Monday, September 30, 2019

Data Communications Essay

Differentiate between an analog and a digital electromagnetic signal. What are three important characteristics of a periodic signal. What is the relationship between the wavelength and frequency of a sine wave. Define fundamental frequency. What is the relationship between a signal’s spectrum and its bandwidth. What is attenuation? Define channel capacity. What key factors affect channel capacity? Problems: Figure 1 shows the frequency domain function for a single square pulse. The signal pulse could represent a digital 1 in a communications system. Note that an infinite number of higher frequencies of decreasing magnitudes is needed to represent the single pulse. What implication does that have for a real digital transmission system? Suppose that a digitised TV picture is to be transmitted from a source that uses a matrix of 480 x 500 picture elements (pixels), where each pixel can take on one of 32 intensity values. Assume that 30 pictures are sent per second. (This digital source is is roughly equivalent to broadcast TV standards that have been adopted.) Find the source rate R (bps) Assume that the TV picture is to be transmitted over a channel with 4.5Mhz bandwidth and a 35dB signal-to -noise ratio. Find the capacity of the channel (bps). Discuss how the parameters given in part (a.) could be modified to allow transmission of colour TV signals without increasing the required value for R. What is the channel capacity for a teleprinter channel with a 300Hz bandwidth and a signal-to-noise ratio of 3dB, where the noise is white thermal noise? A digital signalling system is required to operate at 9600bps. If a signal element encodes a 4-bit word, what is the minimum required bandwidth of the channel? Repeat part (a .) for the case of 8-bit words. Given the narrow (usable) audio bandwidth of a telephone transmission facility, a nominal SNR of 56dB (400,000), and a certain level of distortion, What is the theoretical maximum channel capacity (kbps) of traditional telephone lines? What can we say about the actual maximum channel capacity? Given a channel with an intended capacity of 20Mpbs, the bandwidth of the channel is 3MHz. Assuming white thermal noise, what signal-to-noise ratio is required to achieve this capacity? If an amplifier has a 30dB voltage gain, what voltage ratio does the gain represent? An amplifier has an output of 20W. What is the output in dBW? Answers: Short Questions With guided media, the electromagnetic waves are guided along an enclosed physical path whereas unguided media provide a means for transmitting electromagnetic waves but do not guide them. A continuous or analog signal is one in which the signal intensity varies in a smooth fashion over time while a discrete or digital signal is one in which the signal intensity maintains one of a finite number of constant levels for some period of time and then changes to another constant level. Amplitude, frequency, and phase are three important characteristics of a periodic signal. The relationship is ÃŽ »f = v, where ÃŽ » is the wavelength, f is the frequency, and v is the speed at which the signal is traveling. The fundamental frequency is the lowest frequency component in the Fourier representation of a periodic quantity. The spectrum of a signal is the frequencies it contains while the bandwidth of a signal is the width of the spectrum. Attenuation is the gradual weakening of a signal over dis tance. The rate at which data can be transmitted over a given communication path, or channel, under given conditions, is referred to as the channel capacity. Bandwidth, noise, and error rate.

Sunday, September 29, 2019

Analysing an advert for a porcelain statue of Gandalf the great

Imagine a world without media. Media is a process of communication, information and entertainment. Media consumes everyone's every day life†¦ it is imposable to avoid! With our ever growing world more and more people are now relaying on media as it pervades our very existence, we may not realize it but media is around us twenty four hours a day, 7 days a week, without media we would be thrown back into the dark ages whether it is from us using the internet or using the phone media is the creator of the world today. Advertising is used to achieve many objectives e.g. to persuade, change opinions, maybe you smoke advertising is possible to change your mind. Advertising is also used to manipulate, sell and influence. Advertising, it is a large part of our vast world as it is imposable to escape†¦ it is every where! On the clothes we were, on the bags we carry, almost every item we see or use has some form of advertising on it. There are multiple forms of advertising some of these being: tv,radio,posters,bill boards, leaflets and the internet†¦ 87% of u.k teens ages 12 to 17 currently use the Internet, representing about 21 million youth. Of those, approximately 11 million teens go online on a daily basis. Advertising is a leading multimillion pound business as everyone every where has used this many times. For my assignment, I will be analysing an advert for a porcelain statue of Gandalf the great. The audience of this advert are adults in particular lord of the rings enthusiasts and people who like to collect memorabilia. The character from the book Lord of the Rings (Gandalf) is clearly for adults because the product is a figurine not a toy as if this was given to a child it would be broken. Another way I no that the target audience are adults is the amount of body copy as it would not appeal or interest a child because there is such a shear amount. The final reason i now the consumers are adults are that the order form in the left hand corner has credit card details of which a child could not access. The large body copy of the advertisement has six paragraphs which each have a different aspect. The opening paragraph which initially describes ‘Gandalf' the character uses linguistic devices such as; alliteration, superlatives and emotive language these are used to influence the consumer to purchase the figurine. The detail in this has continuously been boasted in the body copy ‘guants on his face'. This is such an amazing work of art with meticulous dental therefore it is quality. ‘Painstaking attention to detail' this shows the making of their product has taken lots of effort and lots of time in order to achieve true quality. Buying this product is a bargain. A once in a life time opportunity their product is high, callibre very cheap just à ¯Ã‚ ¿Ã‚ ½24.99.It is remarkable value for money the word ‘just' has the connotation of a great offer. The buyer/consumer are also informed that they will receive an officially authorized product which put forth the idea of this not being a cheap imitation, it's the real deal! The product is also part of a collection which means further opportunity to purchase outstanding products, the fact of there being more collectable products available temps the audience to by the figurine to create a montage. The product is exclusive to ‘Danbury Mint' this gives the connotation of this being a special offer as it is not available to purchase anywhere else also it has been officially authorized and endorsed by Tolkin. The final paragraph ends with the imperative ‘reserve your sculpture now' the reader is urged to reserve the product to avoid disappointment as ‘demand is sure to be high' this implies the product of which is popular. So far I have analyzed the linguistic devices, yet there are presentational devices used to provoke the target audience. The two main forms of the presentational devices are; the huge amount of body copy which is compact with stylistic devices, and the picture of which dominates the page/advert. The picture dominates the advert by the size and that it is symmetrically composed it is prominence. The image is also a mid shot to enable that the consumer is able to see before they buy. This gives the connotation that the producers have great confidence in there product. The producer has used a close up picture to boast the product; ‘fearless expression†¦the lines of his gaunt, aged face†¦his long beard. The producer has used multiple colours for presentational devices used to manipulate the target audience. The green background is soft (subtle) green to enable that the reader is drawn to the image of the statue rather than the background, also this gives the connotation of the green fields and the forests in the book ‘Lord Of The Rings'. The second colour used in this advert is gold which is in the top left hand corner (title box) this makes it eye catching and gives the connotation of the product being expensive (precious) it also gives the connotation of the gold ring which is in the book aswell. The final colour that is used is black and white which is used in the order form these colors are used because they are simple (easy to follow) also so it is intimately hard to make mistakes when purchasing. The gold used in the title box is of which the p.o.a (primary optical area) other than this being eye catching, it displays the title ‘Gandalf' which provides instant recognisation to any ‘Lord Of The Rings' fan as he is a key/main character in the book. The title is also in a font of which is antiquated/med evil this provides the connotation of magic, mystic and age†¦ after all ‘Gandalf' is a wizard. In the bottom right hand of the page we have the terminal area (T.A).'Send no money now!' This is placed in the T.A because it is the last place the consumer looks therefore the last fixation the consumer remembers.

