the officials, to whom her uncle’s good dinners and her own easy manners rec ommended her, has increased into assurance. Lydia is an empty-minded and uncertain flirt who never ceases seeking her own fun and sexual excitement. The only interests in her life are to flirt with red-coated officials in a militia regiment in the neighborhood.Lydia’s minds are more vacant than their sisters’, and when nothing better offered, a walk to Meryton is necessary to amuse their morning hours and furnish conservation for the evening. And â€Å"Lydia, with perfect indifference, continued to express her admiration of Caption Carter, and her hope of seeing him in the course of the day, as he was going the next morning to London. † She is so temperamental that she cries bitterly when she hears that red-coated officials would leave the local town and rejoices when some new red-coated officials come in. As Lydia is young and empty-minded, she never gives love a serious and proper consideration.Her thirsts for carnal desire and unrestrained life determine her sex-oriented marriage, Wickham is seductive and pleasing outwardly, but mean and dirty inwardly. While Lydia, foolish and dissipated, only enchanted by his glorious appearance, sees nothing of his real intention and personality. Obviously, Lydia and Wickham’s marriage is an example of bad marriage. Their marriage is based on appearances, sensuality, superficiality and youthful vivacity. Once they can no longer see these qualities in each other, their relationship will then fade away.

Saturday, November 9, 2019

Virginia Woolf Quotes

Virginia Woolf Quotes Writer Virginia Woolf is a key figure in the modernist literary movement. She is best known for her writings between World War I and World War II including the 1929 essay, A Room of Ones Own, and novels Mrs. Dalloway and Orlando. Interest in Virginia Woolf and her writings revived with the feminist criticism of the 1970s. Selected Virginia Woolf Quotations On Women A woman must have money and a room of her own if she is to write fiction. As a woman, I have no country. As a woman, I want no country. As a woman, my country is the world. I would venture to guess that Anon, who wrote so many poems without signing them, was often a woman. The history of mens opposition to womens emancipation is more interesting perhaps than the story of that emancipation itself. If one could be friendly with women, what a pleasure - the relationship so secret and private compared with relations with men. Why not write about it truthfully? The truth is, I often like women. I like their unconventionality. I like their completeness. I like their anonymity. This is an important book, the critic assumes, because it deals with war. This is an insignificant book because it deals with the feelings of women in a drawing-room. Women have served all these centuries as looking-glasses possessing the magic and delicious power of reflecting the figure of man at twice its natural size. It is fatal to be a man or woman pure and simple: one must be a woman manly, or a man womanly. On Women in Literature [W]omen have burnt like beacons in all the works of all the poets from the beginning of time. If woman had no existence save in the fiction written by men, one would imagine her a person of the utmost importance; very various; heroic and mean; splendid and sordid; infinitely beautiful and hideous in the extreme; as great as a man, some think even better. Have you any notion how many books are written about women in the course of one year? Have you any notion how many are written by men? Are you aware that you are, perhaps, the most discussed animal in the universe? On History Nothing has really happened until it has been recorded. For most of history, Anonymous was a woman. On Life and Living To look life in the face, always, to look life in the face, and to know it for what it is...at last, to love it for what it is, and then to put it away. One cannot think well, love well, sleep well, if one has not dined well. When you consider things like the stars, our affairs dont seem to matter very much, do they? The beauty of the world, which is so soon to perish, has two edges, one of laughter, one of anguish, cutting the heart asunder. Each has his past shut in him like the leaves of a book known to him by his heart, and his friends can only read the title. Its not catastrophes, murders, deaths, diseases, that age and kill us; its the way people look and laugh, and run up the steps of omnibuses. Life is a luminous halo, a semi-transparent envelope surrounding us from the beginning. Someone has to die in order that the rest of us should value life more. On Freedom To enjoy freedom we have to control ourselves. Lock up your libraries if you like, but there is no gate, no lock, no bolt that you can set upon the freedom of my mind. On Time I can only note that the past is beautiful because one never realises an emotion at the time. It expands later, and thus we dont have complete emotions about the present, only about the past. The mind of man works with strangeness upon the body of time. An hour, once it lodges in the queer element of the human spirit, may be stretched to fifty or a hundred times its clock length; on the other hand, an hour may be accurately represented by the timepiece of the mind by one second. On Age The older one grows, the more one likes indecency. One of the signs of passing youth is the birth of a sense of fellowship with other human beings as we take our place among them. These are the souls changes. I dont believe in ageing. I believe in forever altering ones aspect to the sun. Hence my optimism. On War and Peace We can best help you to prevent war not by repeating your words and following your methods but by finding new words and creating new methods. If you insist upon fighting to protect me, or our country, let it be understood soberly and rationally between us that you are fighting to gratify a sex instinct which I cannot share; to procure benefits where I have not shared and probably will not share. On Education and Intelligence The first duty of a lecturer is to hand you after an hours discourse a nugget of pure truth to wrap up between the pages