Saturday, May 23, 2020

Canadas Immigration System Act - 1519 Words

On June 28, 2012, the Protecting Canada’s Immigration System Act (Bill C-31) took effect. This act was put in place to bring further reforms to the asylum system, add measures to address human smuggling, and add the requirement to include biometric data as part of a temporary resident visa, work permit, and study permit application. These changes were claimed to help the system to function better, cut down wait time, make the process faster, screen applicants better, and to prevent needless complications. This resulted in many changes to Canada’s asylum system. There were four changes made to the Immigration and Refugee Board of Canada (IRB). The first change was replacing the Basis of Claim (BOC) form with the Personal Information Form (PIF). This change meant that people who make a refugee claim at an office in Canada must submit a completed BOC during their eligibility interview. If they made a refugee claim at a port of entry then they must submit their BOC to the I RB no later than 15 days after their claim is referred to the IRB. Another change made was that the hearings at the (IRB) would be conducted by public servant decision-makers rather than people appointed by the Governor in Council (GIC). Also, hearings for most claimants would be held no later than 60 days after the refugee claim is referred to the IRB. And finally, for claimants from designated countries of origin, their hearings would be held no later than 45 days after referral to the IRB for those whoShow MoreRelatedEssay on Canada’s Immigration Policy from 1914 to 2000994 Words   |  4 PagesCanada’s Immigration Policy from 1914 to 2000 Canada’s immigration policy has got fairer from the middle of the century on to the end of the century. At the start of the century, Canada’s immigration policy, Canada’s immigration policy wasn’t fair but as the century comes to an end, Canada’s immigration policy became entirely different. There were a lot of racism in the first half of the century but most of this racism in the immigration policy disappeared from 1967 and on. As the years go byRead MoreIntegration Law Is Domestically Rooted927 Words   |  4 PagesFrance’s immigration policy shift to eliminate the process of automatic regularisation. One also has to prove that an immigrant has fully â€Å"integrated† into French society by adhering to the essential principles and values of the Republic. It is important to note that since the election of Francois Hollande into presidential office the focus of France’s immigration policy has dramatically changed. In 2014, Fra ncois Hollande defended the idea of free movement towards France’s immigration policy andRead MoreWhat Is Canada In Canada889 Words   |  4 Pagesparts, and aerospace machinery are Canada’s chief exports (AJG Simoes, 2017). Before continuing with a more extensive evaluation of the nation’s economic system, we will provide a brief overview of the country’s political and legal systems, as well as additional information on the nation’s geography and immigration policies. Political System The Canadian system of governance is both a parliamentary democracy as well as a constitutional monarchy. The Constitutional Act of 1867 forms the basis of theRead MoreThe Government of Canada and Multiculturalism Essay examples1670 Words   |  7 Pagesthe late 1960s and early 1970s in Canada that focused on unique cultural diversity, nationalities, and ethnicity across the nation. Multiculturalism and Immigration are important factors in the development of Canada to attain a strong multicultural example of economic stability, social and political growth which leads to the emergence of Canada’s identity and culture. The artefact design indicates the deep understanding of Canadian Multiculturalism which helps to shape the nation. Many immigrantsRead MoreThe Problems Of Integration Of Immigrants1300 Words   |  6 Pagesskilled immigrant s faces? Introduction Even though the Canada is historically was settled and developed by immigrants, the immigration and integration of migrants are still controversial issues in Canada. Integration is also a multidimensional process involving economic, social, political, and cultural integration. Unfortunately, current immigration policies in Canada’s new economy have primarily focused on economic integration with an emphasis on the economic interests of the state. PoliticalRead MoreCanad A Beneficial Thing1693 Words   |  7 PagesCanada sees itself as a cultural mosaic. Canadians have chosen to embark on the path of ‘multiculturalism’ that recognizes the importance of respecting, preserving and sharing cultural traditions. Through Canada’s past immigrant policies, cultural diversity and the plan to increase immigration, the country’s multicultural society has grown and developed into a diverse country that encourages cultural acceptance and growth. It is clear how Canada has changed as of the 1900’s until now. Back thenRead MoreCanada s Current Issue Of Canada1729 Words   |  7 PagesCurrently, Canada’s economic base is quite strong considering its developed status and demographic factors. These include the birth rate death rate, GDP, natural increase rate, dependancy load, life expectancy, etc. Also, I will explain the current immigration situation in Canada, its importance, and its potential future, as well as further factors that may effect the immigration to Canada. I will also briefly write about Canada’s First Nation people, their current situation residing in Canada, andRead MoreThe Political And Legal System Of Canada849 Words   |  4 PagesKnown as the Great White North, Canada and its economy closely resemble its neighbor to the South, the United States. In addition to having similar patterns of production and living standards, Canada has also incorporated a market-oriented economic system t hat combines private enterprise with government regulation (Economy Watch). Since post-WWII, Canada has had massive growth in manufacturing, mining and services, making its economy the 9th largest and one of the most highly industrialized and urbanizedRead MoreCanada During the Post-War Period1190 Words   |  5 Pagesworking on ways to become stronger and reputable. It is evident that Canada had matured through the post-war era. Canada’s economic progress left a positive impact on the growth of the country as consumerism became popular, and economic ties with America became stronger. Moreover, the removal of racial and ethical barriers contributed to Canadian social affairs such as the huge wave of immigration and the baby boom. The Canadian government also had become more aware and involved in issues impacting CanadianRead MoreAnalysis of Immigration in Canada6747 Words   |  27 PagesIntroduction Canada’s community is respected all around the world. Among many citizens in Canada, the majority are immigrants. According to a Canadian Consensus in 2001, the Canadian population is approx. 30,000,000 and immigration represented approx. 0.834% of the population growth.[1]. These numbers continue to increase as Government Immigration policies center the immigrant growth to be on 1% of the population annually.[2] Thousands of people choose Canada to improve their quality of