Saturday, September 28, 2019

Issues of Higher Education - Who Will Pay For It Research Paper

Issues of Higher Education - Who Will Pay For It - Research Paper Example There is a greater distinction among Whites, Africans, Americans and Hispanics on matter of degree than kind. The research also examined the level of financial aid that increased the discount to tuition that has diverse affect to the tuition increase. As Americans emerges from the last decade’s recession, the higher education system together with economic as well as social sector needs boosting in order to exploit our human and physical education. As recovery commences, the financial aid has improved life of many Americans, with those at the top benefitting a lot. Moreover, gap between those who access the financial aid and those who do not continue to grow. Public investment on higher education has operated for up to three decades in order to eliminate economic barriers and to persist in college. Additionally, the financial aid towards educational opportunity has had massive growth from $558 Million in 1963 to a flabbergasting $43 Billion in 1993-94. Federal financial aid to various college students has increasingly awarded in the form of public subsidized loans. Lutz (2012) have estimated that loan defaulters rose by 58% during the 80s, whereas defaulters claims also grew by about 1300%, thereby covering over a fraction of a fifth total amount to fund the program (Lutz, 2012). In that case Americans, federal government loan program entitles all students a loan with interest lower than market rates with an option flexible repayment. Furthermore, loans are given to students with no consideration on either income earnings, option of institution attended, or course pursued by students. Student’s loans mainly address the important goal on strategic administration by ensuring access to affordable and accountable to higher education and adults are much better prepared for employment and future learning. Like any issue of national importance, there

Friday, September 27, 2019

Mobile Computing and Social Networks Term Paper

Mobile Computing and Social Networks - Term Paper Example On the other hand, mobile communication devices, once completely charged, are able to offer the similar working for 48 to 96 hours. Additionally, laptops and notebooks need a connection to a network for Internet access that is available at fixed site in working or living structure or wireless access points. Hence, these limitations make these systems and devices difficult to use and manage. On the other hand, mobile communication devices have a network connection access more than 99% of the time in approximately every region of developed nations (Goundar, 2011; Wyeth & MacColl, 2010; Draganova, 2009). This paper discusses some of the important aspects associated with mobile devices. This paper will discuss the impact of mobile devices in different areas of life. This paper also discusses any issues linked with the use of mobile devices. This paper will discuss the factors that need to be considered by mobile application developers while developing these applications. A few years ago having a cell phone was believed to be a social status symbol. At the present the system has been marketed as a need that we all need to carry out different tasks all through the day. Additionally, in the past the size of the telephones was extremely huge and they were kept in peoples automobiles. No one ever appeared to talk about wireless plans, or the potentials of their telephones. The simple question people discussed was, why did we bring our cordless telephone to the job? That appeared to be the simplest other time somebody actually saw a phone with that look. Now telephones have taken the shape of a great more innovative technology as they appear in various versions such as PDA, iPod, and iPhones. This century has seen the successful inventions and implementations of numerous technologies. These technologies have not only changed the way we live but also modernized them. Additionally, the new evolutionary technologies have

Thursday, September 26, 2019

Personal profile about Roger Tsien who is biochemist Essay

Personal profile about Roger Tsien who is biochemist - Essay Example However, such technology was available from the as late as the 1990’s. Roger Tsien was the winner of a third of the Nobel Prize in chemistry in 2008, along with Osamu Shimomura and Martin Chalfie. The winners of the 2008 Nobel Prize in chemistry were selected because of their research that led to the discovery and development of the green fluorescent protein, GFP. Their work on GFP was important in the field of biology as it enabled scientists to be able to study living cells at the molecular level. Roger Tsien is a Chinese-American born on February1, 1952 in New York, USA. The professor of the University of California, San Diego Tsien is a generational descendant of ancient china Wuyue kingdom’s King Qian Liu. In addition to his rich genealogy, Tsien comes from an intellectually accomplishment family. His father was a graduate from Massachusetts institute of technology (MIT). Additionally, the brothers of his mothers were engineering professors of Massachusetts institute of technology (MIT). The cousin of his father, Tsien Hsue-Shen is a highly regarded rocket scientist. Additionally, his brother is a scientist at the New York University. Tsien early years were lived in Livingston (NJ). As a child, Tsien mainly stayed indoors due to his asthma condition. This provided the Livingston high school student at the time, to focus his energies towards chemistry experiments. After pouring most of his free time towards experiments at his basement laboratory, he was able to win the Westinghouse talent search. His winning entry in the national prize completion was an investigation of how metals bind to thiocyanate (Tsien, 2014). On graduation from Livingston high school, he proceeded to Harvard University. In 1972, he emerged from the university with a bachelor of science in chemistry and physics. Having studied In Harvard University on a national merit scholarship, Tsien got a

Wednesday, September 25, 2019

Torturing terrorist by the goverment Article Example | Topics and Well Written Essays - 750 words

Torturing terrorist by the goverment - Article Example Suspects of terrorism are expected to provide the government with intelligence information on the whereabouts of their gangs, sympathizers and financiers. However, to extract this information from them always become the problem. This is because most of these suspects are under oath to protect the activities of their groups. For example, most of them opt to commit suicide rather than having to be interrogated by the authorities. Concealing this information, therefore, renders a big blow to governments counter-terrorism activities. Proposals have for this reason been forwarded encouraging governments to use more force on the suspects and this involves the application of torture to the suspects. This, however, has human rights implications besides the expected outcomes. This means that in the face of the society, the human rights organizations and the international community, torturing terrorism suspects have pros and cons. Applying torture to terrorism suspects have advantages. First, torture to terrorism suspects has not been covered in the Geneva Convention report on the treatment of prisoners of war. Further, the convention only prohibits torture in the culprits own soil. When happening in another country, torture is thus legally acceptable. Secondly, treating terrorism with diplomacy only makes the situation worse. When the dignity of the suspects is respected as proposed by humanitarian organizations the terrorists are even more encouraged to make attacks. In addition, new members have no reproach joining the terror groups. This is as opposed to a torture situation in which case even those who have the intentions of joining such groups become discouraged. This slowly weakens the group and makes it unable to conduct attacks in future. Thirdly, the fight against terrorism often requires the people to make a choice between two evils. To use torture to compel disclosure of intelligent information,

Tuesday, September 24, 2019

AB Electrolux Challenges Times in the Appliance Industry Case Study

AB Electrolux Challenges Times in the Appliance Industry - Case Study Example Thirdly, they have implemented a restructuring program of production for the past six years to relocate 60% of its manufacturing to countries of low-cost including Mexico and china (Hill & Jones, 2012). Their goal was to reduce it overall consumption of energy by 15% of its 2008 levels by 2012 to achieve efficient consumption of energy in its manufacturing. The company has also launched a green product range in all its business sectors to heighten its awareness of its energy efficient and products that are considerable to the environment. The other strategy was a move to outsource its production from developed countries in a bid to come up with high quality products. However, the company needs to be mindful of the cost of labor in such countries which is fast rising (Hill & Jones, 2012). The company has also embraced advanced technology to meet the changing demand and tastes of appliances by consumers, For instance the development of vacuums that transmit lower noises. All these strategies have been influential fro the company in its business setting and is slowly gaining its competitive advantage in the