of your notebooks and keep on the mantelpiece forever. If we help an educated mans daughter to go to Cambridge are we not forcing her to think not about education but about war? - not how she can learn, but how she can fight in order that she might win the same advantages as her brothers? There can be no two opinions as to what a highbrow is. He is the man or woman of thoroughbred intelligence who rides his mind at a gallop across country in pursuit of an idea. On Writing Literature is strewn with the wreckage of those who have minded beyond reason the opinion of others. Writing is like sex. First you do it for love, then you do it for your friends, and then you do it for money. It is worth mentioning, for future reference, that the creative power which bubbles so pleasantly in beginning a new book quiets down after a time, and one goes on more steadily. Doubts creep in. Then one becomes resigned. Determination not to give in, and the sense of an impending shape keep one at it more than anything. Masterpieces are not single and solitary births; they are the outcome of many years of thinking in common, of thinking by the body of the people, so that the experience of the mass is behind the single voice. A biography is considered complete if it merely accounts for six or seven selves, whereas a person may well have as many as a thousand. Odd how the creative power at once brings the whole universe to order. When the shriveled skin of the ordinary is stuffed out with meaning, it satisfies the senses amazingly. A masterpiece is something said once and for all, stated, finished, so that its there complete in the mind, if only at the back. I meant to write about death, only life came breaking in as usual. I was in a queer mood, thinking myself very old: but now I am a woman again - as I always am when I write. Humour is the first of the gifts to perish in a foreign tongue. Language is wine upon the lips. On Reading When the Day of Judgment dawns and people, great and small, come marching in to receive their heavenly rewards, the Almighty will gaze upon the mere bookworms and say to Peter, Look, these need no reward. We have nothing to give them. They have loved reading. On Work Occupation is essential. On Integrity and Truth If you do not tell the truth about yourself you cannot tell it about other people. This soul, or life within us, by no means agrees with the life outside us. If one has the courage to ask her what she thinks, she is always saying the very opposite to what other people say. It is in our idleness, in our dreams, that the submerged truth sometimes comes to the top. On Public Opinion On the outskirts of every agony sits some observant fellow who points. It is curious how instinctively one protects the image of oneself from idolatry or any other handling that could make it ridiculous, or too unlike the original to be believed any longer. On Society Inevitably we look upon society, so kind to you, so harsh to us, as an ill-fitting form that distorts the truth; deforms the mind; fetters the will. Great bodies of people are never responsible for what they do. Those comfortably padded lunatic asylums which are known, euphemistically, as the stately homes of England. On People Really I dont like human nature unless all candied over with art. On Friendship Some people go to priests; others to poetry; I to my friends. On Money Money dignifies what is frivolous if unpaid for. On Clothes There is much to support the view that it is clothes that wear us, and not we, them; we may make them take the mould of arm or breast, but they mould our hearts, our brains, our tongues to their liking. On Religion I read the book of Job last night, I dont think God comes out well in it. About These Quotes This quote collection was assembled by Jone Johnson Lewis. Each quotation page in this collection and the entire collection  © Jone Johnson Lewis. This is an informal collection assembled over many years.

Wednesday, November 6, 2019

Rfid Based Attendance System Essays

Rfid Based Attendance System Essays Rfid Based Attendance System Paper Rfid Based Attendance System Paper The attendance system is basically an embedded one. Embedded stands for ‘hardware controlled by software’. Here, the software using a microcontroller controls all the hardware components. The microcontroller plays an important role in the system. The main objective of the system is to uniquely identify and to make attendance for a person. This requires a unique product, which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system are RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system, RFID tag and RFID reader used are operating at 125 KHz. The EEPROM used for storing the details has the capability of storing 256 person details at a time. The PC can be used for restoring all the details of attendance made. 1. 2 WHAT IS RFID? RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. The object of any RFID system is to carry data in suitable transponders, generally known as tags, and to retrieve data, by machine-readable means, at a suitable time and place to satisfy particular application needs. Data within a tag may provide identification for an item in manufacture, goods in transit, a location, the identity of a vehicle, an animal or individual. A system requires, in addition to tags, a means of reading or interrogating the tags and some means of communicating the data to a host computer or information management system. A system will also include a facility for entering or programming data into the tags, if this is not undertaken at source by the manufacturer. Quite often an antenna is distinguished as if it were a separate part of an RFID system. While its importance justifies the attention it must be seen as a feature that is present in both readers and tags, essential for the communication between the two. ?What is the purpose of RFID? RFID allows data to be transmitted by a product containing an RFID tag microchip, which is read by an RFID reader. The data transmitted can provide identification or location information about the product, or specifics such as date of purchase or price 1. 2. 