Tuesday, May 19, 2020

Music Therapy During Post Operative Abdominal And Thoracic...

Music Therapy in Post-operative Abdominal and Thoracic Patients Kelsey Milam Azusa Pacific University Music Therapy in Post-operative Abdominal and Thoracic Patients The purpose of this paper is to determine if music therapy is an effective intervention on decreasing the perceived response to pain in post-operative abdominal and thoracic hospitalized patients as compared with those who received pharmaceutical interventions alone. A literature review of eight articles will be evaluated and compared in order to ultimately give an overview of the applicability of this intervention to nursing practice. In this paper, the literature will be reviewed based upon applicability to the proposed research question. Background A major intervention executed by the medical surgical nurse is the pain management of post-operative patients. Often, this pain is not adequately treated by medications alone (Vaajoki et al, 2011). For post-operative patients, perceived pain can be measured with the use of a Visual Analog Scale. Overall, music therapy is a relatively new area of adjunct pain therapy and is therefore best researched in the generalized area of acute and neuropathic pain and anxiety. A potential area of further research lies in applying the use of music therapy to specific patient diagnosis as well as procedures, such as patient turning and bone marrow aspirations. This intervention is low-cost, is easily implemented and has no adverse

Tuesday, May 12, 2020

President Ronald Reagan s Speech - 945 Words

On June 12, 1987, the United States 40th President, Ronald Reagan, gave one of his most famous speeches, Remarks at the Brandenburg Gate. In this speech Reagan s aimed to expand democracy through Easter Berlin. Throughout the speech, Reagan used rhetorical devices that made his speech affective. By balancing ethos, logos and pathos in his speech Reagan was able to persuade the Soviet Union leader, Mikhail Gorbachev, and his partisans take a step forward in creating a world piece and reunite East Berlin with West Berlin. Reagan also used repetition, strands as well as Maslow s Hierarchy of Needs to address his audience s principal needs. In this speech, Remarks at the Brandenburg Gate, President Ronald Reagan used problem-solution organization style to get his main points across. Throughout the speech, Reagan provided some of the issues that the people in East and West Berlin faced and then proffered few simple solutions that could resolve those problems. Demolishing the Berlin Wall was one solution that was proposed by Reagan. The Berlin Wall service as a barrier that divided families and friends, which interrupted; the Berlin Wall also prevents democracy from spreading to East Germany. Reagan used language that was easy to comprehend, he knew who his audiences were whether they oppose him or supposed him. As a formal actor he knows how to grab his audience s attention. By verbalizing the past, the present and the future Reagan was able to illustrate the conditionShow MoreRelatedPresident Ronald Reagan s Speech At The 1980 Republican National Convention862 Words   |  4 PagesSPE 130: Famous Person Speech Outline Anthony Cersosimo Title: Change for the Better Purpose: To inform my audience of Ronald Reagan and his speech at the 1980 Republican National Convention and how it was influential for the US at the time as well as its personal significance for me. Central Idea: Ronald Reagan’s speech at the 1980 Republican National Convention in Detroit was one that gave a sense of unification, hope, andRead MoreRhetorical Analysis: Rhetorical Analysis:1723 Words   |  7 Pagesï » ¿ Rhetorical Analysis: President Ronald Reagan s Farwell Address Rhetorical Analysis: Reagan s Farwell Address Ronald Reagan s Farewell Address was an amazing example of conveying the fundamentals for freedom through an emotional and visual lesson. It is no wonder that the president known as the great communicator was successful in painting for us a picture of who we were, past and present, and the improvements in the areas of strength, securityRead MoreRonald Reagan: a True American Hero1204 Words   |  5 PagesReagan: A True American Hero We will continue our quest in space. There will be more flights and more space shuttle crews. And, yes, more volunteers. -Ronald Reagan