Tuesday, December 31, 2019

Definition and Examples of Crots in Composition

In composition, a crot is a verbal bit or fragment used as an autonomous unit to create an effect of abruptness and rapid transition. Also called a blip. In  An Alternate Style: Options in Composition  (1980), Winston Weathers described crot  as an archaic word for bit or fragment. The term, he said, was revived by  American essayist and novelist  Tom Wolfe in his introduction to  The Secret Life of Our Times  (Doubleday, 1973). This is one of the few great ways that a fragment sentence can be used effectively — they are often used in poetry but can be used in other forms of literature as well. Examples and Observations in Literature New Years Eve on Broadway. 1931. The poets dream. The bootleggers heaven. The hat check girls julep of joy. Lights. Love. Laughter. Tickets. Taxis. Tears. Bad booze putting hics into hicks and bills into tills. Sadness. Gladness. Madness. New Years Eve on Broadway.(Mark Hellinger, New Years Eve on Broadway. Moon Over Broadway, 1931)The Crots of Mr. JingleAh! fine place, said the stranger, glorious pile — frowning walls — tottering arches — dark nooks — crumbling staircases — Old cathedral too — earthy smell — pilgrims feet worn away the old steps — little Saxon doors — confessionals like money-takers boxes at theatres — queer customers those monks — Popes, and Lord Treasurers, and all sorts of old fellows, with great red faces, and broken noses, turning up every day — buff jerkins too — matchlocks — Sarcophagus — fine place — old legends too — strange stories: capita l and the stranger continued to soliloquize until they reached the Bull Inn, in the High Street, where the coach stopped.(Alfred Jingle in Charles Dickens, The Pickwick Papers, 1837)Coetzees CrotsWhat absorbs them is power and the stupor of power. Eating and talking, munching lives, belching. Slow, heavy-bellied talk. Sitting in a circle, debating ponderously, issuing degrees like hammer blows: death, death, death. Untroubled by the stench. Heavy eyelids, piggish eyes, shrewd with the shrewdness of generations of peasants. Plotting against each other too: slow peasant plots that take decades to mature. The new Africans, pot-bellied, heavy-jowled men on their stools of office: Cetshwayo, Dingane in white skins. Pressing downward: their power in their weight.(J.M. Coetzee, The Age of Iron, 1990)Crots in PoetryAh to be aliveon a mid-September mornfording a streambarefoot, pants rolled up,holding boots, pack on,sunshine, ice in the shallows,northern rockies.(Gary Snyder, For All)Crots i n AdvertisingTell England. Tell the world. Eat more Oats.  Take Care of your Complexion. No More War. Shine your Shoes with Shino. Ask your Grocer. Children love Laxamalt.  Prepare to meet thy God. Bungs Beer is Better. Try Dogsbodys Sausages. Whoosh the Dust Away. Give them Crunchlets. Snagsburys Soups are Best for the Troops.  Morning Star, best Paper by Far. Vote for Punkin and Protect your Profits. Stop that Sneeze with Snuffo. Flush your Kidneys with Fizzlets. Flush your Drains with Sanfect. Wear Wool-fleece next the Skin. Popps Pills Pep you Up. Whiffle your Way to Fortune. . . .Advertise, or go under.(Dorothy Sayers, Murder Must Advertise, 1933)Menckens CrotsTwenty million voters with IQs below 60 have their ears glued to the radio; it takes four days hard work to concoct a speech without a sensible word in it. Next day a dam must be opened somewhere. Four senators get drunk and try to neck a lady politician built like an overloaded tramp steamer. The Presidential autom obile runs over a dog. It rains.(H.L. Mencken, Imperial Purple)Updikes CrotsFootprints around a KEEP OFF sign.Two pigeons feeding each other.Two showgirls, whose faces had not yet thawed the frost of their makeup, treading indignantly through the slush.A plump old man saying Chick, chick and feeding peanuts to squirrels.Many solitary men throwing snowballs at tree trunks.Many birds calling to each other about how little the Ramble has changed.One red mitten lying lost under a poplar tree.An airplane, very bright and distant, slowly moving through the branches of a sycamore.(John Updike, Central Park)Winston Weathers and Tom Wolfe on Crots- In its most intense form, the crot is characterized by a certain abruptness in its termination. As each crot breaks off, Tom Wolfe says, it tends to make ones mind search for some point that must have just been made—presque vu!—almost seen! In the hands of a writer who really understands the device, it will have you making crazy leap s of logic, leaps you never dreamed of before.The provenance of the crot may well be in the writers note itself--in the research note, in the sentence or two one jots down to record a moment or an idea or to describe a person or place. The crot is essentially the note left free of verbal ties with other surrounding notes. . . .The general idea of unrelatedness present in crot writing suggests correspondence—for those who seek it—with the fragmentation and even egalitarianism of contemporary experience, wherein the events personalities, places of life have no particular superior or inferior status to dictate priorities of presentation.(Winston Weathers, An Alternate Style: Options in Composition. Boynton/Cook, 1980)Bangs manes bouffants beehives Beatle caps butter faces brush-on lashes decal eyes puffy sweaters French thrust bras flailing leather blue jeans stretch pants stretch jeans honeydew bottoms eclair shanks elf boots ballerina Knight slippers.