1 Data Flow in RFID: To understand and appreciate the capabilities of RFID systems it is necessary to consider their constituent parts. It is also necessary to consider the data flow requirements that influence the choice of systems and the practicalities of communicating across the air interface. By considering the system components and their function within the data flow chain it is possible to grasp most of the important issues that influence the effective application of RFID. However, it is useful to begin by briefly considering the manner in which wireless communication is achieved, as the techniques involved have an important bearing upon the design of the system components. . 2. 1. 1 Wireless communication and the air interface Communication of data between tags and a reader is by wireless communication. Two methods distinguish and categories RFID systems, one based upon close proximity electromagnetic or inductive coupling and one based upon propagating electromagnetic waves. Coupling is via ‘antenna’ structures forming an integral feature in both tags and readers. While the term antenna is gener ally considered more appropriate for propagating systems it is also loosely applied to inductive systems. To transfer data efficiently via the air interface or space that separates the two communicating components requires the data to be superimposed upon a rhythmically varying (sinusoidal) field or carrier wave. This process of superimposition is referred to as modulation, and various schemes are available for this purpose, each having particular attributes that favour their use. They are essentially based upon changing the value of one of the primary features of an alternating sinusoidal source, its amplitude, frequency or phase in accordance with the data carrying bit stream. On this basis one can distinguish amplitude shift keying (ASK), frequency shift keying (FSK) and phase shift keying (PSK). In addition to non-contact data transfer, wireless communication can also allow non-line-of-sight communication. 1. 2. 2 RFID Operating Frequencies ?Low Frequency (125 kHz) Applications: Access control, livestock, race timing, pallet tracking, automotive immobilizers, pet identification Inductively coupled devices, electro-mechanical field Antenna coil has many turns Read range (near contact to 1 meter) Limited data rate due to a lower bandwidth ?High Frequency (13. 56 MHz) Applications: Supply chain, wireless commerce, ticketing, product authentication, clothing identification, library book identification, smart cards Inductively coupled devices Fewer antenna turns than LF device Read range is from 1 to 1. 5 meters Higher data transfer rate than LF ?Ultra-High Frequency (860-960 MHz) Applications: Supply chain, tool tags, RTLS, EPC case and pallet RF communication uses propagation coupling Smaller reader antenna design than LF or HF Read distance (1 m to 10 m) High data transfer rate More complex reader electronic components 1. 2. 3 Data transfer rate and bandwidth Choice of field or carrier wave frequency is of primary importance in determining data transfer rates. In practical terms the rate of data transfer is influenced primarily by the frequency of the carrier wave or varying field used to carry the data between the tag and its reader. Generally speaking the higher the frequency the higher the data transfer or throughput rates that can be achieved. This is intimately linked to bandwidth or range available within the frequency spectrum for the communication process. The channel bandwidth needs to be at least twice the bit rate required for the application in mind. Where narrow band allocations are involved the limitation on data rate can be an important consideration. It is clearly less of an issue where wide bandwidths are involved. Using the 2. 4 2. 5 GHz spread spectrum band, for example, 2 megabits per second data rates may be achieved, with added noise immunity provided by the spread spectrum modulation approach. Spread spectrum apart, increasing the bandwidth allows an increase noise level and a reduction in signal-to-noise ratio. 1. 2. 4 Range: The range that can be achieved in an RFID system is essentially determined by: ? The power available at the reader/interrogator to communicate with the tag(s) ? The power available within the tag to respond ?The environmental conditions and structures, the former being more significant at higher frequencies including signal to noise ratio 1. 3 RFID SYSTEM AND COMPONENTS: 1. 3. 1 TRANSPONDER/TAG RFID tags are tiny microchips with memory and an antenna coil, thinner than paper and some only 0. 3 mm across. RFID tags listen for a radio signal sent by a RFID reader. When a RFID tag receives a query, it responds by transmitting its unique ID code and other data back to the reader. ?Tag Types Active Tags:Battery powered, long read range Semi-active:Battery power to preserve memory Passive Tags: Low-cost, no battery required, medium read range ?Active RFID Tags Active RFID tags, are called transponders because they contain a transmitter that is always, are powered by a batter, about the size of a coin, and are designed for communications up to 100 feet from RFID reade r. They are larger and more expensive than passive tags, but can hold more data about the product and are commonly used for high-value asset tracking. Active tags may be read-write, meaning data they contain can be written over. Semi-Active RFID Tags Semi-active tags contain a small battery that boosts the range and preserves memory. ? Passive RFID Tags Passive tags can be as small s 0. 3 mm and dont require batteries. Rather, they are powered by the radio signal of a RFID reader, which ? Â §wakes them up to request a reply. Passive RFID tags can be read from a distance of about 20 feet. They are generally reads ?32 mm and 23 mm capsule transponder inch key head transponder ?Smart Labels (Clear and Adhesive) ?Circular transponders 1. 3. 