Ronald Reagan, viewed by some as a true American hero, was as stupendous as presidents can be. His dramatic speeches and down-to-earth personality made people proud to be American. Ronald Reagan seemed more then American. He was a patriot. Ronald Reagan cared deeply for the American people as well at their valuesRead MoreIs Ronald Reagan Under or Overrated as a President? Essay675 Words   |  3 Pages Is Ronald Reagan overrated or underrated as a president? Born Ronald Wilson Reagan on February 6, 1911 in Tampico, Illinois. He was an actor for 30 years before he became involved in politics. He starred in more than 50 movies. Along with acting, he was also a radio sportscaster. He served as the 33rd Governor of California. He was married to Jane Wyman from 1940 to 1949. He married Nancy Davis in 1952. President Ronald Reagan was our 40th president of the United States. He came intoRead MoreRonald Reagan s Speech At The Brandenburg Gate Essay1260 Words   |  6 Pages Ronald Reagan s speech at the Brandenburg gate was one of the most impactful and important speeches given during the cold war, and aided in the eventual downfall of the Soviet Union. Reagan begins his speech by addressing the people present and recognizing the â€Å"freedom† and â€Å"feeling of history† of the city of Berlin has. He makes his first reference to previous speakers by saying, â€Å"Twenty four years ago, President John F. Kennedy visited Berlin, and speaking to the people of this city and theRead MoreKilling Reagan By Bill O Reilly And Martin Dugard1601 Words   |  7 PagesKilling Reagan was wrote by Bill O’Reilly and Martin Dugard as a part of their series to talk about the deaths, assassination, and near deaths of certain historical people. O’Reilly and Dugard write about the events leading up to the attempted assassination of Ronald Reagan including discussing the attempted assassin, John Hinckley, and the events after up until his de ath. The authors present the viewpoint as if one were there to witness the lives of the people in the book. Killing Reagan talks aboutRead MoreRonald Reag Rough Draft Essay1552 Words   |  7 PagesRonald Reagan Rough Draft Intro. INTRODUCTION Imagine, being the President of the United States of America, you are in charge of everything in the nation, being responsible for the well-being of your country. And imagine being on the verge of nuclear war with the Soviet Union and only having six minutes to decide whether or not civilization as we know it could continue. This is the type of stress Ronald Reagan was under almost every day of his eight year presidency. EARLY LIFE Read MoreThe Legacy Of Ronald Wilson Reagan1373 Words   |  6 PagesBackground Ronald Wilson Reagan was born on February 6, 1911, in Tampico, Illinois, to Nellie Wilson and John Edward Jack Reagan. Early on he established the nickname Dutch, because his father thought he resembled a fat little Dutchman. During Ronald’s early years, his family moved from town to town, finally settling in Dixon, Illinois, in 1920. In 1928, Reagan graduated from Dixon High School, where he was student body president, an athlete and also performed in school plays. During mostRead MoreRonald Reag My Hero866 Words   |  4 PagesRonald Reagan My hero is Ronald Reagan. When you think of Ronald Reagan you probably think about one of the presidents of the US, but Ronald Reagan was much more. Ronald Reagan during his life was an actor sports announcer in the military and the president. I choose Ronald Reagan as my hero because of the great things he did during his presidency, and the things that he did while not in office. Some of the things that were very important examples of him being a hero are when the air traffic controllersRead MoreBest Vs. Worst Communicators967 Words   |  4 Pagespeople come to mind, former United States President Ronald Reagan and the former Chief Executive Officer of British Petroleum (BP) Tony Hayward, respectively. Both of these men exhibited certain attributes that affected the way that audiences received the messages they were attempting to convey. One of the key characteristics of good communication is being knowledgeable on the subject you are speaking about. Most of the great communicators such as Ronald Reagan ensure that they carry out their due diligence

Wednesday, May 6, 2020

Life Circumstances Affect Every Individual At Some Time Or...