Monday, September 23, 2019

Interpretation of The Rich Brother by Tobias Wolff Essay

Interpretation of The Rich Brother by Tobias Wolff - Essay Example Much as he behaves in the story, I conjured up the image of a selfish, mean, and rude guy with a lot of money for Pete. The facts of the story that led me to draw this image of Pete in my mind were his distaste for Donald’s act of giving away his $100 that he expressed by throwing Donald out of the car and not even realizing how bad he has behaved. Instead, Pete says to Donald, â€Å"you’d better go† (Wolff 12), thus deceiving himself that he does not need Donald. Pete has the audacity to nod to the music in his car after throwing his brother out of it. While the overall impression of Donald was that of a good guy without money, I missed out some of the most important underlying messages in the story like the real meaning of being rich unless I had discussion about this story with my friends. After discussing the story’s interpretation with my friends and listening to theirs, I reached the conclusion that the story contains some very important messages tha t make it more meaningful and sophisticated than I had presumed. My friends came up with their own opinions and conclusions they had drawn from the story, all of which sparked a number of questions in my mind; who of the two brothers is really rich; the one with more money or the one with the better character? Does Donald really need Pete to make a living or is Pete really in need of somebody with a high character like Donald? Is money so powerful that it deprives man of all sensitivity, sensibility, and humanity? Does money do that to everybody or there was something very wrong about Pete that it did that to him? These and many more questions were discussed with the peers. Comparison of the two interpretations has led me to the conclusion that when we read something and interpret it by ourselves without consulting anybody, we are likely to adopt a biased approach toward interpreting it so as to draw the meaning that we want out of it. We approach the reading in a certain way and th ings seem to make sense that way. While we definitely have a viewpoint, we tend to overlook, if not completely ignore, various other meanings that can be derived from the same reading. The state of mind in which we read a story plays a decisive role in what conclusions we draw from it. In order to get the most out of a reading, it is advisable to discuss the story with peers so as to get their opinion. While the best results can be achieved if all peers have personally read the story at least once, the reader should at least summarize the story to the peers so as to ensure that everybody gets to know about it even if he/she has not personally read it. When I discussed the story and my interpretation of it with my peers, not only that practice exposed me to a variety of themes, ideas, moral lessons, and conclusions hidden in the opinions of my peers, but I also noticed a widening of the horizon of my own thoughts. The practice opened my mind and I also came up with new conclusions th at I might not have been able to do alone. The strengths of personal interpretation include surfacing of a well-defined opinion of the reader that might be unique, sharpening of mind as one ponders over the facts of the story alone without anybody’s guidance or help, and maximization of learning as no other activity is as strong as building memory and interpretation skills as personal interpre

Sunday, September 22, 2019

Production Management Principles Assignment Example | Topics and Well Written Essays - 2500 words - 1

Production Management Principles - Assignment Example One of the early contributors towards the evolvement of scientific production management principles was F.W. Taylor. He put forward ideas and developed a theory of organization by which managers could optimize their production and increase efficiency. Till that point of time, there was no scientific back up for the workers engaged in production activity and the methods and tools that were used were outdated. In 1881, Taylor brought out a study on the science of metal cutting. (The Principles of Scientific Management 1910, 2005) Later on, different shovels were tested and the optimum shape of the shovel was designed which would allow the worker shovel without any hindrance for the entire day. This improved efficiency as the number of people required to do a certain kind of work like shovelling reduced considerably. Other areas of research included the moving of pig iron. If workers were usually moving 12.5 tonnes of pig iron per day, he conducted experiments which later on proved that given sufficient rest timings in between lifts, a certain percentage of people could transport 47.5 tonnes per day. This generated the idea that workers should be selected as to how they were suited for a particular job. 1. Each and every process was backed up with a scientific explanation. This provided for a comprehensive method of optimizing work efficiency rather than go by an outdated thumb rule. This is because each process has definite character constraints affected by geographical locations and work culture. 2. There should be a scientific method of selecting an individual to do a certain kind of work. After the right person has been selected proper training and guidance should be provided to make his transition into the job easier. There should always be development programmes to enhance his skills while on the job. 3. There should be a list of procedures laid down by the company commonly called QAP (Quality Assurance Procedures). These define the methods and the checklists to be followed while carrying out a certain procedure. The company should ensure that there is complete co-operation between the management and the employees when carrying out processes as per the QAP.

Saturday, September 21, 2019

Modern Version of Romeo and Juliet Movie with Leonard Di Caprio Essay Example for Free

Modern Version of Romeo and Juliet Movie with Leonard Di Caprio Essay Old stories get forgotten unless they are rejuvenated for the young. In the media world of today, books are forgotten and so is classical love. Romeo and Juliet with Leonardo de caprio was a fabulous attempt at bringing literature and drama back to life and into the hearts of the youth today. The first aspect of modernization is to portray the families as rich business tycoons of today’s world: Montagues and Capulets. The styling of the men especially, the chic haircuts and clothes are not only modern but in fact futuristic. This is most apparent in the guns, the shining metal and flash of silver cannot be forgotten. The fights between the two gangs take place at common place venues of today, that is gas stations. The cars are also futuristic. The letter that Romeo does not respond to is a by a well known courier service. â€Å"There are times when the rapid cuts and raging soundtrack might cause understandable confusion between the movie and a rock video. Indeed, with all the camera tricks, special effects (such as a roiling storm), and riotous splashes of color, its easy to lose the story in the style† (Berardinelli, 1996). The flush-cut editing and fast-moving scenes and actions contribute further to giving the movie a futuristic feel removing it far from the classic ballad it is. Much of the decor, for example, the aquarium wall, through which Romeo and Juliet first eye each other, is very modern in its architecture and idea. Such interiors never existed in the days of Shakespeare and neither is there any mention in the script. What makes the movie striking is the juxtaposition of old English style, rendered flawlessly and emotionally by the actors, with this modern, futuristic treatment, This juxtaposition is what makes Shakespeare’s work speak to the modern teenager, which was the main objectivce of the movie. References Berardinelli, J. Fil Review, Retrieved on 2nd June 2010 from http://www. reelviews. net/movies/r/romeo_juliet. html