2 RFID READERS Readers are radio frequency devices that: ?Transmit and receive RF signals ?Contain a control unit to execute commands ?Incorporate an interface to transfer data ?Receives commands from a Host computer ?Passes data back to the Host RFID readers, also called interrogators, first and foremost are used to query RFID tags in order to obtain identification, location, and other information about the device or product the tag is embedded in. The RF energy from the reader antenna is collected by the RFID tag antenna and used to power up the microchip. READER CHARACTERISTICS: Stationary or handheld (different RFID Reader Modules) Weather-proof or industrialized Typical read ranges vary from a few centimeters to a few meters Read range is dependent upon: Broadcast signal strength Size of broadcast antenna Size of transponder antenna The environment Metallic, Liquid -Multi-frequency readers ?RFID read-only readers These devices can only query or read information from a nearby RFID tag. These readers are found in fixed, stationary applications as well as portable, handheld varieties. ?RFID read-write readers Also known as encoders, these devices read and also write (change) information in an RFID tag. Such RFID encoders can be used to program information into a ? Â §blank RFID tag. A common application is to combine such a RFID reader with a barcode printer to print. Smart labels contain a UPC bar code on the front with an RFID tag embedded on the back. 1. 3. 3 ANTENNAS: Antenna Characteristics: Transmits and receives RF signals Typically made of copper or aluminum, new technologies for printed antennas Stationary or handheld Weather-proof/industrialized Fixed or tunable 1. 3. 4 RFID System Considerations ?Read distance requirements Long read range Short read range ?Frequency All frequencies have their pros and cons ?ISO standards Proprietary or standards-based ?Government regulations Varies from country to country ?Multiple Tag Reading in Same Field Anti -collision ?Sensitivity to Orientation A single orientation or omni-directional ?Hardware Set-up Environment can affect performance Bonding ability Bonding surface Substrate Interference Historical reasons Security Reliability 1. 4 AREAS OF APPLICATION FOR RFID: Livestock tracking Automotive immobilizer Contact less payment Anti-theft Library books Speed pass Control Access Production/Inventory tracking A range of miscellaneous applications may also be distinguished, some of which are steadily growing in terms of application numbers. They include: -Animal tagging -Waste management -Time and attendance -Postal tracking -Airline baggage reconciliation -Road toll management 1. WHAT IS THE ADVANTAGE OF USING RFID TECHNOLOGY? No contact or even line-of-sight is needed to read data from a product that contains an RFID tag. This means no more checkout scanners at grocery stores, no more unpacking shipping boxes, and no more getting keys out of your pocket to start your car. RFID technology also works in rain, snow and other environments where bar code or optical scan technology would be useless. Contact le ss Credit Card Advantages Credit card companies are claiming the following advantages for contact less credit cards: The card is faster to use. To make a purchase, the card owner just waves his card over the RFID reader, waits for the acceptance indicator and goes on his way. American Express, Visa and MasterCard have all agreed to waive the signature requirement for contactless credit card transactions under $25. Looking at the numbers, here is where this technology is taking us in our need for speed (average transaction speeds): 1. Contact less credit card transaction: 15 seconds 2. Magnetic strip card transaction: 25 seconds 3. Cash transaction: 34 seconds The contact less card never transmits your card number. Instead, the RFID chip within the card creates a unique number for the transaction; if a criminal intercepted the number, it would be useless even if successfully decrypted. Contact less cards probably use other measures although this is just speculation, there are certainly other ways to secure the data on the card. For example, the RFID reader that sits on the merchants counter may use some sort of special signal, or offer a special set of frequencies, that would be difficult for a thief with an off-the-shelf reader to duplicate. 1. 6 COMMON PROBLEMS WITH RFID Some common problems with RFID are reader collision and tag collision. Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. ?Problems with RFID Standards Different manufacturers have implemented RFID in different ways; global standards are still being worked on. It should be noted that some RFID devices are never meant to leave their network (as in the case of RFID tags used for inventory control within a company). This can cause problems for companies. Consumers may also have problems with RFID standards. For example, Exxon Mobil’s Speed Pass system is a proprietary RFID system; if another company wanted to use the convenient Speed Pass (say, at the drive-in window of your favorite fast food restaurant) they would have to pay to access it . On the other hand, if every company had their own Speed Pass system, a consumer would need to carry many different devices with them. RFID systems can be easily disrupted Since RFID systems make use of the electromagnetic spectrum (like WiFi networks or cell phones), they are relatively easy to jam using energy at the right frequency. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is incre asingly used, like hospitals or in the military in the field. Also, active RFID tags (those that use a battery to increase the range of the system) can be repeatedly interrogated to wear the battery down, disrupting the system. ?RFID Reader Collision Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem; many systems use an anti-collision protocol (also called a singulation protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader. ?RFID Tag Collision Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. ?Security privacy problems with RFID An RFID tag cannot tell the difference between one reader and another. RFID scanners are very portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone to see the contents of your purse or pocket as you walk down the street. . ?RFID tags are difficult to remove RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter square, and as thin as a sheet of paper) others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all. RFID tags can be read without your knowledge Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see wh at you are carrying. ?RFID tags can be read a greater distance with a high-gain antenna For various reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. However, a high-gain antenna can be used to read the tags from much further away, leading to privacy problems. RFID tags with unique serial numbers could be linked to an individual credit card number. At present, the Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with a credit card number. . 