(Tom Wolfe, The Gir l of the Year. The Kandy-Kolored Tangerine-Flake Streamline Baby, 1965)MontagePart of the power of moving images comes from the technique [Sergei] Eisenstein championed: montage. Here the tables turn in the contest between the novel and moving images, for in switching rapidly between perspectives, it is those who share their imaginations with us by writing who are at a disadvantage.Because writers must work to make each view they present believable, it is very difficult for them to present a rapid series of such views. Dickens, with his marvelous alertness, succeeds as well as any writer has: the whistling of drovers, the barking of dogs, the bellowing and plunging of oxen, the bleating of sheep, the grunting and squealing of pigs; the cries of the hawkers, the shouts, oaths, and quarrelling on all sides [Oliver Twist]. But when attempting to capture the energy and chaos of this stunning and bewildering market-morning scene, Dickens is often reduced to lists: Countrymen, drovers, bu tchers, hawkers, boys, thieves, idlers, and vagabonds of every low grade or crowding, pushing, driving, beating, whooping and yelling.(Mitchell Stephens, The Rise of the Image, the Fall of the Word. Oxford University Press, 1998) See also: Collage EssayIn Defense of Fragments,  Crots, and Verbless SentencesListMinor SentenceSentence FragmentSuite Amà ©ricaine, by H.L. MenckenUsing Sentence Fragments EffectivelyVerbless SentenceWhat Is a Sentence?

Monday, December 23, 2019

How Banks Went Broke A Look Into The Financial Crisis Of...

Lawrence Humes Page 1 4/28/15 Mr. Donnellan Period 1 How Banks Went Broke: A Look Into the Financial Crisis of 2007-2008 At first, nobody foresaw what was about to happen to the economy. The economy at first was at a state of peace and unity. People were taking loans and purchasing houses and these houses were increasing in value. The banks were giving out loans to the people to purchase the houses and earning money on the interest of those loans. That is when people began to notice the advantages of what could be taken from this economic situation. With a new method of earning money quickly and easily, it is no surprise that everybody began to try and use the same methods. Soon enough, the Financial Crisis of 2007-2008 was born into reality. But the real question is, what were the main causes of the 2007-2008 financial collapse? People saw the advantages of this situation. People began to buy houses for their lowest possible prices with their always approved mortgages and would eventually sell them at their high price. The economy at the time has an abundance of house buyers and the value of the hous es were consistently increasing. With that price increasing, there was almost guaranteed profit. But this method of making money was almost too easy. Many people caught glimpse of the chance to strike it rich through this reselling of houses methods. In a blink of an eye, everybody wasShow MoreRelatedHow Banks Went Broke : A Look Into The Financial Crisis Of 2007-20081696 Words   |  7 Pages Lawrence Humes 4/28/15 Mr. Donnellan Period 1 How Banks Went Broke: A Look into the Financial Crisis of 2007-2008 Nobody foresaw what was about to happen to the economy. In the beginning of the 21st Century the economy was at a state of peace and unity. People were taking loans and purchasing houses that they normally couldn’t afford while these houses were increasing in value. The banks were giving out loans to the people to purchase the houses and earning money on the interest ofRead MoreThe Worst Recession Since The Great Depression1347 Words   |  6 Pagesgreatest economic crash of our time, and the worst recession since the Great Depression? Michael Lewis takes us to the very beginning, covering the story of how cynical mortgage brokers and CDO managers were playing fraudulent roulette. A rigged system that was doomed from the beginning but that very well needed every piece to be in place for 2008 to happen. Credit rating agencies SP and Moody’s had to be completely oblivious in properly rating the CDO tranche system, mortgage lenders had to be eagerRead MoreMoody’s Credit Ratings and the Subprime Mortgage Meltdown Essay3023 Words   |  13 Pagesthe value of these bonds disintegrated, and Moody’s was compelled to downgrade them significantly. In late 2008, several commercial banks, investment banks, and mortgage lenders that had been profoundly involved in the subprime market failed. In the wake of these implosions, credit stagnated, consumer confidence plummeted, and job losses increased across the globe. Although the financial crisis had many roots, some analysts felt that Moody’s and other credit rating agencies had played a large roleRead MoreCritically Analyse How the Government Debt Problems Initially Faced by a Few Relatively Small Economies Could Trigger Such a Wide Impact in Financial Markets2394 Words   |  10 PagesCritically analyse how the government debt problems initially faced by a few relatively small economies could trigger such a wide impact in financial markets Introduction Since the Greeces debt crisis happened, the Euro zone has to confront with a huge sovereign debt crisis, like governments debt increased, bond yield spreads widened, Euro exchange rate fell as well, which caused that the whole international financial markets gradually lost the confidence. The purpose of this essay is toRead MoreBreakdown of the Mortgage Supply Chain5482 Words   |  22 Pagescurrent financial crisis by looking at the lack of quality management through the mortgage supply chain. The crisis represents a failure of proper regulation and