Life circumstances affect every individual at some time or another, and the coping measures are different for each. Self-care models are established in the absence of these occurrences to allow the minds to rationally plot proper realigning routes. To a degree, a counselor has to be their own client and be the expert in their own first-hand crisis. The goal is to empower the client to the point they are strong, stable, and self-assured in their own ability. With the use of evidence based practice social workers will provide effective services for the couples that do decide to take premarital counseling. Mixed method is possibly the best for this type of study. Clients can give insight on the treatment plan they are receptive to. Staff survey may be biased due to lack of interest towards the research. Counseling is an entity, where the client must learn from the individual sessions and then apply them within their actual marriage. Although, emotions are never consistent from per son to person, it is important to increase the mutual vision in the lives of the clients. In conclusion only the client can decide whether the intervention was effective or not, it is important for them to have motives that will fuel the aims and desires they aim to reach. Literature Review Premarital counseling is an educational, therapeutic, or combination program that couples attend prior to being married. The goal of premarital counseling is to increase satisfaction and reduce the risk ofShow MoreRelatedCoping With Extreme Stress And Its Effect On The Stress Of A Person1569 Words   |  7 PagesThere are times where a person who has held a job felt pressure of work-related stress. One of the serious employment-concern, that eats away revenues, lessens efficiency and marks good employees’ hand their notice is workplace stress. There are workplace stress that is moderate, while extreme stress could be a hindrance to employees’ efficiency, commitment and satisfaction in the organization or management. Coping can fundamentally aid in reducing the stress of a person. Coping has two broadly acknowledgedRead MoreSources of Stress Experienced by International Students Living in the United States1736 Words   |  7 PagesAs the world becomes increasingly glob alized and interconnected, there is an imperative need for every student in this generation to be exposed and to be prepared for this rapidly changing world. Globalization sets the platform for a competitive environment, which challenges a country to increase their level of efficiency, promote innovation, and improve its overall standard of living. One of the ways that value-added learning could be incorporated in students’ learning is through the disseminationRead MoreThe Problem Of Mental Illness1683 Words   |  7 Pagessufficiently with others. It is also difficult for them to complete tasks at home. ADHD is known to affect about 10% of school-age children. Although we don’t know why science has proven that boys are approximately three times more likely to be diagnosed with ADHD than girls are. Various Brain imaging tests have shown that the brain of those who have ADHD, continues to mature in a normal pattern however it does show some delays in the brain regions used for thinking, paying attention, and planning by approximatelyRead MoreThe Effects Of Stress On Health And Stress1084 Words   |  5 PagesStress shows its face physically, emotionally, and mentally. Stress can last for a moment or linger around for a life-time. Stress can appear as early as childhood, adolescence, or perhaps not until years after becoming an adult. Stress shows its face in the tiniest fashions or in the boldest statements. It can be big or small, positive or negative, quick or chronic; deadly or life-changing; it all just depends. What does it depend on? It depends ... all humans are different. Stress impactsRead MoreA Correlation Between Stress And Adolescent Suicide1187 Words   |  5 Pagesof adolescent suicide with the cause being undetermined. The purpose of this paper is to d etermine if there is a correlation between stress and adolescent suicide. Stress is a state of mental or emotional tension resulting from demanding circumstance; it can affect an individual’s body and mind, which can eventually lead to a mental breakdown. Literature review and qualitative research was the method use to formulate this paper. Based on the results, it is determined that stress- although significantRead MoreNurses Should Not Service Excellence Without Compromising Their Welfare1404 Words   |  6 PagesEvery health professional has a legal obligation to patients. Nurses as part of the health care team share an important role in the quality and safe delivery of patient care. They have the major responsibility for the development, implementation and continuous practice of policies and procedures of an organisation. However, nurses should deliver service excellence without compromising their welfare. Compassion fatigue (CF) experienced by nurses possessed major ris k factors for poor quality of careRead MoreWhat Are Essential Qualities For Caregivers?1742 Words   |  7 PagesIllness, disease, and trauma constantly and continuously affect people all over the world. Everyday, people are placed in hospitals, diagnosed with cancer, injured in war, devastated by a natural disaster, involved in a car wreck, and lose loved ones. People in these circumstances require help. They have to have someone caring for them in this difficult and stressful time in their lives. Those who are involved in patient care include doctors, nurses, therapists, rescue workers, and family membersRead MoreTheories Of Development : Guidance1356 Words   |  6 Pagesmother or a father figure in her life today. She was removed from her mother at a very young age, and lived in foster care for a few years, before the Department of Social Services caseworker monitoring Claudia, quit her job and adopted her at age five years old. Things went fine for a couple of years, when the single, adopted mother was in a car accident and injured. The adopted mother became addicted to prescription drugs, and stopped parenting Claudia, who by this time was seven years old, and forcedRead MoreFamily : The Value Of Love, Affection, Care, And Truthfulness2065 Words   |  9 PagesThe meaning of family can be defined in many ways to different people. Family helps us in shaping our life and teaches us the value of love, affection, care, and truthfulness. It provides us tools and suggestions that are necessary to get achievement in life. The definition of family, according to me, is a group of people related or unrelated that value, cares, love and support one another in time of crisis. As a child growing up, I have fond memories of growing up with love and compassion by theRead MoreWhy A Person Should Remain Child Free Essay964 Words   |  4 PagesMargret W. Matlin (2008). In this text, Theme 4 contemplates that â€Å"women differ widely from one another† (pg. 30). This variance should cause pause to every women who is deliberating having a child. A woman must determine for herself if she is the type of women who desires to, capable of, and devoted to having a child. This is a life altering decision and should not be participated in nonchalantly. There exist some disadvantages to the sense of giving birth and to raising a child. Subsequently, five urgings

Ece Project Free Essays

string(215) " PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6\." SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. We will write a custom essay sample on Ece Project or any similar topic only for you Order Now MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. You read "Ece Project" in category "Essay examples" 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor. The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag’s read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still r egarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an outpu t of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star netwo rks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN’s. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO’s) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO’s. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security. ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cycle Peripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for re liable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232 PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULE RFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk. PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place. The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system. User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS. The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology. POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMER Using step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1— input pin 2— ground pin 3— output pin It regulates the positive voltage. ii) Negative regulator 1— ground pin 2— input pin 3— output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information. RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit †“ that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor. The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs). A tag’s read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list becau se DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and mes hes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN’s. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO’s) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO’s. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security. ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cycle Peripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for re liable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232 PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULE RFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk. PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place. The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system. User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS. The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology. POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMER Using step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging. It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1— input pin 2— ground pin 3— output pin It regulates the positive voltage. ii) Negative regulator 1— ground pin 2— input pin 3— output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information. RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m How to cite Ece Project, Essay examples