7 WILL RFID REPLCE THE UPC BARCODE TECHNOLOGY? Probably not, at least not soon. Besides the fact that RFID tags still cost more than UPC labels, different data capture and tracking technologies offer different capabilities. Many businesses will likely combine RFID with existing technologies such as barcode readers or digital cameras to achieve expanded data captur e and tracking capabilities that meet their specific business needs. ?Advantages of RFID Versus Barcodes RFID tags and barcodes both carry information about products. However, there are important differences between these two technologies: Barcode readers require a direct line of sight to the printed barcode; RFID readers do not require a direct line of sight to either active RFID tags or passive RFID tags. RFID tags can be read at much greater distances; an RFID reader can pull information from a tag at distances up to 300 feet. The range to read a barcode is much less, typically no more than fifteen feet. RFID readers can read, RFID tags much faster; read rates of forty or more tags per second are possible. Reading barcodes is much more time-consuming; due to the fact that a direct line of sight is required, if the items are not properly oriented to the reader it may take seconds to read an individual tag. Barcode readers usually take a half-second or more to successfully complete a read. Line of sight requirements also limit the ruggedness of barcodes as well as the reusability of barcodes. (Since line of sight is required for barcodes, the printed barcode must be exposed on the outside of the product, where it is subject to greater wear and tear. RFID tags are typically more rugged, since the electronic components are better protected in a plastic cover. RFID tags can also be implanted within the product itself, guaranteeing greater ruggedness and reusability. Barcodes have no read/write capability; that is, one cannot add to the information written on a printed barcode. RFID tags, however, can be read/write devices; the RFID reader can communicate with the tag, and alter as much of t he information as the tag design will allow. RFID tags are typically more expensive than barcodes, in some cases. BLOCK DIAGRAM 2. 1 GNERAL BLOCK DIAGRAM (POWER SUPPLY+CONTROLLER SECTION+RFID) Figure 2. 1 General Block Diagram POWER SUPPLY: This block provides 5V and 9V DC supply to controller and RFID section respectively. It simply consists of a bridge rectifier along with a step down transformer of 230/0-12v, which converts 230v to 12v. The capacitor provide smoothing to the DC voltage. The regulator IC 7805 provides regulation by eliminating the ripples by setting DC output to fixed voltage. CONTROLLER SECTION: It is a main section of the project which consists of microcontroller AT89S52, RTC DS1307, E2PROM AT24C08, 16X2 LCD and all the necessary components to control the data flow, to display the data and provide the serial data to the RFID section. This section is the main interface between power supply and RFID section. RFID SECTION: This section is the heart of the project. The entire module includes RFID tag for marking attendance, RFID reader to detect the tag and an antenna coil which allows the reception of EM waves. 2. 2 BLOCK DIAGRAM SHOWING THE INSIDE VIEW OF THE CONTROLLER SECTION Figure 2. 2- Block Diagram Showing Inside View of Controller Section POWER SUPPLY 1: This block provides 5V supply to Microcontroller, RTC, E2PROM, MAX232, and DISPLAY. It simply consists of a bridge rectifier along with a step down transformer and also 7805. It uses capacitor for filtering when bridge rectifier converts 230V AC to 12V pulsating DC. It makes partial smooth dc that is given to 7805 and give an out put of 5V DC. MICROCONTROLLER: This section controls the functioning of the whole system and is interfaced with RTC, E2PROM, MAX232, and DISPLAY. RTC: It is DS1307 RTC. This section is interfaced with microcontroller . This RTC will display date and time when nothing is detected. It gives information about seconds, minutes, hours, days, weeks, months, POWER SUPPLY 2: This section is the backup supply voltage for RTC it is the 3v dc battery. It will provide voltage during the low power supply or power supply failure. With the help of this power supply RTC can keep track on its real time working. E2PROM: It is AT24C08. This section is external ROM to store the student data when internal ROM is full. Due to the extra storage requirement to store the student information it is require to extend the storage capacity of microcontroller that’s why EEPROM is connected in this section. It will store the data of around 256 students. MAX232: It is dual driver-receiver IC. This section helps to communicate with computer. It is required for transferring data of student from internal and external ROM. It is used to collect the daily data of student and keeps the record of the attendance saved in the computer. DISPLAY: It is 162 LCD display. This section display date and time when nothing is detected at reader side and shows student information when tag is detected at reader. POWER SUPPLY 3: It is inbuilt in the RFID module and provides 9v DC supply to the section. RFID MODULE: It is a ready-made module that contain ANTENNA coil, RFID READER and TAG shown in block diagram 3. 2. 3 RFID MODULE Figure 2. 3-RFID Module RFID READER: This block is heart of this module that read the tag with the help of antenna coil. It requires 5V DC supply for it’s functioning that is provided by 7805 mounted on RFID module PCB. ANTENNA: This helps the reader to detect the tag and provide the range of about 8 centimeters. It is an inductive coil of low impedance. It’s a loop antenna. BUZZER AND LED: This block gives indication about the tag reading. When tag comes in the range of reader the LED will glow and buzzer will generate a sound. 