Tuesday, August 25, 2020

Transformational Leadership Civil Services Agencies

Question: Portray about the Transformational Leadership for Civil Services Agencies. Answer: Presentation Wellbeing initiative is the manner in which the collaboration between the pioneers and adherents happen. Through this procedure, the pioneers practice hang on their supporters so as to achieve hierarchical wellbeing objectives. The duty area of security initiative consolidates management, preparing, responsibility, assets, and backing. The pioneer who is following this structure needs to regulate the exercises in the creation procedure and guarantee the wellbeing of the laborers. They are additionally at risk to direct preparing and giving training in regards to security quantifies in working environments. As expressed by Rajasekar, Abri and Tabouk (2013), the pioneers need to demand the way that everybody falls under the wellbeing approaches and guidelines of the association. The pioneers need to speak with the bosses and give the physical assets, types of gear, instruments, and materials to the laborers so the laborers can work in a sheltered spot. The pioneers alongside the organi zation need to make a supporting psychosocial working condition. As indicated by Cameron, Hare and Duff (2013), this will guarantee that the laborers are no performing under tension which is out of line. The report shows the pith of security initiative in the provisions of an executive or a venture director and as far as a site chief or manager. Writing survey on wellbeing administration Wellbeing administration In the perspective on Hardison et al. (2014), wellbeing administration begins from the meeting room to the primary line of director. With the adjustment in the position the activity profile changes thus does the obligations regarding the individuals who are engaged with the security administration. The duties and the perspectives on the included work force are somewhat comparative, in spite of the fact that, there are a few contrasts which rely upon the situation of the concerned individual in the association. A definitive objective is same for every one of them, which is to make a protected working spot for the representatives, however the job they are playing in the association are extraordinary. The report centers around two kinds of staff in an association where wellbeing initiative wins. These two sorts of chiefs are venture supervisor and site director. The motivation behind a venture supervisor is to make systems which will guarantee wellbeing in the work place. Then again, a site chiefs work is operational, where the administrator understands the techniques as indicated by an arrangement which is made by the task supervisor. Security administration is increasingly required in those associations which fuses ventures including hands-on field work. These sorts of associations are those which work in the development, vitality, car, utility, and assembling enterprises. An executive or venture administrator As expressed by AlKindy, Shah and Jusoh (2016), the venture director of an association has the activity of distinguishing the significance of making and keeping up a workplace which is ok for the representatives who are engaged with the undertaking. On the off chance that a venture completes on time with a harmed colleague, at that point the task won't be named effective, this is the possibility of security initiative. On the off chance that the task administrator can guarantee the workers that they will have adequate opportunity to complete the undertaking, at that point there is a little likelihood of settling on a brutal or terrible choice and the venture won't go off course. This will, thus, guarantee higher caliber of creation. Tasks with less wellbeing issues show less quality issues. It additionally shows that security issues and quality have a negative relationship. As per Shen et al. (2015), wellbeing and the nature of creation identifies with the profitability and productiv ity. This assumes an imperative job in lessening the expense of creation. As the laborers of a group realize that the task director alongside the supervisory crew are caring for their own wellbeing they will perform better. As expressed by Conchie, Moon and Duncan (2013), they will likewise attempt to be sheltered in the undertaking and keep their partners the equivalent. The undertaking director likewise needs to address the risky circumstances joined in a task. For this reason, the wellbeing needs must be kept in the cutting edge of correspondence. The hazard supervisory group appointed to the task must know about the individual expense just as the undertakings and the groups cost related with the activity. In the perspective on Dainty and Loosemore (2013), a venture chief neglecting to do, can bring about a crisis circumstance, where lives can be in danger. The venture supervisor likewise needs to guarantee that the agreements are planned so that those strengthen the significance of wellbeing in the work environment. The undertaking administrator requires accepting that security estimates holds the most significance in a task, at exactly that point the partners will have comprehend its significance. A site director or chief: In the perspective on Ulrich, Smallwood and Sweetman (2013), a site chief or a managers work in making a domain of security administration is unmistakably structured. The consequence of a venture relies upon how an administrator executes their activity. A chief must have the option to support the laborers or colleagues to impart about security. The chief additionally needs to guarantee that assorted variety is kept unblemished in the working environment where correspondence about wellbeing is occurring. As expressed by Fang and Wu (2013), the chief additionally needs to guarantee the correspondence occurs in a two manner process. The administrator needs to utilize showing others how its done. Representatives will in general do what their pioneer typically does. Thus, the administrator has the duty of making genuine models for them. As expressed by Biggs et al. (2013), the chief demonstrating an inspirational mentality towards wellbeing improves the workplace. He needs to esteem secur ity over creation and let the representatives realize that lives are more important than the activities. As indicated by Gillen et al. (2014) aside from these, sharing significant data which is legitimately or in a roundabout way identified with security in working environment, offering an incentive to wellbeing measures over the creation, empowering a positive chain of correspondence between the bleeding edge and the senior administration of the association, and rectifying poor proportions of wellbeing are a managers obligation in wellbeing authority. It is both of the directors obligation to dole out each Examination of the sorts of the board Similitudes between the two degrees of the executives As expressed by Blatstein (2012), both the site supervisor and the undertaking director have a similar objective ahead. The similitudes they have are in the details of their definitive purposes. They will likely diminish the dangers of working in an industry where the undertakings are principally active fields type. The two of them face the obligation of making a workplace where security and insurances best the need list. In the perspective on Rojas (2013), their responsibility is to make sure about the workplace so that it rouses the representatives to deliver what they should. Along these lines the item will likewise be of high caliber. Both of these two kinds of anagers need to work with their subordinates. Them two are liable for the disappointments and accomplishment inside the association. While the venture chief sets the goals and focuses for a group, the administrator with the assistance of the accessible assets inside the organization completes those undertakings. If there s hould arise an occurrence of security administration, the task administrator sets the gauge which is utilized by the boss so as to survey the workers results. A few associations take both of their obligations and add those up together to get a higher esteemed security authority in the organization. This builds the productivity in the creation group. The enrollments accomplished for the group turns out to be substantially more precise along these lines. Consequently in exceptional cases the blend of two administration types can be suggested. A further exploration will show how this will function. It will likewise diminish the likelihood of miscommunication in the organization. The synchronization between these two administrations is accordingly required for making a blunder free creation process with similar goals. Contrasts between the two degrees of the board As expressed by Bralee et al. (2015), a boss is the individual who directs the laborers and their exhibition in a venture. The chief is straightforwardly connected with the wellbeing initiative style. Then again, the task director is basically connected with making techniques and deals with the assets of the association to accomplish the objectives. The administration work done by a site supervisor is named as lower level administration, though, the chief works in center level administration. As expressed by Li et al. (2015), the chief reports to the venture supervisor so as to get acclimated with the security quantifies and in regards to methodologies. The task chief reports to the senior administration or the top managerial staff to expound the plans and techniques. The boss is liable for caring for the presentation of each specialist in the group. The task trough cares for the presentation of the entire division. He makes methodologies in like manner, which is later trailed by the director. The director in wellbeing authority doesn't have the option to recruit terminate and advance a specialist, despite the fact that he has the option to suggest individuals for a vocation. Then again, the venture supervisor has the authority of employing, terminating, and advancing individuals as this individual arrangements with all the assets day by day. As expressed by Floros (2015), the activity of a chief is to follow a more thoughtful person approach as he is answerable for the security of his colleagues as it were. Then again, the undertaking director follows an encompassing methodology as he is answerable for the wellbeing of the entire associations representatives. The administrator cares for his people groups security in the working spot while the venture chief takes care of the associations men, cash, apparatus, material and techniques. End and Recommendation End In