visibility throughout the mortgage supply chain. Only careful management of these quality issues through all financial institutions and through all aspects of the financial supply chain will remedy the past issues. This is a difficult task but not impossible. This report will discuss each section of the mortgage supply chain and how theRead MoreGeorge Santayanas The Crisis1806 Words   |  8 Pages the past is important, it deserve s its due - don’t brush it aside, don’t pretend it didn’t happen – to better build the world of tomorrow, you need to remember (and account for) the mistakes of yesterday. The mortgage crisis, and all that it lead too for our economy, back in 2007, is an event that should never be forgotten†¦ lest we inadvertently doom ourselves by going through it all over again. Today, of course, the situation has significantly improved; our nation managed to get over this ratherRead MoreThe Irish Financial Crisis Was Both Predictable and Preventable. to What Extent Do You Agree with This Statement?9406 Words   |  38 PagesPaper No. 7811 May 2010 ABSTRACT Whatever Happened to Ireland?* Abstract While Irish GNP quadrupled between 1990 and 2007, this Celtic Tiger growth came from two distinctive, sequential booms, with export driven growth during the 1990s being followed after 2000 by a credit fuelled construction boom. Bank lending rose from 60 per cent of GNP in 1997 to 200 per cent in 2008, causing a house price bubble and a building boom where 20 per cent of GNP came from construction. The collapse of the creditRead MoreThe Pursuit Of The American Dream1545 Words   |  7 Pagesis feasible for anyone regardless of their upbringing. It makes the average Joe conceive that the American dream is still alive today and that anything is plausible if an individual perseveres and works hard enough. However, if one takes a moment to look away from Hollywood’s propaganda and rather on the actual issues facing the United States (U.S.) today, one realizes that there is a profoundly imbalanced polarization of wealth and power in America. Robert Reich’s documentary Inequality for All coversRead MoreEurope Economic Crisis55278 Words   |  222 PagesISSN 0379-0991 Economic Crisis in Europe: Causes, Consequences and Responses EUROPEAN ECONOMY 7|2009 EUROPEAN COMMISSION The European Economy series contains important reports and communications from the Commission to the Council and the Parliament on the economic situation and developments, such as the Economic forecasts, the annual EU economy review and the Public ï ¬ nances in EMU report. Subscription terms are shown on the back cover and details on how to obtain the list of sales agentsRead MoreThe Pursuit Of The American Dream1421 Words   |  6 Pagesis feasible for anyone regardless of their upbringing. It makes the average Joe conceive that the American dream is still alive today and that anything is plausible if an individual perseveres and works hard enough. However, if one takes a moment to look away from Hollywood’s propaganda and rather at the actual issues facing the U.S. today, one realizes that there is a profoundly imbalanced polarization of wealth and power in America. Robert Reich’s documentary Inequality for All covers what is called

Saturday, December 14, 2019

Compilation of Poems, Short Fiction and Non-Fiction Stories Free Essays

string(225) " for the better or either for the worst Unanswered question: Do we need to be hurt first\? A Poem about Faith in God Oh Lord God is it true\? That you are soon to come\? Because for quite a long time, you let me be lonesome\." How it’s like to be Invisible It’s kind of a nerdy question, but it always seems to come up. You’ll be hanging out with a few friends and someone will ask, â€Å"If you could have any superpower you wanted, what would it be? Most people can’t answer right away because there?s so many to choose from. But not me, know exactly what I’d pick, hands down, overtime invisibility. We will write a custom essay sample on Compilation of Poems, Short Fiction and Non-Fiction Stories or any similar topic only for you Order Now Just think about invisibility for a second. No one can see you. You’re there but not there. You could be in the same room with someone, standing inches away, and they wouldn’t realize it. Sure, they could reach out and touch you if they wanted – but would they? They wouldn’t know you were there! An invisible person could be watching e this very second, and if not for the fact that my super hearing allows me to detect a heartbeat any’. Where in the world, I’d have no way of knowing. Go stand in front of a mirror. Now imagine there’s no one looking back at you. Or what it would be like if you hold your hands directly in front of your face and saw nothing but the wall on the other side if the room. That’s impossible right? That simply does not happen! For me, invisibility is the best superpower, without a doubt. Honestly don’t know why people even have this discussion. The only downside to invisibility can think of – and given this lot of thought – is how tempting it would be to abuse it. For instance, it would be very easy to rob a bank. Could just stand in the lobby, totally unnoticed by anyone and wait until everyone went home for the evening. Then with the whole building to myself, could simply walk up, rip the vault door off its hinges and fill my money bags at the speed of light. But with power like that I just need to be very careful. In any case I realize it’s a silly fantasy. It’s never going to happen and theft how it’s always going to be. There is no getting around