3 CIRCUIT DIAGRAM 3. 1 ENTIRE CIRCUIT DIAGRAM Figure 3. 1-Entire Circuit Diagram Entire Circuit Diagram: The entire circuit diagram includes all the three sections that is controller, power supply and the RFID section. AT89S52 is 8-bit microcontroller with 8k bytes of in-system programmable flash memory. LCD, RTC, EEPROM and MAX232 all are interfaced with the microcontroller. The reader gives the serial data of the ID it reads to the microcontroller. A 5v DC supply is required by the entire circuit except the RFID section. The reader section is a 28-pin IC. Pin 27 28 are for connection to the antenna. A buzzer is connected across the pins 3 12. Pin 6 gives the serial data to the microcontroller. A 9v DC supply is required for RFID section which is provided separately in the module. AT24C08 is the EEPROM which is used for storing details of the student’s data. It has the capability of storing 256 person details at a time. It enhances the data storing capability of the system. 162 LCD will initially display date and time, and when a TAG is showed it will display the username of the TAG. MAX232 is dual driver-receiver that is used for communication with a PC. DS1307 is a serial real time clock (RTC). It provides 2-wire serial interface nad is used for low power applications. 3V supply is needed for DS1307. In actual the connection between microcontroller and RFID module is not single wired connection. It is RS232 connection. The module having female RS232 connector and microcontroller having male RS232 connector. . 2 CONTROLLER SECTION CIRCUIT DIAGRAM: Figure 3. 2-Controller Section Circuit Diagram Controller Section Circuit Diagram: The controller section contain AT89S52 (Micro controller), AT24C08 (EEPROM), MAX 232 (Dual driver), 16X2 LCD,DS1307 (RTC). Microcontroller is the heart of entire section that controls all operation. Microcontroller is interfaced with EEPROM. It is external ROM provided to e xtend the data storage capacity of the system. When internal ROM memory become full the extra data then store to this EEPROM. It will store around 256 student data. Pin 21 and 22 of microcontroller is connected to pin 5 and 6 of EEPROM respectively pin 1, 2, 3, 4, 7 are connected to the ground and pin 8 is connected to Vcc. For real time operation microcontroller is connected to RTC DS1307. It provides information about second, minutes, hours, days, weeks, months, years. It has information up to year 2100. It automatically sets the days in particular month. Microcontroller is interfaced with RTC to show date and time when card is not detected at reader side. It connected to RTC through pin 5(serial clock), pin 6(serial data), pin 7(square wave/output driver) via pin 3(P1. 2), pin2(P1. ), pin1(P1. 0) of microcontroller. A crystal of 32. 768 Khz is connected across to provide the required baud rate. It is connected to 3V battery to maintain the real time operation when power is OFF. Microcontroller is interfaced with LCD which display’s the information when the tag is detected. When no Tag is detected at reader side it display date and time . Whenever Tag is detected it shows the Tag related data on display. Four switches are provided to scroll the menus in LCD. Microcontroller is connected to MAX232 to communicate between system and computer. It communicates via RS232 connector. 3. 3 READER CIRCUIT DIAGRAM Figure 3. 3-RFID Circuit Diagram RFID Reader: RFID is an acronym for Radio Frequency Identification. RFID is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying just about any material object. There are several characteristics of an RFID reader that determine the types of tags with which it can communicate. The most fundamental characteristic is the frequency or frequencies at which the reader’s radio communicates. Readers and tags must be tune to same frequency in order to communicate. Some RFID readers can communicate at more than one frequency. Some corporation offers a dual-frequency RFID reader and tag product line. Supporting dual-frequency communications enables these types of readers to operate efficiently in changing environments. Most RFID readers communicate exclusively with active tags or exclusively with passive tags. This means that an RFID reader that is manufactured to communicate with passive tags will not be able to communicate with active tags and vice versa. Passive tags are generally smaller, lighter and less expensive than those that are active and can be applied to objects in harsh environments, are maintenance free and will last for years. These transponders are only activated when within the response range of a reader. The RFID reader emits a low-power radio wave field which is used to power up the tag so as to pass on any information that is contained on the chip. A key feature of an RFID reader is the number of tags that it can sample in its tag population. Some readers may be able to sample 10 tags a second while others may be able to sample 100 tags a second. The following items usually influence the number of tags sampled per second: ?The anti-collision algorithm used by the tags The processing capabilities of the reader which usually maps to the type and speed of processor in the reader ? The amount of memory in the reader ?The capabilities of the digital signal processor in the reader’s radio RFID readers come in many sizes, frequencies and with different data processing and reporting capabilities. Understanding these characteristics is important for designing an RFID solution that will function properly and be maintainable. Antenna: The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. Passive RFID tags make use of a coiled antenna that can create a magnetic field using the energy provided by the readers carrier signal. The antenna used for an RFID tag is affected by the intended application and the frequency of operation. Low-frequency (LF) passive tags are normally inductively coupled, and because the voltage induced is proportional to frequency, many coil turns are needed to produce enough voltage to operate an integrated