Saturday, August 22, 2020

Health, Safety Environmental Management. The WritePass Journal

Wellbeing, Safety Environmental Management. 1.0 INTRODUCTION: Wellbeing, Safety Environmental Management. 1.0 INTRODUCTION:1.1 SCOPE OF THE REPORT:2.0 EMS AND ECO CAMPUS:2.1.0 TYPES OF EMS:2.1.1 ISO 14001:2.1.2 ECO-MANAGEMENT AUDIT SCHEME (EMAS):2.1.3 IEMA †Acorn Scheme:2.2.0 ECO-CAMPUS AND HOW IT RELATES TO EMS:2.2.1 THE AWARD WINNING CRITERIA:3.0 POSITIVE AND NEGATIVE ASPECTS OF THE SYSTEM:4.0 EVIDENCE OF BRONZE AND SILVER MEDALS5.0 STEPS TO ACHIEVE THE GOLD MEDAL1. Assets, Roles and Responsibilities2. Fitness and Trainingâ â 3. Communication4. Documentation/Control of documents5. Operational Control6. Crisis Preparedness and Response 6.0 CONCLUSION: 7.0 REFERENCES:Related 1.0 INTRODUCTION: We are living in a time portrayed as an ecologically cognizant age, where each deed acted by people regarding advancement, the impact is being said something connection to our condition. Subsequently this has provoked a significant number of ecological guidelines being supported to consider business associations progressively responsible for their natural obligations. These strategies will in general spotlight on handling such issues from the source, with the information on how certain unimportant choices taken by such associations can detrimentally affect nature in general. (Darnall et al 2008). One of the procedures embraced by these associations was to present an apparatus known as Environmental Management System (EMS) that can be utilized to accomplish a high level of natural insurance inside the setting of supportable turn of events. (Bansal and Bagner.2002). This instrument was first evolved by the British Standards Institute (BSI) distinguished as BS7750 distributed in 1992. By 1994 the European Commission distributed another administration apparatus known as Eco-Management and Audit Scheme (EMAS). As per Bansal and Bagner after an expanding interest for improved natural execution by the United Nations, the International Organization for Standardization (ISO) was commanded to make a globally perceived ecological administration framework called ISO 14001 which is being utilized around date. Throughout the years EMS has been viewed as a major aspect of a strategy outline work for building up an association from Schools, medical clinics to try and shops. Be that as it may, inside the years analysts are starting to scrutinize the realness of EMSs since associations guarantee to have one, when infact they make no endeavor to diminish their natural harm. â€Å"In examples where EMSs upgrades an organization’s natural execution, pundits contend that enhancements are probably going to happen inside the organization’s operational limits as opposed to being reached out all through the gracefully chain.† (Darnall et al 2008). In spite of these rising misinterpretations EMS has been compelling in lessening ecological effects inside and outside the associations particularly as fines and punishments are being upheld on rebelliousness of associations by the administrative bodies. 1.1 SCOPE OF THE REPORT: This report will concentrate on EMS and how it identifies with Eco grounds, a device set up by Glasgow Caledonian University to direct its natural effects. Moreover, it will take a gander at the positive and negative parts of embracing an EMS, and the confirmations of bronze and silver awards won by the GCU through usage of eco grounds and the means towards accomplishing a Gold decoration. 2.0 EMS AND ECO CAMPUS: As indicated by Coglianese and Nash an EMS can be portrayed as a lot of in-house arrangements, surveys, plans and working activities influencing the whole association and its associations with the common habitat. They went on further to state despite the fact that the particular institutional portrayal of EMSs vary across associations, all EMSs involve setting up an ecological approach or plan which experiences interior assessments of the organization’s natural effects including calculation of those effects and how they have changed after some time, making quantifiable objectives to diminish those natural effects, giving assets and preparing laborers, checking usage progress through efficient examining to guarantee that objectives are being reached, adjusting deviations from objective accomplishment and experiencing the board audit. Outright perpetual upgrades are done on the model, which are foreseen to assist associations with embeddings ecological practices profound inside their operational structures so ensuring the regular habitat turns into a central part of their general business technique (Shireman, 2003). Ecological administration frameworks work under the Shewart and Deming pattern of consistent improvement which can be completed by a bit by bit method. . It is tedious and dependent on the PLAN †DO †CHECK †ACT framework. As a matter of first importance, a re-assessment of the organization is done and an arrangement is set out on how the audit made can be improved. Next is to grow how to execute the arrangement and once the framework has been actualized, it is checked habitually to check whether it is performing effectively. At long last, any recommendations for upgrades are actualized. The cycle at that point starts again so the framework is more than once improved and refined to have space for future changes. (ecocampus.co.uk). The figure beneath delineates the procedure further. Source: www.ecocampus.co.uk  2.1.0 TYPES OF EMS: By and by there are many unmistakable norms in Environmental Management Systems, yet most the perceived and guaranteed are the: ISO 14001: 2004 International Standard for Environmental Management. Eco †Management Audit Scheme (EMAS). IEMA †Acorn Scheme. (www.iema.net) 2.1.1 ISO 14001: ISO14001 objective is requiring an association to actualize an Environmental Policy inside the association completely upheld by the top administration, and sketching out the arrangements of the organization, not exclusively to the staff yet to people in general. The approach must be in congruity with Environmental Legislations that may influence the association and focusing on a pledge to nonstop improvement. Accentuation ought to likewise be put on arrangement as this gives the course to the rest of the Management System. (Hillary 1999). Moreover, ISO 14001 has developed at a quick rate, and has picked up acknowledgment as the â€Å"model T† among the executives frameworks maybe not as an ostentatious or progressed as others, however prescriptive, solid, moderate (as far as cost and exertion) and maybe in particular it gets you there. 2.1.2 ECO-MANAGEMENT AUDIT SCHEME (EMAS): The EU Eco Management and Audit Scheme perceived as EMAS is a deliberate market based instrument intended to teach better ecological execution from a wide range of associations. EMAS has additionally been planned to totally be appropriate with worldwide standard for natural administration frameworks ISO 14001, however goes further in its necessities for execution improvement, representative association, lawful consistence and correspondence with partners. Interestingly EMAS expects associations to deliver an autonomously checked report about their exhibitions. (www.iema.net) 2.1.3 IEMA †Acorn Scheme: It has been referenced by the Institute of Environmental Management and Assessment (IEMA) that Acorn Scheme is an authoritatively acknowledged EMS standard recommended by the administration, which offers an appropriate bit by bit way to deal with natural administration utilizing the British Standard BS8555. IEMA likewise depicted the plan as an intelligible useful apparatus that contains five phases of EMS execution. Each stage is additionally partitioned into other individual stage profiles which coordinate to the plans guideline. 2.2.0 ECO-CAMPUS AND HOW IT RELATES TO EMS: Eco grounds has been characterized by the ecocampus site as both a natural administration framework and an honor conspire for the advanced education part. The plan permits establishments to be recognized for receiving certain reasonable key issues. The fundamental point of the eco grounds conspire is to support, remunerate and give instruments to help organizations in moving towards natural manageability through great operational and the board rehearses. The eco grounds program comprise of four stages; Bronze, Silver, Gold, and Platinum. By working through these stages, the college will - :  Renew its current ecological exhibition and plan how it tends to be improved.  Develop systems to execute the arrangement  Check real advancement  Ensure any proposals for development and actualize them. The Eco grounds like the EMS, share similar targets which is to teach, advance and incorporate advances, thoughts, designs that have less impact on the environment.â as far as usage Eco grounds works in a similar way with the EMS which is the utilization of the four key advances â€Å"Plan-Do-Check-Act† and off base with the measures of constant improvement. Fundamentally an eco grounds is an instrument that assists foundations with accomplishing manageability through an EMS approach, the relationship being an eco grounds is an EMS with an alternate name since it works in an institutional association. The main contrast between the two would be the honor winning measures your establishment will in general addition by receiving eco grounds, though EMS doesn't compensate usage particularly as such (bronze, silver, gold and platinum). 2.2.1 THE AWARD WINNING CRITERIA: The eco grounds grant measure depends on the PLAN †DO †CHECK †ACT framework and these four phases are granted consecutively by the four awards doled out by the plan. Bronze (arranging), Silver (executing), Gold (working) and Platinum (checking and right). The bronze stage essentially supplements the â€Å"planning† and this has to do with how given the senior administration are towards accomplishing an economical establishment. Natural mindfulness, preparing, gauge environ