We Can Lose Our Identity When Our Environment Changes free essay sample

A change in environment could cause us to lose our identity to some extent. Everyones identity is different to a certain extent due to our upbringing and physical appearance. A persons name for example would tell a lot about themselves. The culture and language they have been using and even the meaning to the name is also part of a persons identity. The little details and characteristics of a person influences a persons identity to a certain extent. Thus, how does one lose their identity when their environment changes? This intriguing question has no simple and definite answer. Furthermore, even though we are encouraged to be different and to be proud of who we are as individuals, society still has a whole list of social norms to abide to in order to be classified as normal. There is a large grey area on how different we can be in order to behave socially appropriately and yet be able to display our uniqueness as an individual. Therefore, it is easy to lose our original identity and conform to a new identity when our environment changes. In this essay, I would like to address this issue and also discuss some opposing thoughts on it. Some food for thought would be, is it always a negative effect to losing our identity? Perhaps if we thought about our identity as a piece of soft clay being moulded through a series of events and even a change of environment, it could be thought as a positive situation. A change in environment can definitely cause us to lose part of our identity. There are several instances in the study text Growing up Asian in Australia that shows us that it is easy to forget our roots. In one of the personal recounts, sticks and stones and such-like was accounted by Sunil Badami who clearly emotes that being a minority allows others to feel more superior compared to them. Thus, Sunil experiences severe physical and verbal bullying . As he was one in three Indian students in school, he was often called names such as curry muncher, towel-head, abo. etc. All Sunil ever wanted was to fit in and be popular in school instead of always being targeted at for having a hard name to pronounce. I couldnt stand it: it was hard enough not being able to catch, let alone being a darkie. If I couldnt be less black, surely I could get a name that made me feel less black? Being forced by his environment to make a change of his identity, Sunil decided to change his name to Neil, which helped him to become more liked by his peers. By changing his name, Sunil has modified his identity. Even though Neil was just a reference to how his friends were calling him, it made Sunil feel differ ent about himself. He could relate to himself being less black by a new name. A name that allowed everyone to view Sunil as if he had the same skin colour as everyone else and could be seen as having the same effect as Sunil scrubbing his right arm with the floor brush to make his skin colour less different from the rest. A name is important to our identity as it shows our background and our culture which separates us from everyone else. In the end, Sunil finally decided to revert to his original name after hearing how meaningful his name was thought to be. Despite the pressure to choose a name that would have been beneficial to him and to a name that was meaningful to his mother, Sunil decided to respect his mothers wishes of using his birth name. Secondly, we can lose our identity in a different type of change in environment. An article that was published recently about the growing number of young South Korean teenagers going through plastic surgery expresses the thought that our identity is being compromised due to an uprising adolescent trend where teenagers are looking up to Korean artists who have gone under the knife . Having plastic surgery can be considered as modifying a persons identity as their appearances does differentiate a persons identity. However as stated in the article, Its not uncommon for middle schoolers to get double eyelid surgery before going to high school, its also common to get surgery as a high school graduation gift from their parents. We can therefore lose our identity because of society and peer pressure which is part of the environment factor. However, identity is not always being lost when our environment changes. Instead, it could be thought of as a modification of identity when there is a change of our surroundings. In a very popular animation called Despicable Me, it shows a gradual transformation of the main characters identity as he invites 3 orphan girls to stay with him to help him complete his mission. Even though the protagonist was being portrayed as a self centred, arrogant evil villain at the beginning, a gradual change was being seen as he started to have feelings for the 3 girls in a fatherly manner. Identities should not be confined as a fixed structure, but instead a lump of soft clay that has yet to set. Every episode of life that we go through would be how our identity is moulded into. It can be said that it is only through multiple exposures to different environments that we can define our identity. Even though, Despicable Me is only an animation, it shows us that our identity can be improved when there is a change of environment and be related to in real life. In conclusion, I would like to state that it is possible to lose our identity due to a different environment, including peer pressure and expectations from the society a person lives in. Furthermore, a change in environment might not necessarily cause a negative impact on identity, instead it could be modifying the persons identity as identity can be seen as ever changing instead of being confined in a fixed idea. Year 12 English Identity amp; Belonging SAC Written Explanation Using the guidelines below, explain the decisions you made in writing your Context response. My audience for this piece is specifically written to students who have had to leave their home country in order to pursue a higher standard of education. My purpose in writing this piece is to show that a change in environment does not always result in losing in a persons identity and to let the students know that a change in environment could always turn out as a positive experience. The language I have used is appropriate for my audience because a mixture of informal and formal language because it is a hybrid of persuasive writing and a formal article. Some specific examples of these language choices are where I referenced Sunil in him telling the audience what the kids in school used to bully him with. For example he was being called curry muncher, towel-head, abo. etc My language choices help my audience relate to my ideas by the informal writing style that i have used in this essay. Through this form of writing, it would allow my audience to connect better to the essay and therefore agree to the points I stated in the essay that a persons identity would not be lost through an environment. I have structured this piece in this way because it is important to hear both sides of the argument. For the first paragraph, I have started off by agreeing to the topic sentence and giving an example from growing up Asian in Australia. And from the second and third paragraph onwards, I decided to introduce new opposing viewpoints which might help the readers have an all rounded perspective on this topic. My piece draws on the relevant ideas of the Context by relevant examples from the study text which is from Growing up Asian in Australia and the name of the story is Sticks and stones and such-like that was accounted by Sunil Badami. Another example that I used is from a popular animation called Despicable Me, it represents the possibility that a change of environment could do someones identity good. Lastly, I also referenced an article on Korean teenagers where there has been an uprising trend to do plastic surgery to improve their looks. It shows that the loss and modification in identity is not due solely to the change in environment.