the limitations of the real world. It’s fun to ponder through. Come to think of it, it’d also be cost to have an elastic body and be able to stretch my arms and legs twenty feet or something. That’d be amazing. Can you imagine? In state of Coma And then suddenly, I just woke up in the middle of a spacious galactic vastness where my footsteps somehow reached the info unity but still finding myself wandering in the same old place. I feel nothing but the serenity of voices I hear randomly everywhere, as I continued walking in the path of uncertainty, I bumped in a dead end wall. I started to shiver in fear as the wall gradually pushed itself as if its about to crush me into pieces. I cannot do anything but to scream in a world am the only one existing, as if the walls duplicated themselves to put me inside a shrinking cube of darkness. Eventually, I began hearing random voices inflicting despair and agony around the vicinity of my perfectly working ears. I hear my name as it is being called several times with the murmurs and sounds of grief that pinch my heart to explode as devastating as a volcanic eruption. I cannot move my arms or any parts of my body. â€Å"Help! I’m trapped inside these four walls. I’m being squeezed and can barely breathe. â€Å"Toot, toot, toot, toot†¦ † – the only mound that can distinguish coming from a man-made machine that emphasizes how stable the vitals of a person are. I finally remember now, was hit by a car on my way home, and perhaps I’m under a medical custody. A Poem about Marriage A promise of a lifetime and eternal fusion Binding two completely different persons, Both grown-ups of glee, and dosages of laments Epitomized by a rounded finger ornament Even procrastination would not turn back time Its sacrament means ‘two’ must never sublime â€Å"For richer or for poorer, for better or for worst† In the altar you acknowledge, love may be cursed. A pledge where we crack holy names and scriptures Words that are sacred and shall not devour with time Union of two souls are meant not by the skies But the one who sees us, in ethereal disguise. One’s longevity is not a mere necessity. For at once we promised in the presence of deity One may forget in mind all the memories But never in the heart, which knows camaraderie For it all begins with the words â€Å"l love you† And a box of sweet chocolates, flowers in red hue Always bear in mind, marriage is something to ponder, Indeed an obligation, bound to last forever A Poem about Change Change is just a cause; time and space is its agent, A crucial process brought by either fame or torment Even a photograph, would seem just imperfect You’d only see appearance? That’s simply incorrect. All these people can do, around you is to whisper What can only be heard? A version that is newer? † â€Å"Is that him, is that you? † You seem a little different While you walk with glamour, along the crowded pavement You were hurt, and once lost, that is actually overt All your pain and sufferings, you considered like dirt. When you came back they thought, you’re the person they once knew Its j ust so surprising; your voice is their only clue! Change is a reflection of what things you’ve gone through That is why there’s no doubt, it transformed the whole you You’re not that one person, who knows pain and blue Until you leave your homeland, on an airplane, you flew. Perhaps, that is just, how life really goes on, That you walk on earth and then everything is gone We change for the better or either for the worst Unanswered question: Do we need to be hurt first? A Poem about Faith in God Oh Lord God is it true? That you are soon to come? Because for quite a long time, you let me be lonesome. You read "Compilation of Poems, Short Fiction and Non-Fiction Stories" in category "Papers" Help me understand, that your existence is true Because somehow in my heart, know there is You. Overtime I fall, get wounds that never heal It somewhat tears my belief, that heaven is for real. They say You died for our sins, and was crucified Maybe you’re just a myth, or maybe I’m just blind. For years, I didn’t go to church at least to say thank you Come on, judge me, may have forgotten you too. But wonder in spite all the wrongdoings I had Blessings rain like shower- makes me smile when I’m sad. Sometimes think you’re an invisible entity You’re there but not there, now believe serendipity You just do not speak, through your mouth or your hands Even I forget you, you never reprimand. Wrote this poem not because its a requirement But because I believe You, and your wise judgment And for that I will rate you, a grade of ten For my endless devotion, Hallelujah, Amen! A Poem about Hope Every ray of the sun that shines the green leafy meadows, Begins a day to be distant from tears and rear shadows For every breath that we take, for every smile that we see Is the knowledge that there’s hope, in our life there’s always glee For each day that passes through is a new fight that awaits A battle with the fortune, where we need a little faith Every day may not be good; we know life is a roulette Thank God, He loves us, though we’re as dark as a silhouette Hoping perhaps is something we could all ever do, For penthouse we don’t know if we can still make it through But there’s always something to ponder, when our life gets rough â€Å"For every rain, comes the rainbow – that will make us all tough Never ever be afraid to wake up in the morning And think that life is over – that it only means nothing. Together with the glory that the world offers us, is a whispering sound, saying â€Å"strive