Responses to classmember Assignment Example | Topics and Well Written Essays - 500 words

Reactions to classmember - Assignment Example It is likewise astonishing concerning how apathetic a great many people are on the most proficient method to lead an Internet search. Without the tips set down in this Chapter on the best way to discover online data, the vast majority of us would in any case be directing Internet look inaccurately. Along these lines, these tips help in effectively leading Internet searches and discovering significant data that would be significant recorded as a hard copy an exploration paper. To be sure this Chapter clarifies how a powerful research should be bolstered by solid data; Bovee and Thill have spread out a procedure on the most proficient method to show signs of improvement results while looking for data. This enlightening Chapter depicts the best method to direct an examination just as discloses how to assess the validity of any wellspring of data. An explanatory report is significant for breaking down, understanding or clarifying an issue or opportunity and making determinations from the exploration. Hence anticipating a scientific report is vital since it limits the odds of sitting around idly and improves the consequences of the examination. Explanatory reports can be utilized to survey the dangers, openings and the choices and activities that are required to be embraced. By so doing through explanatory reports, one can have the option to investigate a hazard or opportunity and think of the choices that will be helpful for the association. An exploration needs to contain data that is gathered direct despite the fact that lamentably most research papers these days just contain auxiliary data. I agree with you that perhaps the most ideal approaches to gather essential data is through talking the fitting gatherings. Meetings offer the scientist the chance to interface with the invested individual and secure data that is legitimately identified with the exploration being led. This is especially significant since most optional data that can be acquired doesn't identify with the subject of research and is subsequently not of advantage.