Friday, May 1, 2020

Merits & Demerits of Utilizing Social Networks-Samples for Students

Question: Discuss about the Merits and demerits of utilizing Social Networks in Business. Answer: Introduction Social networking refers to the action of using social networks for various purposes. Social networks, on the other hand, are websites and platforms that are used to share ideas and unite people of the same interest (Edosomwan Prakasan, 2016). They are also called virtual community or social media. Examples of these social networks include; Facebook, Twitter, LinkedIn, My Space, Bebo, Instagram, among many others. Most of the successful businesses in the world make use of social media. This is because most of the people can be easily reached, via social networks. When used wisely, businesses accrue more profits. The vice versa is also true. Social networks are platforms which need good marketing strategies for businesses to thrive well. According to (Jussila et al., 2014), about 1.3 million businesses in the make use social networks to market their products. Appended to this report is an analysis of the usage of social networks in contents and subcontinents of the world. This justif ies that social networks are essential tools to be studied as far as the success of businesses is concerned. There are many advantages which result from the utilization of these platforms. However, there are also some disadvantages of using the. The following are the project objectives of this project report. Project objectives Objectives set the main focus of any research paper. This report has its base on the following specific, attainable and measurable, objectives. To identify the advantages of making the use of social networks in business. To state and explain the disadvantages of utilizing social networks in business. To give suggestions on what should be done for businesses to effectively use social networks in business. Project scope The project studies the major advantages and disadvantages of using social platforms in business. It entirely covers a literature review the merits of using social media in the business organization. The disadvantages of the same are still explained in detail below. The project report makes use of secondary data, obtained from articles, books, and journals. However, some sources which seem to be unreliable have been ignored in this report. Only those sources which have relevant and reliable information have been used. The report is specifically on merits, demerits, and some relevant suggestions on social media usage in business, and not social networking in general. A detailed literature review is as portrayed below. Literature review Many researchers, scholars, and marketers have researched, analyzed data and published widely on social networks. Some have even gone further to make an analysis of the advantages and disadvantages of utilizing social media in business. According to (Stelzner, 2014), there are more than 1 million books, articles, and journals published about these merits and demerits. Some of these have been used to compile this report.There are several advantages which result from utilization of social networks in business. To start with, social networks serve as very important tools for promotion. Promotion includes all aspects which aim at making more sales and maximizing profits. Promotion is mainly done through advertising. Marketers are able to advertise in real time, through the use of today's social platforms. This enables them to get first hand and reliable data for market analysis(Tiago Verssimo, 2014). Ads are also commonly used in social networks as promotion tools. Ads are shortly designed adverts which are clear on the information they communicate. Most business organizations include links on their ads. These links are very useful since they guide a potential and interested customer, to the business website where more information about the ad is found. Businesses can, therefore, opt to advertise social networks if they intend to make more profits. Secondly, social networks help businesses to gather customer insights and experiences (Whiting Williams, 2013)(Kaplan Haenlein, 2013). Customers usually have their own views on a company's product. Others have already used products of certain companies, and have an experience of using such products. These kinds of customers, therefore, carry important information with them, which is very important to manufacturers and business enterprises. For any business to evaluate its performance, it has to put customer experiences and insights into consideration. Through social networks, businesses collect information, analyze it and make relevant suggestions on where improvements should be made. Such networks, therefore, tend to be very advantageous to businesses. Thirdly, the utilization of social networks helps to build awareness of a brand and make customers loyal to that particular brand. For any business organization to become successful in the entire labor market, it has to have a brand name. This is a name that is fixed on the products of a certain company and which enables a business organization to market its products. The brand name may also bear the brand logo. To make more sales, businesses first make their brands known to the public, for example through advertising. This action of making a brand name popular and known to the public is referred to as creating brand awareness(Dijkmans et al., 2015). When potential customers become aware of a certain brand, they are more likely to purchase from that brand, this accrues the target company notable increase in profits. If the customers feel comfortable and satisfied with the products after experiencing them, they are likely to purchase even more, from the same brand. Additionally, they may even invite their friends and relatives to purchase from the same brand. By so doing, they are said to have developed customer loyalty. Nike is a good example of a business organization which has put this concept into practice. In 2013, Nike made more than 30% of its profits from social networks(Habibi et al., 2014). This was after it deeply ventured on social networks to create brand awareness. It massively advertised through