harder and surpass†. A leaf may wither like our hair when it turns white, Life may seem to be darker than the middle of the night But even if the darkest night hides the glow of the little moon, Don’t forget to go with the flow and to dance with its tune. A Poem about Betrayal You knocked at my humble door, and so I opened it up, That is how you have gain my trust, as quicker as a nap didn’t wonder how fragile it was, since the day we met, until you managed to betray me, and I felt like death. You walked into my life, like dancing papers in the wind, It was smooth ‘twats graceful; on my wall our pictures are pinned. You left me so much to remember, memories indeed. Tell me what is the reason, why you have changed quite rapid! What I’ve given you was something, which for me was priceless It was trust that you have broken, how could you not care less? A round of applause for our very well-done performance, For making me believe, it’s a non-fictional romance Still fresh in my memory when you told me to trust you, That we’ll never be apart and I’m your â€Å"my only you†. Easy come, easy go? You’re like common people I know, Now you ask for my trust again? Well my answer is no. What you’ve done was something which is not irreversible, Betraying me was your choice? Go read yourself a bible. Find the story about Judas, and please learn your lesson, â€Å"Trust is only given once, be a trustworthy person† If Only I Knew Nothing could ever be more exciting than the night before the day of school field trip. Tell me if Pm wrong? And so right now, time check it’s 10:PM, 6 hours, and 13 minutes left as I countdown before I ride that fully air- conditioned Wi-If equipped bus. My travel bag can be my home! Almost everything need is here. Have cookies, principles, sandwiches, sweaters, orange juices, chocolates, my favorite Sponge pillow and my gadgets. Meanwhile, really can’t sleep, so I turned on my laptop and watched some movies. After watching two Science Fiction movies, my mom came into my room and yelled at me. She told me to go to sleep so could have energy for tomorrow. Its 3:AMA, 2 hours left before the trip, and so decided to take a AP. Data! It’s field trip time! I’m awake now. I ran quickly to take a shower and afterwards, had my breakfast and I’ve changed my clothes, too. Then my mom sent me to school. Wow! Here is my bus now. But something seems not right; the right tire at the back part of the bus is quite flat, I was about to tell it to the driver but my teacher scolded me, and told me to quickly get inside because the bus was leaving and so did. I am seated at the very back part of the bus, you know, where I can lie down and have some rest while we travel. Meanwhile, think I know I’m already asleep, but it was a shallow one. I can still hear the engine of the bus, the chattering noise of my classmates, and a bit of hording from other cars stuck on the same traffic. After like, maybe forty-five minutes? Our bus has escaped the traffic and think we’re now passing through the fields. This time have really fallen into a deep sleep. Just before I have my visit to dreamland, there was this weird screeching and banging sound that heard and at the same time there were a lot of people screaming for help. I couldn’t care less. Maybe I’m already in dreamland and those strange noises that heard were just some sort of my imagination. I ally had a very long sleep. But I’m just right on time; we’ve just arrived in our destination, but I’m a bit worried because the tour guide who’s been waiting for us would not talk to my teacher, my teacher kept on poking her but she never looked back. So, my teacher gathered all of her students, and that includes me and she said if the tour guide wont pay attention to us, then perhaps she’ll be the tour guide. â€Å"Very well said ma’am! Let’s go! † I said in intense excitement. Our teacher started touring us first in the Zoo. There were really lots of awesome creatures I’ve never seen in person before! Vie en a tarsier, an owl, an alligator, lion, tiger, parrot, a hippo, a kangaroo and there’s this one animal that really stunned me, it was the shark. I’m really enjoying this trip. I could touch every animal and they do not get aggressive at all! – Specially the lion. Next stop – Enchanted Kingdom! This is it, my chance to face my fear of heights. I called three of my buddies to join me ride the Ferris wheel; navy we’ve got free access to all the rides. Was just a bit disgusted; the guard didn’t even assist us So that We could be safe! And another thing, a Ferris wheel slot can accommodate 3 persons, but he kept eying that our seat is vacant! He’s so mean. Just because were little kids he would say that? Thank God he already let us have the spin. Anyway, this is supposed to be a happy day, so even if there are people trying to ruin it, me and my buddies will just give them a smile. It was really very exhausting yet fulfilling. We’ve enjoyed the entire field trip. My 300 peso pocket money remained still in my bag. Time check, it’s already PM, and its our call time to go back to the bus. But this trip wouldn’t be so remarkable if I wont be buying any souvenir items. So I walked with haste into the souvenir shop – which eventually made me a bit passed off again, because the store owner kept ignoring me. Well, anyway, saw the shirt that caught my interest and so I grabbed it and just put my payment on the cashier’s table. I hurriedly ran back to our bus because I’m afraid it may leave me behind. I don’t know how I can come back home if that happens. Again, I’m just right on