Friday, September 20, 2019

Architecture Properties for Controlling Air for Hygiene

Architecture Properties for Controlling Air for Hygiene Properties of Air Earths atmosphere is composed of air. Air is a mixture of gases of 78% nitrogen and 21% oxygen with traces of water vapor, carbon dioxide, argon, and various other components. Air is a uniform gas with properties that are averaged from all the individual components. Air at sea level static conditions for a standard day depends on the pressure and temperature of the location on the earth and season of the year. Gas is composed of a large number of molecules which are in constant and random motion. Air pressure and temperature changes from day to day, hour to hour, and sometimes even minute to minute during severe weather. Standard value of air shown in the diagram are just average values used by engineer in assist to design and calculate machines. Gravity is the key important factor because it holds the atmosphere to the surface. As altitude changes, the state-of-the gas factors will change, which is why the typical values given are at static conditions sea level. As altitude increases, air density, pressure, and temperature decrease. Wind Direction and Speed Understanding Wind. Wind can be defined as a simple of air movement across the earths surface and can be in any direction. which is cause by the differences in air density, thus causing in horizontal differences in air pressure greatly than it causes the vertical pressure. These pressure systems are essentially the cause and result of spatial differences in atmospheric pressure/circulation. There are general characteristics to describe wind, wind Speed and wind Direction, which create different types of wind. Examples of wind include breeze, which is a long duration of low speed wind; gusts, a short burst of high speed wind; strong immediate winds like squalls; and lastly strong intense winds like hurricane or typhoon. Wind speed is the velocity obtained by a mass of air travelling horizontally through the atmosphere. The common measurements for wind speed are kilometres per hour(kmph), miles per hour (mph), knots and meters per second by using a anemometer. The direction of wind is measured by an instrument called a wind vane. There are two main that effect wind direction and speed Pressure-gradient force Coriolis force and friction. *and lastly friction. These factors work coherently to change the wind in different directions and at different speeds. Pressure-Gradient Force Pressure gradient force is the primary force influencing the formation of wind. Wind always blows from high pressure area to low pressure area on a horizontal gradient. Vertically, wind flow from low pressure area to high pressure area. This pressure gradient force that causes the air in motion and causing the air to move in motion with increasing speed down the gradient. Uneven heating on the earths surfaces causes the continual generation of these pressure differences. The greater the pressure difference over a certain horizontal distance, the greater the force and therefore, the stronger the wind. On weather map surfaces, the variations of air pressure over the earths surface is indicated by drawing isolines of pressure, called isobars. The spacing of the isobars indicates the amount of pressure change over a given distance. The closely space in the isobar show steep pressure gradient indicate strong winds, relatively, widely spaced isobars indicate a weak pressure gradient and light winds. The Coriolis force The rotation of the Earth creates another force, known as the Coriolis force which effects the direction of the wind and other object objects in motion in very predictable ways. Newtons first law of motion The law of Inertia, state that forces are balanced. Air will remain moving in a straight line unless it is altered by an unbalancing force. Instead of wind blowing directly from high pressure area to low pressure area, Coriolis force opposes the pressure gradient acceleration and changes the moving air direction. Wind is deflected to the right of the gradient in the Northern Hemisphere, while in the Southern Hemisphere wind is deflected to the left. Key note* Coriolis force only effect the wind direction and not the wind speed. There is no deflection of winds on the equator of the earth, but maximum deflection at the poles Friction layer Wind Friction is the last force that influenced both speed and direction winds. Friction is only operative only close to the Earths at about 2,000 feet above earths surface. Friction greatly reduces speed of surface air and reduces the Coriolis force. As a result, the reduced Coriolis force alter the pressure Gradient force, to move the air at right angles across the isobars toward the area of lower pressure. Surface winds on a weather map does not blow parallel to the isobars in geostropic and gradient wind, instead surface wind cross the isobars vary at an angle from 10 to 45 degrees. Over the ocean where frictional drag is less, and reduced the angle to as little as 10 degrees. Hospital and Air General Principles of infection control Isolation precaution is an important strategy in the practice of infection control. The spread of some infections can be impeded if infected patients are segregated from those who are not infected yet. Although there is no single study showing the effectiveness of isolation. The concept of isolation can be traced back to biblical times when lepers were segregated from the rest of the populace. Towards the end of 19th century, there were recommendations for patients with infectious desease to be placed in separate facilities, which ultimately became known as infectious diseases hospitals. However, in the early 1950s, many of these infectious disease hospitals closed and the patients were moved to general hospitals. The need for proper isolations of infections in the context of general hospitals thus become an important issue. Spatial separation is critically important when using isolation precautions because many infectious airborne contaminations are spread mainly through direct contact when patients are near to one another. Special ventilation controls are required for diseases that can be transmitted over long distances by droplet nuclei (x). However, most diseases are not of this category. Proper isolation is critically important for infectious diseases that can be transmitted through long distance which can result in large clusters of infection in a short period. Infection Control and Isolation Practices Three level of controls must be considered when using isolation precautions. When setting up levels of control for isolation system in hospital, attentive attention must be given for the system to work effectively. Failure in doing so will result all three levels not working and supporting each other. First level of control Administrative control is the first level of control measure that needs to be taken to ensure that the entire system proceed effectively. Implementing proper procedures for triage of patients Detecting infections early Separating infectious patients from others Transporting the patients Educating the patients and staff Designating responsibilities clearly and correctly Communicating with all relevant partners Second level of control environmental and engineering controls is the second level so isolation. Cleaning of the environment Spatial separation Ventilation of spaces Third level of control The third level of control is to further decrease the risk of transmission of infectious disease Personal protection Provide personal protective equipment Sanitor provided in hospital Uses of Air Pressure Differences in Hospital In a hospital setting, certain populations are more vulnerable to airborne infections including immune-compromised patients, new-borns and elderly people. This also include hospital staff and visitors can also be exposed to airborne infections as well. Negative Room Pressure to Prevent Cross Contamination A negative pressure room in a hospital is used to contain airborne contaminants within the room. In the hospital is surrounded by harmful airborne pathogens include bacteria, viruses, fungi, yeasts, moulds, pollens, gases, volatile organic compounds, small particles and chemicals are part of a larger list of airborne pathogens. Negative pressure is created by balancing the rooms ventilation system so that more air is exhaust out from the room than it is supply. A negative pressurize room is architecturally design so that air flows from the corridor, or any adjacent area into the negative pressure room. This is to ensure and prevent airborne contaminants from drifting to other areas of the hospitals and contaminating patients, staff and sterile equipment. Rooms to be Pressurize Negatively According to the 2014 FGI Guidelines and Standard 170-2013, there are a list of rooms in healthcare architecture that needs to be negatively pressurized. ER waiting rooms Radiology waiting rooms Triage Restrooms Airborne infection isolation rooms Darkrooms Cytology, glass washing, histology, microbiology, pathology, sterilizing laboratories and nuclear medicine Soiled workrooms Soiled or decontamination room for central medical and surgical supply Soiled linen and trash chute rooms Holding rooms Autopsy rooms Janitors closets Architecture Design for Negative Pressure Room In a well-designed negative pressure room, there should only be one source of air input to the room. Air is pulled through a gap under the door, other than the small opening, the room should be air tight as possible to prevent air from entering. Room must be regularly maintained to prevent any crack or opening in the room. There are certain criteria and guidelines that a negative pressure room should fulfilled A negative pressure differential of †° 2.5 Pa Isolation room with †°12 air changes per hour (ACH) for new building, †°6 ACH in existing old buildings An airflow differential >123-cfm (56 l/s) exhaust Airflows from clean to dirty Sealing of room, allowing approximately 0.5 square feet (0.046 m2) leakage An exhaust to the outside With recent approval from World Health Organization guidelines, natural ventilation can be used for airborne precaution rooms. Positive Pressure in Healthcare Design Healthcare centre are surrounded by pollutions, germs and airborne infection, and these can severely be hazardous to patients, healthcare employees and visitors when exposed. Visitors in healthcare centre are usually patients suffering from allergies, asthma, cardiopulmonary diseases, hyper sensitive to chemicals or having a weaker immune system and are seriously threatened by airborne micro-biological contamination could worsen their condition. Room adjacent to a negative pressure room are positive pressure. Positive pressure in rooms is to ensure that airborne pathogens do not contaminate the patient or supplies in that room. Operation room are example use of positive pressure, which is use to protect the occupant and sterile medical and surgical supplies. The design intention of a positive pressure room is to optimize the condition for clean, invasive procedure, thus reducing infectious risks to patient. These rooms are often considered the cleanest room in a healthcare facilities. Examples of positive pressure procedure rooms Cardiac catheterization or interventional radiology in a radiology suite Trauma or emergency surgical procedure rooms Other invasive procedures such as the insertion of pacemakers or electrophysiology procedures carried out in