Friday, August 21, 2020

Online Therapy Paper Free Essays

Online Therapy Paper Keisha Lucas BSHS/352 April 8, 2013 Professor Kari Siemieniewski Online Therapy Paper Online Therapy is an assistance that encourages individuals to acquire remedial administrations through an online database that is ran by a specialist or a gathering of advisors, who are responsible for the site. Restorative sites are exceptionally useful for somebody who isn’t ready to get to an office setting to have eye to eye meetings. They are amazingly advantageous in light of the fact that one can have guiding meetings in the protection of their own home with exacting privacy and decisiveness. We will compose a custom paper test on Online Therapy Paper or on the other hand any comparable theme just for you Request Now Peacefulness Online Therapy, made and established via Carl Benedict, an authorized Clinical Professional Counselor (LCPC) in Baltimore, Maryland. His treatment involves a wide range of specialized topics anticipating anybody to pursue. Through these guiding meetings, one may encounter an all the more satisfying and inspiring life. Carl Benedict is very much experienced in helping individuals who are managing various issues, for example, serious sorrow, tension, compulsion, alarm assaults, despondency and misfortune, youth misuse, injury, codependency 1 2, outrage the executives, double conclusion, on being an advisor (Serenity, 2005-2013) The expert associated with this site is Carl Benedict, an authorized specialist who is prepared in helping individuals with a wide range of issues that he is prepared to settle. He has a strategy that carefully expresses every individual to be in any event 18 years of age, the customer must not be self-destructive or be a danger to other people and on the off chance that anybody applying has any of these propensities, they should apply for his emergency part of the site for guaranteed consideration. The customer must peruse Carl Benedict’s Services and Fees area. The substance in this site comprises of; Counseling Philosophy, Services and Fees, Confidentiality Statement, Johari Window, The Dilemma of the Traumatized Child, Crisis Counseling, Therapist Contact Information, Sitemap, Testimonials, Beginning Therapy, Texts and Photos, Chat Therapy, Payment Scale, Email Counseling, Pay buddy Security. â€Å"Therapy is a procedure of re-asserting the stifled or prevented parts from claiming yourself so you can turn into an entire individual. Basically, you will set out on an excursion to your True Self-the individual you were intended to be before passionate torment redirected you from your way. (Tranquility, 2005-2013) Online Therapy is seen and happens as a remarkably set encounter, not equivalent to eye to eye restorative experience, however another one that might be useful to a specific gathering of individuals yet not all. It’s another assistance that is being given it a shot and there has been a little segment of research that exists to help being its efficiency. This doesn’t imply that the site of online treatment is of non-impact however it is useful for the ideal individual in the correct conditions. This implies online treatment isn't as basic as the standard approach, which is in the workplace, however to be offered as online treatment. I accept online treatment can be powerful and accommodating for the correct individual in the correct conditions. There are numerous points of interest and inconveniences are; a few preferences are; one can participate in treatment regardless of whether you whether homebound or living in a remote zone; one will have a programmed set up account of their treatment; one can pick single discussion or progressing treatment. A few disservices are; dangers to secrecy because of innovation; issues in helping a self-destructive or murderous customer; the chance of false impressions because of content based interchanges. I feel that the points of interest/inconveniences are unblemished and that they meet the necessary rules to keep his training flawless. The related security issues and moral issues, for example, classification and security are that Mr. Carl Benedict has will undoubtedly ensure you while online in privacy of all of one’s private concern, records, and individual data. The client’s data is fixed with endorsement that it won't be imparted to any other person and that’s ensured. Mr. Benedict just asks that his client’s data be fixed and not shared. Reverend Dawn Sutton is exceptionally taught in Social Work and accompanies a colossal restorative methodology that will meet the capabilities of any individual who needs her administrations. Sunrise additionally adheres straightforwardly to her client’s rights and won't let you down. Some expert affiliations and state administrative sheets of the Mental Health Department will stick behind Reverend Dawn Sutton’s accreditations and back up that she is the most elite. Classification is kept into training for all customers that Dawn Sutton comes into contact with and a portion of her cases are; 1)If kid misuse is suspected, she will report it; 2)IF a customer discharges data with composed approval; 3)If a court summons your records; 4) If the customer is or turns into a ‘vulnerable adult†. Dawn, 2002-2008) Sunrise Counseling Online Therapy and Counseling, Dawn Sutton, MSW, RSW is the advisor for this site. The substance of this site is the meaning of online treatment, crisis contact data, charges and installment techniques, capabilities of advisor, privacy, contact data, Christian guiding, tests, self improvement assets, client’s rights, more connections, reviews and the choice to send the fundamental page to a companion. The expert included is Dawn Sutton, MSW, RSW is an enrolled individual from the Ontario College of Social Workers and Crisis Intervention Counselor for the First Nations and Inuit Health Branch-Ontario Region of the Mental Health Crisis Intervention Counseling Program and she is a Member of the International Society for Mental Health Online. Every last bit of her certifications can be checked. First light Sutton utilizes Christian directing, called Shepherd Counseling, as a key apparatus to help recuperate the individuals who are out of luck and to have such an effect, that her customers won't ever need guiding again due to GOD, not her. She will likely not see them again however on the off chance that she does, she will handle the activity as though it’s the first run through. She complies with her own secrecy leads and will do nothing to endanger them. â€Å"Online directing is just speaking with a certified, proficient guide/specialist by email or talk through your PC. Regardless of whether you pick just a couple of email trades or continuous exchange with the advisor after some time, you have the chance to share your interests, offer conversation starters, and increase further knowledge into the issues you are tending to. (Dawn, 2002-2008) There are numerous favorable circumstances and weaknesses to web based directing that incorporates hostility due to the estimation of individual data on the client’s part. Another burden is that the Counselor wouldn’t have the option to watch their client’s non-verbal communication of their customers. ‘Elizabeth Zelvin, LCSW, is an authorized clinical social laborer and a psychotherapist with 20 years’ experience. She is a New York State Licensed Clinical Social Worker. In 2000, she was the executive of compulsion projects, and she had a private practice in New York City. She is among numerous experts that have an enthusiasm for helping individuals through talk and email web based advising/treatment, otherwise called e-treatment. ’ (Cyber shrivel, 2001) If you need online treatment, you need to fit the bill for one of these classifications; 1) you are alright with the Internet (email, visit or need to build your course of events); 2) utilizing the console pretty much as quick as you might suspect or speakâ€spelling is less significant. (Digital psychologist, 2001) The webpage likewise contains decisions and classifications to pick from about how to utilize your online treatment of your decision. There is additionally a segment on there where Elizabeth approaches â€Å"Are you the specialist for me? She needs to realize that she is the correct pick for the individuals who are keen on treatment. Likewise, the site furnishes you with the follow through on size of the entirety of the costs for hour long talks evaluated at $100. 00, brief talk $ 65. 00, and $45. 00 for 1 email trade. There is a segment on classification and how she should get certainty for every last bit of her meetings regardless of the source. There is likewise verse, music, articles, profiles and accreditations that will check and back up every last bit of her sources and referrals. I feel that the focal points/inconveniences for this site are entirely sensible and simple to follow! They are not very severe nor are they excessively tolerant. Instructions to refer to Online Therapy Paper, Papers