Facebook, Google+ and LinkedIn. Within a short span of time, the brand name Nike spread to many parts of the world. Today, almost every nation has a product from Nike Company. Customers became loyal and Nike made a lot of profits Additionally, the usage of social networks helps in the ranking of businesses. The higher a business is ranked, the more famous it becomes and hence, the more sales it makes. All these activities at long last, aim at maximizing profits. Businesses are ranked according to two majorly known criteria, that is, ranking by search, and through web traffic (Hays et al., 2013).When a business massively utilizes social media, and its name is mentioned almost daily. This helps to improve search ranking and web traffic. The probability of making more sales is high when a business is ranked highly. For example, one of the highly ranked telecommunication companies in Australia is TPG Telkom. According to a research carried out by (Okazaki Taylor, 2013), this company makes use of social networks to reach the almost all citizens in that country and deliver its services to each social class according to their need. Social networks, therefore, are good platforms to improve the ranking of businesses. Moreover, social networks help the business organization to carefully study their competitors. As it is in the market, competition ever exists. Competition mostly arises when companies sell the same type of product (Culnan et al., 2015). When a company takes the time to study its competitors, through social networks, it might compete favorably with such competitors. For example, a business enterprise may choose to change its product line or utilize product variation to evade stiff competition. On product variation, the business may choose to manufacture distribute and sell products with colors, sizes, texture and pricing concepts, which are different from those of its competitors. Additionally, social networks make it possible business organization to share information, ideas, guidelines, and updates easily and faster. From the definition of a social network, it is clear that it involves bringing people together to one platform. It is therefore easy to communicate with customers through a channel which they can easily be accessible. Large business organizations communicate with their existing and potential customers via their pages in social media (Subrahmanyam et al., 2013). Through this social pages and social groups, customers can get updates, present their complaints and grievances; give positive suggestions and other business related comments. Through social networks, information moves to targeted customers easily and in a fast manner. In addition to the above-discussed advantages, social media also helps business organizations to create and maintain strong and long lasting relationships with their customers. Businesses maintain their customers through various ways. One of these ways is through persuasive communication. Business enterprises utilize social networks to respond to customers complaints in a polite and persuasive manner. This helps to build good relationships between the two parties. After persuasive communication, a broken relationship between customers and business can be brought back to existence. Other departments in business also make use of persuasive communication to build good relationships with customers. A good example is the tourism department in the Delta Airline Company. Trained personnel make use of social networks, to keenly look for potential tourists with determination. Their efforts are successful in most cases. Delta Airlines transports travelers to and fro different destinations as t hey enjoy their travel in the comfortably designed plane seats(Hudson et al., 2016). All this comes into being when the relationship has been created and made strong. It helps to increase customer engagements and therefore bring more capital to the business. Still, on the advantages, social networks help businesses to be the world widely connected. Large businesses not only sell their products in local and regional markets but also international markets. Through social networks, a business identifies business opportunities in other nations, which match with its operation. After market research, the business, therefore, does segmentation on such markets. In international markets where the segments are large, the business may choose to venture in those segments and by so doing, expand its operations. With time, that particular business can be connected to many nations in the world wide. For instance, Nike Company has a branch in almost every country in North and South America, Africa, Saudi Arabia and India (Tsimonis Dimitriadis, 2014). All these business segments in these countries have been identified through social networks. When a business becomes connected to many nations, the chances of making more profits are very high. Additionally, social networks are very useful to businesses since they are free of charge to sign up and use (Aral et al., 2013). Almost all social networks are free. They do not charge anything that can be termed as registration fee, during the opening of an account in their platforms. They are absolutely free to create and use. This is a big business opportunity which business organizations should use to cut down on marketing costs. Since advertising in social media is free, companies should advertise widely on these platforms, with moderation. Adverts are likely to reach the targeted customers in a timely manner since these platforms are designed according to groups of common interests among other characteristics. Finally, social networks serve as good platforms for market research (Hanna et al., 2013). For any business to be successful, especially those which would like to enter the market, conducting a market research is very important. This can only be carried out where the anticipated customers can be easily accessed. Social platforms, in this case, serve as good places to carry out this research. Different businesses venturing in different business opportunities can efficiently utilize social networks to get market research information. It is from this information that decisions are made on which fields to