other locations of inpatient and outpatient facilities Criteria for a positively pressurise operating room †°15 air changes per hour (ACH) airflow out of the room Examples of Drawing Layout for Negative Isolation Room Reference: http://www.mintie.com/assets/img/resources/ASHRAE_Article-on-VentilationChanges.pdf http://www.tsi.com/uploadedFiles/_Site_Root/Products/Literature/Brochures/Room-Pressure-Solutions-for-Healthcare-Facilities_2980067_US.pdf Positive Pressure vs Negative Pressure When total cubic feet per minute from supply air is more than return air, the room is under positive pressure and the air will flow out of the room. (Supply air > Return air) When return air is more than supply air, the room is under negative pressure and the air will flow into the room. (Return air > Supply Air) CHAPTER 3 ARCHITECTURE PROPERTIES OF CONTROLLING AIR Architecture Natural Ventilation of Health Care Facilities Ventilation Contemporary healthcare centre relies heavily on mechanical ventilation to keep indoor spaces ventilated and pressurise. The uses of mechanical ventilation require high amount energy and often do not work as expected. Equipment failure, poor maintenance, utility service and other management failure may interrupt a normal mechanical operation in healthcare centre. Instead of being an important system for controlling disease and infection, failure in mechanical ventilation systems may result in uncontrollable spread of disease through health-care facilities which could cause huge problem, outbreak of diseases. To ensure performance of mechanical system is not compromised, high cost of money is needed for installation and maintenance cost for the operation. Backing up all mechanical ventilation equipment is expensive and unsustainable is required for continuous operation if the system services a critical facility. Conditional recommendation when designing naturally ventilated healthcare facilities, overall airflow should bring the air from the agent sources to areas where there is sufficient dilution. Ventilation Ventilation the common term use in contemporary architecture, and is an important factor in building design. Ventilation provide healthy air for breathing by moving outdoor air into a building or a room, and channels the air within the building or each respective room. There are three basic elements in building ventilation to be considered: Ventilation Rate ventilation flow rate can be referred to as the absolute amount of inflow air per unit time and the air-change rate as the relative amount of inflow air per unit time. (Annex X.) Airflow Direction the overall airflow direction into a building. Air distribution or airflow pattern each part of the space should be distributed by the external air in an efficient manner. Air flown pattern effects the way airborne pollutants is removed in an efficient manner because pollutants is generated in each part of the space. Natural Ventilation One of the fundamental aspects of architecture is to provide comfort to the inhabitant. This is done by wall insulating, heating, protecting from the sun and managing fresh air intake. Natural ventilation enhances air quality by dissolution of pollutants and refreshing thermal comfort in building. Ventilation based on natural forces should always be preferred to mechanical ventilation especially in European climates, as it can efficiently complete comfort and energy objectives without mechanical energy consumption. Driving Forces of Natural Ventilation From our understanding from chapter 2 (Architecture and Air) that wind is a natural phenomenon causes by pressure-gradient force and coriolis forces therefore is the most influential factor for natural ventilation. Wind creates air flow insides building by creating high and low pressure on different building facades. These movement is strongly dependent on wind pressure gradients. Wind flow and wind pressure distribution. The second natural forces affecting natural ventilation Differential of indoor and outdoor air density causing thermal buoyancy force, stack pressure. Natural ventilation drives outdoor natural air into building envelope openings and other architectural purpose-built openings include windows, doors, solar chimneys, wind towers and trickle ventilators. Wind pressure and stack pressure are two of the natural forces that drives natural ventilation and is important Wind Pressure When wind flows around a building, it can produce a very high suction pressures. Pressure is induced on the building when wind strikes a building. Positive pressure on the windward face which is the direction of upwind from the building; negative pressure on the leeward face, pulling rather than pushing on the building. This drives the air to flow through windward openings into the building to the low-pressure openings at the leeward face. Windward pressure differs along the height of the building, while the leeward pressure is constant. These pressures occur mainly on the leading edges of the roof, and the cladding on these areas has to be firmly fixed to the structure and the roof has to be firmly held down. The wind pressure generated on a building surface is expressed as the pressure difference between the total pressure on the point and the atmospheric static pressure. Wind pressure data can usually be obtained in wind tunnels by using scale models of buildings. If the shape of building, its surrounding condition and wind direction are the same, the wind pressure is proportional to the square of outdoor wind speed. Thus, the wind pressure is usually standardized by being divided by the dynamic pressure of the outdoor wind speed. The standardized wind pressure is called the wind pressure coefficient and symbolized as (Cp). The outdoor wind speed is usually measured at the height of the eave of the building in the wind tunnel. Calculation for wind pressure acting on the building surfaces can be found in Annex X. Natural Architectural Ventilation System Windows and Openings Cross flow Trickle Ventilators Wind Screen Stack Pressure Stack pressure or thermal buoyancy force is generated from the air temperature or humidity difference (sometimes defined as density difference) between indoor and outdoor air. This difference generates an imbalance in pressure gradients of the interior and exterior air columns, causing a vertical pressure difference. Air buoyancy allows movement of air into and out of buildings, chimneys, flue gas stacks or other containers. The effectiveness of stack ventilation is influenced by the effective area of openings, the height of the stack, the temperature difference between the bottom and the top of the stack and pressure differences outside the building. There are two effective uses of stack ventilation which occurs in a room and stack effect in a high-rise building. Examples two different uses are given as below. When the room air is warmer than the outside air, the room air is less dense and rises. Air enters the building through lower openings and escapes from upper openings; on the other hand, when the air is colder than the outside air, the room air is denser than the outside air, the direction of air flow is reverse to an insignificant degree. Air is then entering the building through the upper openings and escapes through the lower openings. Stack driven flows in a building are driven by indoor and outdoor temperatures. The ventilation rate through stack is the result of pressure differential between two openings of the stack. When air heat up, it becomes less dense thus more buoyant, causing air to rise up. Understanding the properties of air in chapter 2, we are able to use this effect to naturally ventilate buildings. Cooler air from outside of the building is drawn into the building at the lower level and is heat up by user, equipment, heating or solar heat gain within the building. Hot air that rises up in the building is vent out at a high level. The tendency of warm air to rise results in pressure differences at various levels of the building. Pressure on the lower levels and basements of a building falls below the atmospheric pressure. On the upper levels of the building, pressure of air will be higher than atmospheric pressure. In between the point of high pressure and low pressure zones lies the neutral pressure plane where the pressure will be neutral. Internal air pressure above the neutral plane will be positive pressure, forcing air to be drawn out the building; wheres, below the neutral plan e, the internal air pressure will be negative and drawing air into the building. The neutral pressure plane is often located at the vertical mid-point of the building. A building with similar leakage rates at all levels will have neutral plane at the mid-point. However, when the basement is leaky and sealed top floor of the building, the building will have a lower neutral pressure plane. Similarly, when the building has a leakier top floor and sealed basement the neutral pressure plane will be higher than the mid-point. Natural Architectural Ventilation System Solar Chimney and Atrium Trombe Wall Bernoulis Principle Identical to stack ventilation using air pressure for passive ventilation, except the difference between bernoulis principle and stack ventilation is where the pressure difference comes from. Unlike stack ventilation which utilizes temperature difference to move air, bernoulis principle uses wind speed difference to move air. In general principle of fluid dynamics, faster moving air has lower pressure. This lower pressure can help suck fresh air through the building. From an architectural point of view, outdoor air further from the ground is less obstructed, causing it to move faster than air at lower altitude, thus resulting in lower pressure. Site surrounding is an important factor to be accounted for, with less obstruction for wind to travel. Natural Architectural Ventilation System Example use of Bernoulis principle are wind cowls and wind tower which utilizes the faster winds above roof tops for passive ventilation. Wind Cowl Fast roof top wind is scooped into the building through the intake valve and at the larger outlet valve creates lower pressure which naturally suck the air out. Stack effect will also help to pull air out through the same exhaust vent. Architectural Design taking Advantage of Stack Ventilation and Bernoulis Principle Designing for stack ventilation and Bernoullis principle are similar, and a structure built for one will generally have both phenomena at work. In both strategies, cool air is sucked in through low inlet openings and hotter exhaust air escapes through high outlet openings. The ventilation rate is proportional to the area of the openings. Placing openings at the bottom and top of an open space will encourage natural ventilation through stack effect. The warm air will exhaust through the top openings, resulting in cooler air being pulled into the building from the outside through the openings at the bottom. Openings at the top and bottom should be roughly the same size to encourage even air flow through the vertical space. To design for these effects, the most important consideration is to have a large difference in height between air inlets and outlets. The bigger the difference, the better. Towers and chimneys can be useful to carry air up and out, or skylights or clerestories in more modest buildings. For these strategies to work, air must be able to flow between levels. Multi-story buildings should have vertical atria or shafts connecting the airflows of different floors.