Saturday, August 8, 2020

Introduction To ARTalk

Introduction To ARTalk [by Kerry Powell, Assistant to the Director of Arts Initiatives, and Ken Haggerty 11] MIT is at the center of one of the most original and innovative art making communities in the country. There are over 60 student art groups here, allowing students to explore their talents and experiment with making, performing, looking at, and understanding the multitudes of formats that the arts take in 2008. The arts at MIT are everywhere and include the internationally recognized public art collection, the List Center for Visual Arts, artists-in-residence, the Center for Advanced Visual Studies, the Visual Arts Program, the MIT Dramashop, Dance Ensemble, MIT Symphony Orchestra, and the Media Lab, to name just a few. MIT Dramashops performance of Leocadia. Photocredit / Hayden Taylor ARTALK will focus on the active arts scene at MIT as students, faculty, and staff will discuss events they have attended, courses they are taking, plays they have acted in, or any other related activities or ideas worth blogging about. Students with a multitude of interest and involvement in the arts at MIT will start the conversation, including Sadie Scheffer 10, Ashley Nash 11, Susan Shepherd 11, Biyeun Buczyk 10, Danbee Kim 09, and Harrison Bralower 11. We welcome you to join the conversation. So what is special about the arts at MIT? For one: the students. The energy MIT students put into all of their projects is reflected by experimentation with creativity and expression. A hands-on approach allows what they learn in their other subjects to inform their artistic endeavors, and vice versa. Gamelan Galak Tika bowing in the traditional manner after a performance with Ensemble Robot at the Boston Museum of Science, Photocredit / Jeff Lieberman In the next part of this entry, freshman Ken Haggerty, who helped us organize this venture, explains what makes the arts at MIT so unique and why they are important to him personally. When people think of MIT, the first things that come to mind tend to be engineering, mathematics, science, chemistry, and nerds. I myself thought this when I first applied to MIT. A friends mother told me she thought I was too normal for MIT. And though MIT definitely has all the engineering, math, science, chemistry, and nerds youd expect it to have, such things are only a fraction of what MIT has to offer. Being an artsy person, I signed up for a pre-orientation program in the arts called the Freshman Arts Program (or FAP for short). Through FAP I met fantastically friendly and talented people: writers, drummers, guitarists, vocalists, painters, actors, and photographers. Many of my closest friends did FAP with me, and its great because to this day we all still hang out and go out and do things together. People here are really involved in student groups so theres almost always something to do or someone to see. Wolf Lights, 2004, by Joan Jonas After FAP I signed up for a freshman advising seminar in the arts called FASAP, and again, I met a lot of really awesome and talented people not just students, but professors and guest speakers whose work included writing novels (Professor Junot Diaz, award-winning author), glassblowing (Materials Science and Engineering Professor Michael Cima), origami (graduate student and origami master Brian Chan), Senegalese dance (Patricia Tang, Professor of Music), and using technology to track the population of owls (Dale Joachim, Visiting Professor at the MIT Media Lab). Through FASAP we also saw a lot of really great events, including the Paul Taylor Dance Company and sneak previews of both films Rendition and Funny Games. When my friends from other schools visit, theyre amazed by the amount of opportunities we have at MIT. But what is it, exactly, which makes the arts at MIT so different? The short answer, I think, is the people. Not only are the people here some of the friendliest and most hardworking, but theyre also very practical and technical, and they bring these traits to their art. Here, discussions of origami include the mathematics and geometry behind it, while students discuss glassblowing in terms of molecular structure and phase changes. There are also a plethora of groups here, from break-dancing to journalism, something which I personally feel doesnt get enough publicity. Dan Grahams Yin Yang Pavilion in Simmons Hall For me, though, art brings balance to my life. While many of the classes Im taking stress logic, math, and scientific thought, art allows me to be myself and be creative. That is not to say that the classes Im taking dont require or stress creativity its just that art balances it and makes sure Im doing both. In a sense, the two influence each other. Im a better scientist by keeping up my art, and Im a better artist by being scientific. Both are part of who I am, and Im very fortunate that I go to a school where I dont have to sacrifice one for the other. To learn how you can now easily find more information about all of the arts events happening at MIT, read the recent Tech Talk article The art of communication: Making arts information at MIT more accessible.

Sunday, June 28, 2020

Paraphrase Examples

Paraphrase Examples Paraphrase Paraphrase means to reword something that is written or said by someone else using your own words. So, instead of quoting the person-using their exact words-you paraphrase-put what they said into your own words. You must keep the main idea of what is said or written the same. We often paraphrase the thoughts of others when we are writing or speaking in response to texts. It is important for you to understand how to paraphrase because it helps you to avoid overreliance on quoting the text or plagiarizing the text. Examples of Paraphrase: Excerpt from Romeo and Juliet-Juliet's speech: O Romeo, Romeo, wherefore art thou Romeo? Deny thy father and refuse thy name. Or if thou wilt not, be but sworn my love And I'll no longer be a Capulet. 'Tis but thy name that is my enemy: Thou art thyself, though not a Montague. What's Montague? It is nor hand nor foot Nor arm nor face nor any other part Belonging to a man. O be some other name. What's in a name? That which we call a rose By any other name would smell as sweet; Paraphrase: Juliet wishes that Romeo would give up his name, or if he will love her, she will give up her name. He is not her enemy, even though his family, the Montagues, are enemies of the Capulets. The name, Montague, means nothing-it is not as much a part of Romeo has his hands, feet, arms, face, or other body parts. A name means nothing. A rose would still be a rose even if it were called something different. Excerpt from To Kill a Mockingbird: You never really understand a person until you consider things from his point of view . . . Until you climb into his skin and walk around in it. Paraphrase: You must consider things from the other person's perspective, rather than your own, if you wish to really understand him. Quotation from John F. Kennedy, Jr: Let us not seek the Republican answer or the Democratic answer, but the right answer. Let us not seek to fix the blame for the past. Let us accept our own responsibility for the future. Paraphrase: Instead of attempting to deal with problems by choosing one ideological position rather than another, let us choose a position that is the right, or best, way. Rather than focusing on blaming each other for the past, let's jointly agree that we are responsible for the future.