venture and which ones to ignore. However, despite all the advantages well elaborated above there still exists some demerits of making use of social networks in business. These demerits originate from three major sources; the business, the customers and the environment. Some of these disadvantages are as discussed below. To start with, social networks might lead to bad publicity of a business organization. This challenge mainly arises from the business and its customers. When the business does not provide services which cater to the timely needs of the customers, such unsatisfied customers and other aggressive third parties may publicly denounce the company. This is very dangerous to the business enterprise since chances of losing potential and existing customers become very high. This signals that a significant drop in sales may be experienced for certain duration of time. For example, in the recent past, General Motors Company incurred a mass loss in the recent past years (Heller Baird Parasnis, 2015). All these began after the company delayed the manufacture of cars for a long duration. When the vehicles were finally delivered to respective customers, they had deficiencies since they ignited abnormally. The ignition switches were faulty. As a result, several cases of death were reported. This wen t viral on the social networks and the sales of this company promptly decreased. Secondly, social networks may expose business an organization to great risks of loss. When a lot of secret information regarding a business is widely exposed fraud activities like hacking are likely to happen. Hackers only hack when they have enough information concerning that particular business. Social networks are one of the platforms through which such secret information can be exposed. Early this year, the Kenya Revenue Authority was hacked. This was after the agency displayed too much information on social networks, on how it has been making profits. Hackers went ahead and hacked over 2 billion Kenyan shillings(Fuchs, 2017). Lastly, social networks are time-consuming and need close monitoring. Businesses have the mandate to daily monitor social platforms to ensure that all activities run smoothly. This takes a lot of time compared to other means through which such companies would market their products. Conclusion Conclusively, this report had compiled all the advantages and disadvantages which might accrue when a business uses social networks. However, to make sure that businesses operate efficiently in social networks despite the disadvantages of doing so, the business can put into practice, the following suggestions. First, businesses should have a specific marketing strategy which should be clearly indicated in their goals. This will help to ensure that they operate according to their set limits. Issues of time wastage may not be experienced in this case. Additionally, businesses should take safety measures to ensure that their operations are safe and secure. For example, businesses can ensure its properties and employees to ensure that they are compensated in case of loss. A business can also employ experts in Information Technology (IT), to closely monitor and record any form of fraudulent activities (Whiting Williams, 2013). This report had one major limitation, which is the lack of su fficient finance. As a result, most of the data utilized in this report was from secondary sources since the first-hand information was too expensive. However, the data used is accurate and reliable to any business organization which intends to use social networks for its operations. References Aral, S., Dellarocas, C. Godes, D., 2013. Introduction to the special issuesocial media and business transformation: a framework for research. Information Systems Research. Culnan, M.J., McHugh, P. Zubillaga, J., 2015. How large US companies can use Twitter and other social media to gain business value. MIS Quarterly Executive. Dijkmans, C., Kerkhof, P. Beukeboom, C., 2015. A stage to engage Social media use and corporate reputation. Tourism Management, pp.58-67. Edosomwan, S. Prakasan, S., 2016. The history of social media and its impact on business. Journal of Applied Management and Entrepreneurship, p.79. Fuchs, C., 2017. Social media. A critical introduction. Habibi, M., Laroche, M. Richard, M., 2014. Brand communities based on social media: How unique are they? Evidence from two exemplary brand communities. International Journal of Information Management, pp.123-32. Hanna, R., Rohm, A. Crittenden, V., 2013. Were all connected. The power of the social media ecosystem, pp.265-73. Hays, S., Page, S. Buhalis, D., 2013. Social media as a destination marketing tool: its use by national tourism organizations. In Current Issues in Tourism. pp.211-39. Heller Baird, C. Parasnis, G., 2015. From social media to social customer relationship management. In Strategy leadership. pp.30-37. Hudson, S., Huang, L., Roth, M. Madden, T., 2016. The influence of social media interactions on consumerbrand relationships: A three-country study of brand perceptions and marketing behaviors. International Journal of Research in Marketing. Jussila, J., Krkkinen, H. Aramo-Immonen, H., 2014. Social media utilization in business-to-business relationships of technology industry firms. Computers in Human Behavior, pp.606-13. Kaplan, A. Haenlein, M., 2013. Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, pp.59-68. Okazaki, S. Taylor, C., 2013. Social media and international advertising: theoretical challenges and future directions. International marketing review, pp.56-71. Stelzner, M., 2014. The 2011 social media marketing industry report. Chicago. Subrahmanyam, K., Reich, S., Waechter, N. Espinoza, G., 2013. Online and offline social networks: Use of social networking sites by emerging adults. Journal of applied developmental psychology, pp.420-33. Tiago, M. Verssimo, J., 2014. Digital marketing and social media. Business Horizons, pp.703-08. Tsimonis, G. Dimitriadis, S., 2014. Brand strategies in social media. Marketing Intelligence Planning, pp.328-44. Whiting, A. Williams, D., 2013. An International Journal. Why people use social media: a uses and gratifications approach. Qualitative Market Research, pp.362-69.