time. The bus is leaving and so I hopped up and proceeded to my special seat. It was really tiring that I’ve managed to fall quickly into a deep sleep. I dreamt of beautiful things in my life. I saw mom, I saw dad, my puppy â€Å"Bummed†, and they were all smiling at me. However, upon my deep sleep, I didn’t notice the bus is already at the front of our house, my buddies woke me up. I got up and said goodbye to them. I reached home at exactly 1 1:PM. I’m very excited to see mom, I couldn’t wait to tell her a lot of fascinating stories I had during the trip, but as stepped into our living room, she was there knitting, the television is turned on in the news channel. I was touched to see her repair my favorite dress – though it’s too late and I cannot use it anymore in the fielder, she still carries on. I’m surprised I have a picture in a frame she just put on the table, she ever did that. I thought she was about to welcome me back home. I thought of it much of a surprise. But then she suddenly started weeping. I said â€Å"Mom? I’m home! Why are you crying? † bought a souvenir. A white shirt from EEK! Here! Take a look! † I am terrified, really, really terrified. If this is a joke, it’s not funny anymore! â€Å"Mom! I’m here! Please pay attention! I did everything to make her look at me, but she just kept ignoring me like I’m just a part of the air. She still remained sobbing. She has finished knitting. She folded it and put in right beside my framed picture on the table. I sat beside her as she etches the news. It was breaking news, a road accident, â€Å"A bus collides with a deli very truck† I was shocked, because the bus looks just like the one I rode on the trip. It kind of like catches my interest because it says in the news that it was also heading into the Zoo for a school field trip activity. Such a coincidence! The sad thing about this tragedy is that all of the passengers died – the teacher and the students. Not one managed to survive. Watched as the rescuers release the corpse from within the mangled bus. My tears suddenly fell off my eyes. My cheeks turned red as I witness the last corpse Ewing taken out of the bus – was me, it was me†¦. The Zero Visibility The Earth was one once called the II Verdure, where all the inhabitants were not humans but mutants called â€Å"Material†. Creatures that are capable of physically morphing into something or someone they want to be once they were able to touch the object or person they desire to copy. But their rules prohibit all of the Material citizens to use this skill as it can be very deceiving to anyone and it is considered a mortal sin for them. Their god is the Nature. They don’t have spirits. But they also have feelings and emotions. They reproduce by hand contact. They breathe through the existence of one another. Each Material breathes sulfur. When one Material dies, the one, or the thing he copied also vanishes. They don’t have divergent personality. They are all the same two-legged creatures. But there is one special yet abominable gift each Material gets when they are born on El Verdure and this is the only thing divergent about them. Material gets the power to control one of any of the nature’s wrath; volcanic eruptions, tsunamis, earthquakes, wildfires, hurricanes, tornadoes, snow storms and lightning. However, there is only one in a million chance for a particular Material citizen to possess the ability of controlling the superior power of the Earthquake and many has believed that it will never get to exist again. About CHOICE, the Earth stood to be the only planet existing in the universe. It is said to be that the Earth measures twenty times its size compare to the present time. However, this changed when one Material, decided to break free. Matisse’s government system is called â€Å"Gaillardia†. (It is like a democratic system in the present time). A Material named â€Å"Scabbard† works as a â€Å"limpidly† or a helper in the Egalitarian tyrants. He is the one who keeps he darkest secrets of II Verdure’s rulers. The government officials they call â€Å"functionaries† never do their jobs – to promote peace and order, and proper distribution of â€Å"razor† (rice in English). Each Material family only receives one kilogram of razor every 3 days. The Egalitarian Functionaries in the other hand receives 5 chests of razor every day. Scabbard belongs to a family that is well supported by the functionaries. But his virtues, however is telling him something ideally contrasted to what he does. El Verdure has 7 functionaries. The President who controls the lightning, the vice president, ho controls the wildfires, the two senators that can control volcanic eruptions and tsunamis, and the three governors possessing the power to control hurricanes, tornadoes and snow storms. The Egalitarian Functionaries are not just gluttonous but ruthless. They don’t even care if the ordinary poor Materials die in poverty. They are heartless and sometimes they even do the killing by their own hands. They permanently take away the innate power of a Material in the process of â€Å"Montage† by injecting through the veins a red luminous elixir. It permanently disables a Material to use and trigger en of the 7 existing nature’s wrath present in an individual. But in just a blink Of an eye, everything will just be dust in the wind. One day, Scabbard’s mother â€Å"Matter†, was terribly sick. To see his son is his only cure because she copied the physical appearance of her son that why she needs an exchange of sulfur exclusively coming from his son only. However it is not yet time to