Thursday, September 19, 2019

Race-Based Traffic Stops in the US Essay -- racial profiling, police st

Imagine driving home, on a pleasant evening, after a tedious day at work. Just as you are about to arrive to your neighborhood, you notice blue and red flashing lights and pull over. It seems the police officer has no reason for stopping you, except to search your vehicle because of your suspiciously perceived skin tone. This unnecessary traffic stop, designed for people of colored skin, happens on numerous occasions and has been termed Driving While Black or Brown. Racial profiling is the act of using race or ethnicity as grounds for suspecting someone of having committed a crime. Race-based traffic stops are dangerous for people of color, since they can happen anytime; various African Americans and Latinos modify their driving habits in uncommon ways. For example, some completely avoid predominately white suburbs, in fear of police involvements for looking out of place. Some intentionally drive ordinary vehicles or change his or her dressing style, and others who drive long distances even factor in extra time for the inescapable traffic stops (Harris). â€Å"From 2005 to mid-2008, approximately eighty percent of total stops made were of Blacks and Latinos, who comprise twenty-five percent and twenty-eight percent of New York City’s total population, respectively. During this same time period, only about ten percent of stops were of Whites, who comprise forty-four percent of the city’s population† (â€Å"Restoring a National Consensus†). Ray Kelly, appointed Police Commissioner by Mayor Michael Bloomberg, of New York in 2013, has not only accepted stop-and-frisk, a program that allows law enforcers to stop individuals and search them, but has multiplied its use. Kelly argued that New Yorkers of color, who have been unevenly targeted un... ...inspired action at the state and local level. The ACLU calls on legislators in every state to pass laws that will allow the practice of traffic enforcement to be statistically monitored continuously. Fourth, the Justice Department should ban racial profiling in all federally funded drug interdiction programs. Fifth, the fifty largest cities in the United States should voluntarily collect traffic stop data (â€Å"Restoring a National Consensus†). Earl G. Graves said, â€Å"Fifty years after Dr. Martin Luther King expressed his dream that African Americans would someday be judged not by the color of our skin but by the content of our character, the line between the suspect is a black male and black males are suspect remains dangerously thin.† Our nation needs to follow the five-step plan outlined by ACLU to allow our members of society safety and equal rights for one another.

Wednesday, September 18, 2019

Framing Apologies in a Political and Diplomatic Context Essay -- criti

Introduction This essay is an analysis of the 2005 paper, by Janna Thompson, â€Å"Apology, justice and respect: a critical defence of political apology.† A paper presented at the Australian Association for Professional and Applied Ethics 12th Annual Conference, Adelaide, September 28–30. This paper can be found at http://www.unisa.edu.au/hawkeinstitute/gig/aapae05/documents/thompson.pdf. Summary This paper critically evaluates the importance of negotiations and expansive discourse in framing apologies, especially in a political and diplomatic context. Focusing on two relevant Sino-American issues, viz. the 1999 bombing at the Belgrade Chinese embassy by US aircraft and the 2001 airplane collision between a Chinese fighter jet and an American spy plane, the author evaluates pragmatism in diplomatic apologies, with specific reference to the US apology to China during these two events. Methodology and Objectives This study was based on off-the-record interviews that were conducted in late 2001 with four anonymous US State Department officials who were involved in public negotiations of the US apologies. The author writes that his aim in carrying out these interviews was threefold. Firstly, he wished to clarify the intricacies of international diplomatic apologies. Secondly, he intended to â€Å"probe† the opinions of official diplomats on such apologies. Finally, he aimed that this study would contribute to a greater understanding of the characteristics of diplomatic apologies and the pragmatics involved therewith. Observations Through this study, the author puts forth the fact that most political apologies are framed in such a way that both the nations’ real political goals are achieved. For carrying out an act ... ...graphs 51, no. 3: 227-242, accessed August 10, 2011, http://www.sagepub.com/upm-data/13165_Chapter1.pdf. Gopen, George, and Judith Swan. â€Å"The Science of Scientific Writing.† American Scientist, November, 1990. Accessed August 10, 2011. https://www.americanscientist.org/issues/issue.aspx?id=877&y=0&no=&content=true&page=4&css=print. Strongman, L. 2011. ‘What on earth?’: Understanding ambiguity toleration in business communication. PRism 8(1): 1-14, accessed August 10, 2011, http://www.prismjournal.org/fileadmin/8_1/Strongman.pdf. Thompson, Janna. 2005. â€Å"Apology, justice and respect: a critical defence of political apology.† Paper presented at the Australian Association for Professional and Applied Ethics 12th Annual Conference, Adelaide, September 28–30. Accessed August 10, 2011. http://www.unisa.edu.au/hawkeinstitute/gig/aapae05/documents/thompson.pdf.