Saturday, May 23, 2020

Canadas Immigration System Act - 1519 Words

On June 28, 2012, the Protecting Canada’s Immigration System Act (Bill C-31) took effect. This act was put in place to bring further reforms to the asylum system, add measures to address human smuggling, and add the requirement to include biometric data as part of a temporary resident visa, work permit, and study permit application. These changes were claimed to help the system to function better, cut down wait time, make the process faster, screen applicants better, and to prevent needless complications. This resulted in many changes to Canada’s asylum system. There were four changes made to the Immigration and Refugee Board of Canada (IRB). The first change was replacing the Basis of Claim (BOC) form with the Personal Information Form (PIF). This change meant that people who make a refugee claim at an office in Canada must submit a completed BOC during their eligibility interview. If they made a refugee claim at a port of entry then they must submit their BOC to the I RB no later than 15 days after their claim is referred to the IRB. Another change made was that the hearings at the (IRB) would be conducted by public servant decision-makers rather than people appointed by the Governor in Council (GIC). Also, hearings for most claimants would be held no later than 60 days after the refugee claim is referred to the IRB. And finally, for claimants from designated countries of origin, their hearings would be held no later than 45 days after referral to the IRB for those whoShow MoreRelatedEssay on Canada’s Immigration Policy from 1914 to 2000994 Words   |  4 PagesCanada’s Immigration Policy from 1914 to 2000 Canada’s immigration policy has got fairer from the middle of the century on to the end of the century. At the start of the century, Canada’s immigration policy, Canada’s immigration policy wasn’t fair but as the century comes to an end, Canada’s immigration policy became entirely different. There were a lot of racism in the first half of the century but most of this racism in the immigration policy disappeared from 1967 and on. As the years go byRead MoreIntegration Law Is Domestically Rooted927 Words   |  4 PagesFrance’s immigration policy shift to eliminate the process of automatic regularisation. One also has to prove that an immigrant has fully â€Å"integrated† into French society by adhering to the essential principles and values of the Republic. It is important to note that since the election of Francois Hollande into presidential office the focus of France’s immigration policy has dramatically changed. In 2014, Fra ncois Hollande defended the idea of free movement towards France’s immigration policy andRead MoreWhat Is Canada In Canada889 Words   |  4 Pagesparts, and aerospace machinery are Canada’s chief exports (AJG Simoes, 2017). Before continuing with a more extensive evaluation of the nation’s economic system, we will provide a brief overview of the country’s political and legal systems, as well as additional information on the nation’s geography and immigration policies. Political System The Canadian system of governance is both a parliamentary democracy as well as a constitutional monarchy. The Constitutional Act of 1867 forms the basis of theRead MoreThe Government of Canada and Multiculturalism Essay examples1670 Words   |  7 Pagesthe late 1960s and early 1970s in Canada that focused on unique cultural diversity, nationalities, and ethnicity across the nation. Multiculturalism and Immigration are important factors in the development of Canada to attain a strong multicultural example of economic stability, social and political growth which leads to the emergence of Canada’s identity and culture. The artefact design indicates the deep understanding of Canadian Multiculturalism which helps to shape the nation. Many immigrantsRead MoreThe Problems Of Integration Of Immigrants1300 Words   |  6 Pagesskilled immigrant s faces? Introduction Even though the Canada is historically was settled and developed by immigrants, the immigration and integration of migrants are still controversial issues in Canada. Integration is also a multidimensional process involving economic, social, political, and cultural integration. Unfortunately, current immigration policies in Canada’s new economy have primarily focused on economic integration with an emphasis on the economic interests of the state. PoliticalRead MoreCanad A Beneficial Thing1693 Words   |  7 PagesCanada sees itself as a cultural mosaic. Canadians have chosen to embark on the path of ‘multiculturalism’ that recognizes the importance of respecting, preserving and sharing cultural traditions. Through Canada’s past immigrant policies, cultural diversity and the plan to increase immigration, the country’s multicultural society has grown and developed into a diverse country that encourages cultural acceptance and growth. It is clear how Canada has changed as of the 1900’s until now. Back thenRead MoreCanada s Current Issue Of Canada1729 Words   |  7 PagesCurrently, Canada’s economic base is quite strong considering its developed status and demographic factors. These include the birth rate death rate, GDP, natural increase rate, dependancy load, life expectancy, etc. Also, I will explain the current immigration situation in Canada, its importance, and its potential future, as well as further factors that may effect the immigration to Canada. I will also briefly write about Canada’s First Nation people, their current situation residing in Canada, andRead MoreThe Political And Legal System Of Canada849 Words   |  4 PagesKnown as the Great White North, Canada and its economy closely resemble its neighbor to the South, the United States. In addition to having similar patterns of production and living standards, Canada has also incorporated a market-oriented economic system t hat combines private enterprise with government regulation (Economy Watch). Since post-WWII, Canada has had massive growth in manufacturing, mining and services, making its economy the 9th largest and one of the most highly industrialized and urbanizedRead MoreCanada During the Post-War Period1190 Words   |  5 Pagesworking on ways to become stronger and reputable. It is evident that Canada had matured through the post-war era. Canada’s economic progress left a positive impact on the growth of the country as consumerism became popular, and economic ties with America became stronger. Moreover, the removal of racial and ethical barriers contributed to Canadian social affairs such as the huge wave of immigration and the baby boom. The Canadian government also had become more aware and involved in issues impacting CanadianRead MoreAnalysis of Immigration in Canada6747 Words   |  27 PagesIntroduction Canada’s community is respected all around the world. Among many citizens in Canada, the majority are immigrants. According to a Canadian Consensus in 2001, the Canadian population is approx. 30,000,000 and immigration represented approx. 0.834% of the population growth.[1]. These numbers continue to increase as Government Immigration policies center the immigrant growth to be on 1% of the population annually.[2] Thousands of people choose Canada to improve their quality of

Tuesday, May 19, 2020

Music Therapy During Post Operative Abdominal And Thoracic...

Music Therapy in Post-operative Abdominal and Thoracic Patients Kelsey Milam Azusa Pacific University Music Therapy in Post-operative Abdominal and Thoracic Patients The purpose of this paper is to determine if music therapy is an effective intervention on decreasing the perceived response to pain in post-operative abdominal and thoracic hospitalized patients as compared with those who received pharmaceutical interventions alone. A literature review of eight articles will be evaluated and compared in order to ultimately give an overview of the applicability of this intervention to nursing practice. In this paper, the literature will be reviewed based upon applicability to the proposed research question. Background A major intervention executed by the medical surgical nurse is the pain management of post-operative patients. Often, this pain is not adequately treated by medications alone (Vaajoki et al, 2011). For post-operative patients, perceived pain can be measured with the use of a Visual Analog Scale. Overall, music therapy is a relatively new area of adjunct pain therapy and is therefore best researched in the generalized area of acute and neuropathic pain and anxiety. A potential area of further research lies in applying the use of music therapy to specific patient diagnosis as well as procedures, such as patient turning and bone marrow aspirations. This intervention is low-cost, is easily implemented and has no adverse