go home for Scabbard. He didn’t know what was happening to her mother. Matter goes to the â€Å"Evasively† (the house of the Egalitarian Functionaries) to find her son. But the â€Å"Flaky† (Security guards) would not let her come in. Even if she explained that his son is a faithful servant of the Functionaries for years, and she’s just want to talk to him inside the Evasively, still the flaky refused to agree. Instead, they bring Matter to the President for violating the rule of copying a person, and before Matter were executed; her power was cleansed first in Montage. Scabbard, finally heard about the execution and so he ran quickly to the â€Å"Domain Skittles† (or the execution room) just to witness the death of her mother. In his two eyes he watch as her mother’s hurricane power is being taken away. In great anger, Scabbard screamed! And suddenly it started shaking all over El Verdure. His scream full of rage and fury has made him discovered he possess the superior power. How to cite Compilation of Poems, Short Fiction and Non-Fiction Stories, Papers

Friday, December 6, 2019

Computer Networking-Software Defined Network

Questions: The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowledge based on current state of the art of an emerging knowledge domain. Then they will learn how to identify plausible security issues in this emerging technology and finally learn the skill of adding knowledge to existing domain by theoretically developing the corresponding protection mechanism for a particular issue. Description of the assessment: Software Defined Networking (SDN) is a rising concept in computer networking. It is possible to centralize software logically in order to control the behaviour of the network. In contrast to conventional network, in SDN, a networks control logic is separated from the underlying physical routers and switches. This phenomenon allows network operators to write high-level control programs to specifying the behaviour of the whole network. This assignment includes four parts- 1. Literature review on Software Define Networking (SDN) You need to write 1000 word literature on SDN. Your literature should be supported by at least three (3) academic (Journal/Conference) papers chosen from the current state of the art. 2. Identify three current or future security issues in SDN In this section you will identify three security issues. These issues can be taken from current state of the art or could be evolved from your own independent innovative thinking. This section again must have to be supported by at least two (2) references. 3. Develop theoretical security framework against one of the identified security issues in (2) In this part you need to add knowledge to the existing knowledge domain of SDN. You need to choose one of the issues identified in previous section and develop a theoretical security framework for this particular security issue. 4. Create a 7-10 minutes presentation and present your work in front of big audiences. Answers: Software defined network Software Defined Network or SDN is a computer networking approach that allows managing the network services by the network managers. The network services could be managed through high level functionality abstraction.it is done through system decoupling, which has the function of making decisions about how the traffic is managed, by sending the traffic from the systems underlying towards forwarding the congested traffic to the final destination (Bernardo, Chua, 2015). Protocol The SDNs are usually associated with the protocol, OpenFlow and the other techniques involved are Open Network Environment from Cisco, Network Virtualization Platform from Nicira (Canini, et al. 2012). Concept The concept of the Software Defined Networking is a vital and present day need of the architecture that purports to be manageable, dynamic, adaptable and cost-effective, seeks to be compatible and suitable for the dynamic nature and high-bandwidth nature of the applications of today. These architectures enable the network managers to decouple the network control, enable the control over the network and forwarding functions, so that the control is programmable directly and abstracting the underlying infrastructure from the network services and applications (Feamster, 2010). When OpenFlow protocol is considered as foundational element to build the solutions of SDN, the architecture needs the following (Al-Shaer, et al, 2010), Directly Programmable Since the network control is decoupled from the forwarding function, the network control can be programmable directly. Centrally Managed Now the network intelligence can be centralized logically, in the SDN controllers that are software based and maintains a bird eye or global view of the network that look to be public and applications engines, as one logical switch. Agile The network wide traffic flow now can be adjusted dynamically so that the changing needs and demands are met, as the administrators can adjust the traffic dynamically, through gaining abstract control from forwarding. Open Standards-based and Vendor-Neutral The SDN can simplify the design and operation of the network, when it is implemented by the open standards, as the necessary instructions can be given by the controllers of SDN, rather than multiple protocols and devices that are vendor-specific. Programmatically Configured SDN allow the network managers to write the programs by themselves, to manage, configure, secure, and optimize the resources of the network, simply and quickly through automated and dynamic SDN programs, as