Tuesday, September 17, 2019

Create an Innovation

Innovation Is the process of translating an Idea or invention Into a good or service that creates value or for which customers will pay (www. Observationally. Com, 2014). † In this paper, the identification of an innovation, and plan for implementing the innovation, in the current workplace that I am working for, will be described in full detail. The innovative product that will be Introduced to the workplace Is called the â€Å"Freedom walker. How many Individuals get tired of slating down all day at a desk?Another complaint that is heard, quite often within the organizations is, â€Å"l am overweight and I do not have the time to make it to the gym. † Well, now here is the perfect solution. Freedom Walker will give Individuals the opportunity to either, remain seated at the desk while working or they can chose to get up and begin to exercise at the pace they feel most comfortable. The high-quality product will be made to last and it will give employees the freedom of exercising while working (Treadles, 2014). Freedom Walker Is going to solely be Intended to run in slow speeds.One of the great things about this product is that unlike regular treadmills. He Freedom Walker will not overheat (Treadles. 2014). For which, giving individuals an unlimited amount of time to be on the treadmill while working. The control panel can be placed on top of each employee's desk. And will have a 10-inch cord connected to the panel and the Freedom Walker. On the control panel, employees will be able to see how long they have been walking. The employee will also be able to keep track of the amount of calories that are being loss with the freedom walker.The Freedom Walker will also have an attached Emergency cord that all individuals who use this product must wear while in action. The Emergency cord Is In case of any emergency, the employee will be able to shut the machine off The Freedom Walker also comes with a strong rubber mat that should be placed on top of th e tread, to reduce the sound and avoid distraction (Treadles, 2014). The speed of this product will not go above 4. 0 MPH (Treadles, 2014). The reason that the machine will not go above the speed of 4. Is to avoid distractions on the phone with customers, such as loss of breath or Incorrect grammar spelling on the computer because of not being able to concentrate. For safety of each employee, the aching is limited to 4. 0 MPH. The Freedom Walker will not have much assembly required. The control panel is connected to the treadmill, Just simply connect the ‘OFF The design will begin with the CEO and upper management, and then will of course go down the list for each individual within the organization.It is a proven fact that the obesity rate within the United States has more than doubled in adults and children since sass's (Food Research and Action Center, 2014). The leading public health problem within the United States is obesity (Food Research and Action Center, 2014). Withou t any discrimination, the majority of the employees within the organization that this innovative idea will be implemented in, are overweight. Below is the chart from the Food Research and Action Report that shows the percentages of each ethnicity and at what percentage they are overweight.How can it be possible that a Health insurance company is selling insurance, but have the employees unhealthy and overweight? There is going to be a weekly goal that each individual will write-out for himself or herself when using the Freedom Walker. The organization will have to see some type of improvement in all employees. If, there is no improvement seen thin several weeks, then disciplinary action will be enforced. Once there is improvement noticed, that is when the organization will begin to offer incentives. The incentive that will be granted is that the company will pay for half, of each individuals health insurance premium.This could definitely guarantee success, especially now and days th at health insurance premiums are so expensive. The impact that this innovative process will have within the organization is going to be drastic. This will not only help the employees but will also help the customers as well. The innovation process, will allow employees to take stand about prolonged sitting. Researcher suggest that prolonged sitting is bad for one's health (Neoprene, 2013). There have been scientists that compare prolonged sitting to smoking (Neoprene, 2013).The Freedom Walker should help every individual begin to feel fit and begin to have a more positive attitude (Neoprene, 2013). This change in attitude and in oneself, innovation process is going to be an incremental innovation. As stated above the process will begin with the CEO and upper management. Once the change is seen in hose areas, then the process will begin to trickle down the totem pole as it has been heard. So, as the article states by the incremental innovation web page, â€Å"Slow and Steady Wins th e Race (Innovation Management Community for Practitioners, 2014). Incremental change is not about making a change happen instantly (Innovation Management Community for Practitioners, 2014). â€Å"The reason incremental innovation is so popular, is because it has reduced risk in comparison to radical innovation (Innovation Management Community for Practitioners, 2014). † Furthermore, once a equines has a manufactured good up and running it tends to have built up substantial amount of human capital and competencies so the business may as well dedicate time to creating it better or reducing costs (Innovation Management Community for Practitioners, 2014).Four Stages of the Research Cycle There will be seven steps to the innovation process and they are 1 . Thinking, 2. Portfolio Management and Metrics, 3. Research 4. Insight, 5. Innovation Development, 6. Marketing Development, 7. Selling (Morris, 2013). The way that the innovation will be measured will be â€Å"R&D Impact = Gros s Margin / R&D Spend – This is an â€Å"old† Bill Hewlett and David Packard metric they used to guarantee suitable return for the R&D effort being invested (McKinney, 2010). † â€Å"Why gross margin, one would ask? McKinney, 2010)† â€Å"The assumption is that if you assemble a better mouse trap, the customer will reward you with a margin premium which will show up in gross margin (McKinney, 2010). † â€Å"Target: Assess your competitors and you want to be in top quartile (McKinney, 2010). † Innovation takes time and dedication. In order for a company to be successful in the implementation of an innovation there needs to be, a lot of research and date corded. An innovative idea cannot Just be something that someone brings up and it happens.There has to be comparisons to other products and reports showing the business/organization why that innovative idea would be better than any other idea. The Freedom Walker would be a great innovative idea because it would help save the lives of many people who may be struggle with health issues due to weight problems. I believe that not only should the company that I am currently working for, use the innovative idea, but that all companies that have customer service representatives. Customer Services Representatives are mandated to sit at their desk for 8-10 hours a day without being allowed to move from the chair.Production and quality is something that is counted against the individuals who do move from his/ her chair, which then causes disciplinary action. This is an act that is inhumane and I believe that something should be done about it. So, everyone that has a business with CARS and Data Reps. Let try Freedom Walker and lets see how great of an impact it will have on not only the company but on the employees as well. References childhood and adult obesity in the United States. Journal of the American Medical Association, 8(31 1), 806-814. Food Research and Action Center. 2014) . Overweight and Obesity in the U. S.. Retrieved from afar. Org/initiatives/hunger-and-obesity/ obesity-in-the-us/ Innovation Management Community for Practitioners. (2014). Incremental Innovation. Retrieved from http://www. Unconventionality's. Com/ incremental-innovation/incremental-innovation-vs.-radical-innovation McKinney, P. (2010). Can you measure the impact for innovation. Retrieved from philharmonic. Com. Archives/2010/02/can-you-measure-the-impact-from- innovation. HTML Morris, L. (2013). How to Innovate: The Innovation Process.Retrieved from http://www. Environmentalists. SE. /2013/08/08/how-t()-innovate-the- innovation-process Neoprene, L. (2013). Stand Up for Better Health? Maybe Not. Better-health-maybe-not/ Reynolds, G. (2011). Rethinking the Exercise â€Å"Talk Test†. Retrieved from well. Blobs. Anytime. Com/2011109/21 [rethinking-the-exercise-talk-test/? _pH=true=blogs=o Treadles. (2014). Retrieved from http:// www. Treadles. Com/products/ www. Objectificatio ns. Com. (2014). Innovation. Retrieved from http://www. Objectifications. Com/definition/innovation. HTML