Tuesday, May 12, 2020

President Ronald Reagan s Speech - 945 Words

On June 12, 1987, the United States 40th President, Ronald Reagan, gave one of his most famous speeches, Remarks at the Brandenburg Gate. In this speech Reagan s aimed to expand democracy through Easter Berlin. Throughout the speech, Reagan used rhetorical devices that made his speech affective. By balancing ethos, logos and pathos in his speech Reagan was able to persuade the Soviet Union leader, Mikhail Gorbachev, and his partisans take a step forward in creating a world piece and reunite East Berlin with West Berlin. Reagan also used repetition, strands as well as Maslow s Hierarchy of Needs to address his audience s principal needs. In this speech, Remarks at the Brandenburg Gate, President Ronald Reagan used problem-solution organization style to get his main points across. Throughout the speech, Reagan provided some of the issues that the people in East and West Berlin faced and then proffered few simple solutions that could resolve those problems. Demolishing the Berlin Wall was one solution that was proposed by Reagan. The Berlin Wall service as a barrier that divided families and friends, which interrupted; the Berlin Wall also prevents democracy from spreading to East Germany. Reagan used language that was easy to comprehend, he knew who his audiences were whether they oppose him or supposed him. As a formal actor he knows how to grab his audience s attention. By verbalizing the past, the present and the future Reagan was able to illustrate the conditionShow MoreRelatedPresident Ronald Reagan s Speech At The 1980 Republican National Convention862 Words   |  4 PagesSPE 130: Famous Person Speech Outline Anthony Cersosimo Title: Change for the Better Purpose: To inform my audience of Ronald Reagan and his speech at the 1980 Republican National Convention and how it was influential for the US at the time as well as its personal significance for me. Central Idea: Ronald Reagan’s speech at the 1980 Republican National Convention in Detroit was one that gave a sense of unification, hope, andRead MoreRhetorical Analysis: Rhetorical Analysis:1723 Words   |  7 Pagesï » ¿ Rhetorical Analysis: President Ronald Reagan s Farwell Address Rhetorical Analysis: Reagan s Farwell Address Ronald Reagan s Farewell Address was an amazing example of conveying the fundamentals for freedom through an emotional and visual lesson. It is no wonder that the president known as the great communicator was successful in painting for us a picture of who we were, past and present, and the improvements in the areas of strength, securityRead MoreRonald Reagan: a True American Hero1204 Words   |  5 PagesReagan: A True American Hero We will continue our quest in space. There will be more flights and more space shuttle crews. And, yes, more volunteers. -Ronald Reagan Ronald Reagan, viewed by some as a true American hero, was as stupendous as presidents can be. His dramatic speeches and down-to-earth personality made people proud to be American. Ronald Reagan seemed more then American. He was a patriot. Ronald Reagan cared deeply for the American people as well at their valuesRead MoreIs Ronald Reagan Under or Overrated as a President? Essay675 Words   |  3 Pages Is Ronald Reagan overrated or underrated as a president? Born Ronald Wilson Reagan on February 6, 1911 in Tampico, Illinois. He was an actor for 30 years before he became involved in politics. He starred in more than 50 movies. Along with acting, he was also a radio sportscaster. He served as the 33rd Governor of California. He was married to Jane Wyman from 1940 to 1949. He married Nancy Davis in 1952. President Ronald Reagan was our 40th president of the United States. He came intoRead MoreRonald Reagan s Speech At The Brandenburg Gate Essay1260 Words   |  6 Pages Ronald Reagan s speech at the Brandenburg gate was one of the most impactful and important speeches given during the cold war, and aided in the eventual downfall of the Soviet Union. Reagan begins his speech by addressing the people present and recognizing the â€Å"freedom† and â€Å"feeling of history† of the city of Berlin has. He makes his first reference to previous speakers by saying, â€Å"Twenty four years ago, President John F. Kennedy visited Berlin, and speaking to the people of this city and theRead MoreKilling Reagan By Bill O Reilly And Martin Dugard1601 Words   |  7 PagesKilling Reagan was wrote by Bill O’Reilly and Martin Dugard as a part of their series to talk about the deaths, assassination, and near deaths of certain historical people. O’Reilly and Dugard write about the events leading up to the attempted assassination of Ronald Reagan including discussing the attempted assassin, John Hinckley, and the events after up until his de ath. The authors present the viewpoint as if one were there to witness the lives of the people in the book. Killing Reagan talks aboutRead MoreRonald Reag Rough Draft Essay1552 Words   |  7 PagesRonald Reagan Rough Draft Intro. INTRODUCTION Imagine, being the President of the United States of America, you are in charge of everything in the nation, being responsible for the well-being of your country. And imagine being on the verge of nuclear war with the Soviet Union and only having six minutes to decide whether or not civilization as we know it could continue. This is the type of stress Ronald Reagan was under almost every day of his eight year presidency. EARLY LIFE Read MoreThe Legacy Of Ronald Wilson Reagan1373 Words   |  6 PagesBackground Ronald Wilson Reagan was born on February 6, 1911, in Tampico, Illinois, to Nellie Wilson and John Edward Jack Reagan. Early on he established the nickname Dutch, because his father thought he resembled a fat little Dutchman. During Ronald’s early years, his family moved from town to town, finally settling in Dixon, Illinois, in 1920. In 1928, Reagan graduated from Dixon High School, where he was student body president, an athlete and also performed in school plays. During mostRead MoreRonald Reag My Hero866 Words   |  4 PagesRonald Reagan My hero is Ronald Reagan. When you think of Ronald Reagan you probably think about one of the presidents of the US, but Ronald Reagan was much more. Ronald Reagan during his life was an actor sports announcer in the military and the president. I choose Ronald Reagan as my hero because of the great things he did during his presidency, and the things that he did while not in office. Some of the things that were very important examples of him being a hero are when the air traffic controllersRead MoreBest Vs. Worst Communicators967 Words   |  4 Pagespeople come to mind, former United States President Ronald Reagan and the former Chief Executive Officer of British Petroleum (BP) Tony Hayward, respectively. Both of these men exhibited certain attributes that affected the way that audiences received the messages they were attempting to convey. One of the key characteristics of good communication is being knowledgeable on the subject you are speaking about. Most of the great communicators such as Ronald Reagan ensure that they carry out their due diligence

Wednesday, May 6, 2020

Life Circumstances Affect Every Individual At Some Time Or...