circuit. Compact LF tags, like glass-encapsulated tags used in animal and human identification, use a multilayer coil (3 layers of 100–150 turns each) wrapped around a ferrite core. The scanning antennas can be permanently affixed to a surface; handheld antennas are also available. They can take whatever shape you need; for example, you could build them into a doorframe to accept data from persons or objects passing through. When an RFID tag passes through the field of the scanning antenna, it detects the activation signal from the antenna. That wakes up the RFID chip, and it transmits the information on its microchip to be picked up by the scanning antenna. How RFID Works How does RFID work? A Radio-Frequency Identification system has three parts: A scanning antenna A transceiver with a decoder to interpret the data A transponder the RFID tag that has been programmed with information. The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation does two things: It provides a means of communicating with the transponder (the RFID tag) AND It provides the RFID tag with the energy to communicate (in the case of passive R FID tags). 3. 4 POWER SUPPLY Figure 3. 4 Power Supply Circuit Diagram This circuit generates positive 5V DC supply which is given to the controller section. It consists of 230V/0-12V transformer. A bridge rectifier is formed by the bridge connections of four 1N4007 diodes. The output is full wave varying DC since it utilizes the entire AC cycle. Smoothing is performed by a large capacitor connected across the DC supply. It is done by C3 and it smoothes DC to small ripples. LM7805 is the regulator IC which eliminates ripples by setting DC output to fixed voltage. 4 HARDWARE 4. 1 AT89S52 8-bit Microcontroller with 8K Bytes In-System Programmable Flash Features ?Compatible with MCS-51 Products ?8K Bytes of In-System Programmable (ISP) Flash Memory – Endurance: 1000 Write/Erase Cycles ? 4. 0V to 5. 5V Operating Range Fully Static Operation: 0 Hz to 33 MHz ?Three-level Program Memory Lock ?256 x 8-bit Internal RAM ?32 Programmable I/O Lines ?Three 16-bit Timer/Counters ?Eight Interrupt Sources ?Full Duplex UART Serial Channel ?Low-power Idle and Power-down Modes ?Interrupt Recovery from Power-down Mode ?Watchdog Timer ?Dual Data Pointer ?Power-off Flag Description: The AT89 S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset. Block diagram: Figure 4. 1-AT89S52 Block Diagram Figure 4. 2-AT89S52 Pin Diagram PIN DESCRIPTION ?VCC Supply voltage (+5V DC). ?GND Ground. ?Port 0 Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 can also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pull-ups. ?Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. In addition, P1. 0 and P1. 1 can be configured to be the timer/counter 2 external count input (P1. 0/T2) and the timer/counter 2 trigger input (P1. 1/T2EX), ?Port 2: Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). ?Port 3: Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also receives some control signals for Flash programming and verification. RST Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out. ?ALE/PROG: Address Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programmi ng. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external data memory. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode. ?PSEN Program Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. ?EA/VPP External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming. ?XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. ?XTAL2: Output from the inverting oscillator amplifier. SPECIAL FUNCTION REGISTERS: A map of the on-chip memory area called the Special Function Register (SFR). Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect. ?Timer 2 Registers: Control and status bits are contained in registers T2CON and T2MOD for Timer 2. The register pair are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode. ?Interrupt Registers: The individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register. Memory Organization: MCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external Program and Data Memory can be addressed. ?Program Memory: If the EA pin is connected to GND, all program fetches are directed to external memory. On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are to external memory. ?Data Memory: The AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. This means that the upper 128 bytes have the same addresses as the SFR space but are physically separate from SFR space. When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions which use direct addressing access of the SFR space. Instructions that use indirect addressing access the upper 128 bytes of RAM. ?Watchdog Timer (One-time Enabled with Reset-out) The WDT is intended as a recovery method in situations where the CPU may be subjected to software upsets. The WDT consists of a 13-bit counter and the Watchdog Timer Reset (WDTRST) SFR. The WDT is defaulted to disable from exiting reset. To enable the WDT, a user must write 01EH and 0E1H in sequence to the WDTRST register (SFR location 0A6H). When the WDT is enabled, it will increment every machine cycle while the oscillator is running. The WDT timeout period is dependent on the external clock frequency. There is no way to disable the WDT except through reset (either hardware reset or WDT overflow reset). When WDT overflows, it will drive an output RESET HIGH pulse at the RST pin. ?Using the WDT To enable the WDT, a user must write 01EH and 0E1H in sequence to the WDTRST register (SFR location 0A6H). When the WDT is enabled, the user needs to service it by writing 01EH and 0E1H to WDTRST to avoid a WDT overflow. The 13-bit counter overflows when it reaches 8191 (1FFFH), and this will reset the device. When the WDT is enabled, it will increment every machine cycle while the oscillator is running. This means the user must reset the WDT at least every 8191 machine cycles. To reset the WDT the user must write 01EH and 0E1H to WDTRST. WDTRST is a write-only register. The WDT counter cannot be read or written. When WDT overflows, it will generate an output RESET pulse at the RST pin. The RESET pulse duration is 96xTOSC, where