Monday, September 16, 2019

Multicultural Analysis of Bud, not Buddy

I feel that the book, Bud not Buddy is successful overall when evaluating or analyzing it against different criteria for successful multicultural books and materials. Bud, not Buddy is set in the 1930’s at the height of the Great Depression and with this book, the author Christopher Paul Curtis, skillfully weaves in Bud’s experiences with poverty, racism, and the experience of being an African-American foster child during the Great Depression.The author, Christopher Paul Curtis, writes from the perspective of a cultural insider’s mind-set and point of view when writing this book and giving the reader an accurate, yet interesting portrayal of what can happen to any child in similar circumstances during the Depression. In this novel, the storyline focuses on a ten-year-old African-American boy named â€Å"Bud. † Although there are no illustrations in this book, the text of the book does occasionally give the reader glimpses into the fact that Bud is an Afric an-American boy. However, the reader for the most part deducts the culture of Bud through the use of indirect things in the story.Some of those indirect things include the focus on the jazz band musicians conversations, the â€Å"stranger† who picks Bud up and lectures him for being alone and Black in that area at night, Bud passing by a group of people before arriving at the cardboard jungle and referring to them as â€Å"the white people with the coughing baby† (Curtis, 1999). There were no over-generalizations or simplifications of the African-American culture used in this book. The author did not use any language I felt was condenscending to the culture represented.If I had not seen the cover of the book, there were only a few sentences and subtle indications sprinkled throughout the book that indicates the young Bud was an African-American child. I feel part of the reason the book and the characters were successful without being stereotypical is, as the author ind icates in the Afterword of the book, some of the characters were loosely based on real individuals in the author’s life. Real individuals are not stereotypes so I think the reader can see this. The character Bud, was presented multi-dimensionally, so much so that his personality overshadowed his cultural group.I think this in itself is one measure of a successful multi-cultural children’s fiction book with characters of any cultural background. There were no images presented by the author that could lead to stereotyping the character and nothing to indicate the writer was attempting to meet the expectations of an audience who had pre-conceived notions of this culture. The cultural details that were within the story were naturally integrated. For example, when referring to the jazz band, the author doesn’t throw it in the reader’s face what the members look like.His words convey enough that one understands the culture of each member without any stereotypic al features being used to identify them. In asking myself does the book present cultural details authentically, I would say yes. I could see authentic culture being represented in most of the language in the story, in discussion of the instruments and the players in the jazz band, in the details of the individuals who ended up being Bud’s caretakers, and even in the food in The Sweat Pea Restaurant included cultural details that added a 3-dimensional-like feel to the novel.I did not see any invalid information for the culture addressed in the book or invalid information in general. I have to take in consideration the time period this book is supposedly taking place in as far as determining whether the language is used authentically. I have to admit, possibly because I am in the 21st century, I oftentimes got the picture of a rural white farm boy in that Bud constantly and consistently uses the words â€Å"shucks† and â€Å"doggone† and similar vocabulary to this .I realize some of the language is limited since Bud, not Buddy is a children’s book but I wasn’t always impressed with some of the vocabulary that was used and was not used. In my opinion, this would probably be one of the weaker areas in my analysis of the book. Good multicultural books should allow the reader(s) to experience the culture that the book is addressing. I did feel that while reading the book and in the use of some of the cultural details, I was experiencing the culture.I also felt the cultural elements oftentimes gave the book more color in that it lifted some of the text off the page in a sense. Along with this, just my personal feelings of course, I sometimes felt the author in avoiding being stereotypical in any sense, tiptoed around some areas that could have enriched the story. However, I do respect how fine the line can be between doing a multicultural story justice and avoiding some words and areas while presenting a quality multicultural story. When I think about it, even in the resolution of the problem in this story, it is a positive representation of the culture.The family and friends of the child take the child in, provide Bud a safe environment and the affection he wasn’t receiving before re-uniting with the family and friends within his own culture. That is a quality I didn’t even see initially until I put further thought into this multicultural analysis. This only strengthens the success of Bud, not Buddy’s portrayal of multicultural issues. I could strongly state that the book, Bud, not Buddy would enhance any elementary classroom library, learning resource center, or media center room.I feel the book would be a positive addition to any library collection while encouraging students to read literature that portrays diverse, yet balanced views of all cultures. The book, Bud, not Buddy would be a welcome addition in any collection of books, making the collection a more balanced and inclusive colle ction of multi-cultural books that in turn help to make cultural diversity the foundation of learning and growing. Reference Curtis, C. P. (1999). Bud, not Buddy. New York: Delacorte Press.

Sunday, September 15, 2019

“In Flanders Fields” A symbolism analysis Essay

â€Å"In Flanders Fields† is about World War I victims in the cemetery. When we read it, we are meant to feel sympathy for the dead victims of the war who rest in that field because we see their wonderful lives before the war and how it was ended fighting for their country. We are supposed to think of them and remember the war and all other wars and live fully the life they made for us. We are supposed carry on what they did. The deceased in this poem are afraid that we won’t remember them and won’t carry on their efforts and patriotism, even though the poppies grow in the graveyard for remembrance. We have to carry on the torch for them and for ourselves. From this poem, we also feel the fear of dying because those in this poem who once lived and fought for their country are now nothing but crosses in a graveyard. This poem uses figurative language to get its very poignant message across. Mainly, it brings the dead back to life to narrate this poem. The first stanza of the poem provides visual imagery of the graveyard. The poppies blowing between the crosses are symbolic of remembrance. The larks, â€Å"still bravely singing,† are personified to express bravery, which is a human emotion. The â€Å"guns below† are the ceremonies held for these men who bravely fought. Basically we are shown the beauty of the graveyard and signs of people remembering the deceased. The second stanza introduces the leader to not only their death, but also their life. Suddenly we feel sympathy for the young people buried here, whose lives were ruined by terrible warfare. In the third stanza we are shown the anguish of their spirits. They are brought to life in this poem to send us their message. Their â€Å"failing hands† can not of course literally throw a torch, which is symbolic of the war effort and patriotism. This is simply meant to represent the legacy that they are leaving behind them. This stanza is a paradox of the first, saying that peace and remembrance does not come from mere ceremony, but from us living out their legacy. The message in this poem is for all to live and understand.

Saturday, September 14, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. These three sensors are placed in three different threshold levels and are connected to the controller.If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instruction s given by the developer.This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very sp ecific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM p latform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer.All the featu res and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a progra m, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator.Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits a nd other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arr angement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass a lso rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection') and overheating (‘thermal protection'). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well.A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. Th e 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collecto r is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strappe d to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Al though polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the inter rupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least signifi cant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051’s serial communication UART circuitry divides the machine cycle f requency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the p in RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±3 0-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem inte rface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber.The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts.Subscriber carries the Mobile Station. The Base St ation Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific termina l. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that d efine a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User ManualTemperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the m odem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic]Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrode s and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) con tacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered:SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the gr ound. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses th e polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a R egulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows a utomatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAP TER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded app lication The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source fil es are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å"); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 && L2==1 && L3==1 && L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0);Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 && L2==0 && L3==1 && L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³);TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 && L2==1 && L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUP PLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – – – – – – – — – – – – – – – – – – – – – – – – –  œ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H