Life circumstances affect every individual at some time or another, and the coping measures are different for each. Self-care models are established in the absence of these occurrences to allow the minds to rationally plot proper realigning routes. To a degree, a counselor has to be their own client and be the expert in their own first-hand crisis. The goal is to empower the client to the point they are strong, stable, and self-assured in their own ability. With the use of evidence based practice social workers will provide effective services for the couples that do decide to take premarital counseling. Mixed method is possibly the best for this type of study. Clients can give insight on the treatment plan they are receptive to. Staff survey may be biased due to lack of interest towards the research. Counseling is an entity, where the client must learn from the individual sessions and then apply them within their actual marriage. Although, emotions are never consistent from per son to person, it is important to increase the mutual vision in the lives of the clients. In conclusion only the client can decide whether the intervention was effective or not, it is important for them to have motives that will fuel the aims and desires they aim to reach. Literature Review Premarital counseling is an educational, therapeutic, or combination program that couples attend prior to being married. The goal of premarital counseling is to increase satisfaction and reduce the risk ofShow MoreRelatedCoping With Extreme Stress And Its Effect On The Stress Of A Person1569 Words   |  7 PagesThere are times where a person who has held a job felt pressure of work-related stress. One of the serious employment-concern, that eats away revenues, lessens efficiency and marks good employees’ hand their notice is workplace stress. There are workplace stress that is moderate, while extreme stress could be a hindrance to employees’ efficiency, commitment and satisfaction in the organization or management. Coping can fundamentally aid in reducing the stress of a person. Coping has two broadly acknowledgedRead MoreSources of Stress Experienced by International Students Living in the United States1736 Words   |  7 PagesAs the world becomes increasingly glob alized and interconnected, there is an imperative need for every student in this generation to be exposed and to be prepared for this rapidly changing world. Globalization sets the platform for a competitive environment, which challenges a country to increase their level of efficiency, promote innovation, and improve its overall standard of living. One of the ways that value-added learning could be incorporated in students’ learning is through the disseminationRead MoreThe Problem Of Mental Illness1683 Words   |  7 Pagessufficiently with others. It is also difficult for them to complete tasks at home. ADHD is known to affect about 10% of school-age children. Although we don’t know why science has proven that boys are approximately three times more likely to be diagnosed with ADHD than girls are. Various Brain imaging tests have shown that the brain of those who have ADHD, continues to mature in a normal pattern however it does show some delays in the brain regions used for thinking, paying attention, and planning by approximatelyRead MoreThe Effects Of Stress On Health And Stress1084 Words   |  5 PagesStress shows its face physically, emotionally, and mentally. Stress can last for a moment or linger around for a life-time. Stress can appear as early as childhood, adolescence, or perhaps not until years after becoming an adult. Stress shows its face in the tiniest fashions or in the boldest statements. It can be big or small, positive or negative, quick or chronic; deadly or life-changing; it all just depends. What does it depend on? It depends ... all humans are different. Stress impactsRead MoreA Correlation Between Stress And Adolescent Suicide1187 Words   |  5 Pagesof adolescent suicide with the cause being undetermined. The purpose of this paper is to d etermine if there is a correlation between stress and adolescent suicide. Stress is a state of mental or emotional tension resulting from demanding circumstance; it can affect an individual’s body and mind, which can eventually lead to a mental breakdown. Literature review and qualitative research was the method use to formulate this paper. Based on the results, it is determined that stress- although significantRead MoreNurses Should Not Service Excellence Without Compromising Their Welfare1404 Words   |  6 PagesEvery health professional has a legal obligation to patients. Nurses as part of the health care team share an important role in the quality and safe delivery of patient care. They have the major responsibility for the development, implementation and continuous practice of policies and procedures of an organisation. However, nurses should deliver service excellence without compromising their welfare. Compassion fatigue (CF) experienced by nurses possessed major ris k factors for poor quality of careRead MoreWhat Are Essential Qualities For Caregivers?1742 Words   |  7 PagesIllness, disease, and trauma constantly and continuously affect people all over the world. Everyday, people are placed in hospitals, diagnosed with cancer, injured in war, devastated by a natural disaster, involved in a car wreck, and lose loved ones. People in these circumstances require help. They have to have someone caring for them in this difficult and stressful time in their lives. Those who are involved in patient care include doctors, nurses, therapists, rescue workers, and family membersRead MoreTheories Of Development : Guidance1356 Words   |  6 Pagesmother or a father figure in her life today. She was removed from her mother at a very young age, and lived in foster care for a few years, before the Department of Social Services caseworker monitoring Claudia, quit her job and adopted her at age five years old. Things went fine for a couple of years, when the single, adopted mother was in a car accident and injured. The adopted mother became addicted to prescription drugs, and stopped parenting Claudia, who by this time was seven years old, and forcedRead MoreFamily : The Value Of Love, Affection, Care, And Truthfulness2065 Words   |  9 PagesThe meaning of family can be defined in many ways to different people. Family helps us in shaping our life and teaches us the value of love, affection, care, and truthfulness. It provides us tools and suggestions that are necessary to get achievement in life. The definition of family, according to me, is a group of people related or unrelated that value, cares, love and support one another in time of crisis. As a child growing up, I have fond memories of growing up with love and compassion by theRead MoreWhy A Person Should Remain Child Free Essay964 Words   |  4 PagesMargret W. Matlin (2008). In this text, Theme 4 contemplates that â€Å"women differ widely from one another† (pg. 30). This variance should cause pause to every women who is deliberating having a child. A woman must determine for herself if she is the type of women who desires to, capable of, and devoted to having a child. This is a life altering decision and should not be participated in nonchalantly. There exist some disadvantages to the sense of giving birth and to raising a child. Subsequently, five urgings

Ece Project Free Essays

string(215) " PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6\." SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. We will write a custom essay sample on Ece Project or any similar topic only for you Order Now MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. You read "Ece Project" in category "Essay examples" 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor. The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag’s read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still r egarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an outpu t of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star netwo rks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN’s. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO’s) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO’s. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security. ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cycle Peripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for re liable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232 PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULE RFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk. PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place. The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system. User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS. The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology. POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMER Using step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1— input pin 2— ground pin 3— output pin It regulates the positive voltage. ii) Negative regulator 1— ground pin 2— input pin 3— output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information. RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit †“ that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor. The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs). A tag’s read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list becau se DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and mes hes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN’s. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO’s) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO’s. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security. ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cycle Peripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for re liable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232 PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULE RFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk. PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place. The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system. User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS. The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology. POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMER Using step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1— input pin 2— ground pin 3— output pin It regulates the positive voltage. ii) Negative regulator 1— ground pin 2— input pin 3— output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information. RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m How to cite Ece Project, Essay examples