TOSC=1/FOSC. To make the best use of the WDT, it should be serviced in those sections of code that will periodically be executed within the time required to prevent a WDT reset. ?WDT during Power-down and Idle In Power-down mode the oscillator stops, which means the WDT also stops. While in Power-down mode, the user does not need to service the WDT. There are two methods of exiting Power-down mode: by a hardware reset or via a level-activated external interrupt which is enabled prior to entering Power-down mode. When Power-down is exited with hardware reset, servicing the WDT should occur as it normally does whenever the AT89S52 is reset. Exiting Power-down with an interrupt is significantly different. The interrupt is held low long enough for the oscillator to stabilize. When the interrupt is brought high, the interrupt is serviced. To prevent the WDT from resetting the device while the interrupt pin is held low, the WDT is not started until the interrupt is pulled high. It is suggested that the WDT be reset during the interrupt service for the interrupt used to exit Power-down mode. To ensure that the WDT does not overflow within a few states of exiting Power-down, it is best to reset the WDT just before entering Power-down mode. Before going into the IDLE mode, the WDIDLE bit in SFR AUXR is used to determine whether the WDT continues to count if enabled. The WDT keeps counting during IDLE (WDIDLE bit = 0) as the default state. To prevent the WDT from resetting the AT89S52 while in IDLE mode, the user should always set up a timer that will periodically exit IDLE, service the WDT, and reenter IDLE mode. With WDIDLE bit enabled, the WDT will stop to count in IDLE mode and resumes the count upon exit from IDLE. ?UART The UART in the AT89S52 operates the same way as the UART in the AT89C51 and AT89C52. For further information on the UART operation, refer to the ATMEL Web site ( atmel. com). From the home page, select ‘Products’, then ‘8051-Architecture Flash Microcontroller’, then ‘Product Overview’. ?Timer 0 and 1 Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the AT89C51 and AT89C52. For further information on the timers’ operation, refer to the ATMEL Web site ( atmel. com). From the home page, select ‘Products’, then ‘8051-Architecture Flash Microcontroller’, then ‘Product Overview’. ?Timer 2 Timer 2 is a selected by bits in T2CON, as shown in Table 3. Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2). Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are is 1/12 of the oscillator frequency. 4. 2 AT24C08 2-wire Serial EEPROM Features: ?Low-voltage and Standard-voltage Operation –2. 7 (VCC = 2. 7V to 5. 5V) –1. (VCC = 1. 8V to 5. 5V) ?Internally Organized 128 x 8 (1K), 256 x 8 (2K), 512 x 8 (4K), ? 1024 x 8 (8K) or 2048 x 8 (16K) ?2-wire Serial Interface ?Schmitt Trigger, Filtered Inputs for Noise Suppression ?Bi-directional Data Transfer Protocol ?100 kHz (1. 8V) and 400 kHz (2. 5V, 2. 7V, 5V) Compatibility ? Write Protect Pin for Hardware Data Prote ction ?8-byte Page (1K, 2K), 16-byte Page (4K, 8K, 16K) Write Modes ? Partial Page Writes are Allowed ?Self-timed Write Cycle (5 ms max) ?High-reliability –Endurance: 1 Million Write Cycles –Data Retention: 100 Years ?Automotive Grade, Extended Temperature and Lead-free/Halogen-free Devices ? Available ?8-lead PDIP, 8-lead JEDEC SOIC, 8-lead MAP, 5-lead SOT23, ? 8-lead TSSOP and 8-ball dBGA2â„ ¢ Packages ?Description: The AT24C08 provides 8192 bits of serial electrically erasable and programmable read-only memory (EEPROM) organized as 1024 words of 8 bits each. The device is optimized for use in many industrial and commercial applications where low-power and low-voltage operation are essential. The AT24C08 is available in space-saving 8-lead PDIP, 8-lead JEDEC SOIC, 8-lead MAP, 5-lead SOT23 , 8- lead TSSOP and 8-ball dBGA2 packages and is accessed via a 2-wire serial interface Block diagram: Figure 4. 3-AT24C08 Block Diagram Figure 4. 4-AT24C08 Pin Diagram Pin Description ?SERIAL CLOCK (SCL): The SCL input is used to positive edge clock data into each EEPROM device and negative edge clock data out of each device. ?SERIAL DATA (SDA): The SDA pin is bi-directional for serial data transfer. This pin is open-drain driven and may be wire-ORed with any number of other open-drain or open collector devices. ?DEVICE/PAGE ADDRESSES (A2, A1, A0): The A2, A1 and A0 pins are device address inputs. The A0 pin is a no connect. The AT24C08 only uses the A2 input for hardwire addressing and a total of two 8K devices may be addressed on a single bus system. The A0 and A1 pins are no connects. Memory Organization ?AT24C08, 8K SERIAL EEPROM: Internally organized with 64 pages of 16 bytes each, the 8K requires a 10-bit data word address for random word addressing. Device Operation ?CLOCK and DATA TRANSITIONS: The SDA pin is normally pulled high with an external device. Data on the SDA pin may change only during SCL low time periods. ?START CONDITION: A high-to-low transition of SDA with SCL high is a start condition which must precede any other command STOP CONDITION: A low-to-high transition of SDA with SCL high is a stop condition. After a read sequence, the stop command will place the EEPROM in a standby power mode ? ACKNOWLEDGE: All addresses and data words are serially transmitted to and from the EEPROM in 8-bit words. The EEPROM sends a zero to acknowledge that it has received each word. ?STANDBY MODE: The AT24C08 features a low-power standby mode which is enabled: (a) upon power-up and (b) after the receipt of the STOP bit and the completion of any internal operations. ?MEMORY RESET: After an interruption in protocol, power loss or system eset, any 2- wire part can be reset by following these steps: 1. Clock up to 9 cycles. 2. Look for SDA high in each cycle while SCL is high. 3. Create a start condition. Device Addressing: The 8K EEPROM only uses the A2 device address bit with the next 2 bits being for memory page addressing. The A2 bit must compare to its corresponding hard-wired input pin. The A1 and A0 pins are not connected. Write Operations ?BYTE WRITE: A write operation requires an 8-bit data word address following the device address word and acknowledgment.