these programs are independent from the proprietary software. Open Standards-based and Vendor Neutral SDN would simplify the operation and network design, when it is implemented by open standards, since the instructions are given by the controllers of the SDN, instead of the vendor specific or multiple devices and protocols. Need for sdn The existing traditional network architecture is ill-suited for todays storage needs and dynamic computing needs, enterprise data centres and carrier environments. The driving needs for the SDN paradigm are the following. Dynamically Changing Patterns of Traffic The traffic patterns have got dynamically changed, within the data centre of the enterprise. Unlike the present client server applications, in which there is bulk communication happens in between the client and server, the present applications need to have access to various servers and databases, creating huge traffic in the present east-west and north-south traffic pattern. In addition to that the users keep changing the patterns of the network traffic, to access applications and corporate content from various devices, trying to connect from anytime and anywhere. Hence, the managers of the enterprise data centres have been contemplating some utility computing models that may include public cloud, private cloud or hybrid cloud that in turn result in additional traffic across the WAN. IT Consumerization The users of computer and mobile devices are employing the personal devices like tablets, smartphones and networks, increasingly, for accessing the corporate network. It is a challenge for the IT to accommodate increasing personal devices, at the same time protecting the intellectual property and corporate data to meet the mandates of compliance. Cloud Services Incline Enterprises are enthusiastic in embrace the private and public cloud services that result in enormous growth of the same services. They want agility for accessing infrastructure, application and other resources of IT, with increasing demand. However, planning is needed for increased companies, security and auditing requirements for cloud services, along with the considerations, business re0rgniazations and mergers that would change the assumptions dynamically. There is a need for the elastic scaling for storage, network and computing resources, ideally with common suite of tools from common viewpoint. Big Data and More Bandwidth To handle the mega datasets or big data needed today, requires, huge parallel processing needed on thousands of servers and it demands direct connections among them. The same need demands for additional network capacity of data centre. It has become a challenge to unimaginable levels of scaling the network, maintaining connectivity between any-to-any without breaking. Architecture and components The architecture of the Software Defined Network, as a high-level overview is shown in the following figure. Figure: SDN Architecture SDN App Applications of SDN are the programs that communicate the requirements of the network to the network behaviour desired, directly, programmatically and explicitly to the controller of the SDN through NBI or NorthBound Interface. They may also consume the networks abstracted view towards the internal decision to make the purposes. It consists of one or more drivers fo NBI and one SDN Application Logic. These applications may expose to the abstracted network control layer that offer one or more NBIs to higher levels through the respective agents of the NBI. SDN Controller SDN controller acts an entity that logically centralized and in-charge that Translates the SDN application layer requirements down to the data paths of the SDN Provide the applications of the SDN with the network abstract view that include the events and statistics. It has one or more NBI agents, control logic and CDPI (Control to Data-Plane Interface) driver. SDN Datapath SDN Datapath is considered as a network device that logically exposes uncontented control and visibility over its data processing and advertised forwarding capabilities. The physical substrate resources in a subset or whole are encompassed by the logical representation. It consists of one or zero traffic processing functions, one or more set of engines for traffic forwarding and CDPI agent. These functions and engines may include simple forwarding in between the internal traffic processing, external interfaces or termination functions. SDN datapaths would be contained in one network element, which is an integrated communications resources physical commination, managed as a single unit. It is also related with the multiple and elements fo the physical networks. SDN Cdpi The SDN Control to Data-Plane Interface is considered as an interface that is well defined in between SDN datapath and SDN controller that provide, Capabilities advertisement All forwarding operations programmatic control Statistics reporting Event notification CDPI is expected to implement in a vendor-neutral, interoperable and open ways. SDN Nbi SDN Northbound Interfaces are the interfaces in between the controller and applications of the SDN. It provides the abstract network view and help network behaviour direct expression enablement and requirements. It is possible to occur at nay abstraction level and across the functionality data sets. It is also expected in implementation of the interfaces in an interoperable, vendor-neutral and open ways. Security issues Most of the issues of security are more related to the security issues of the traditional networking. However, there are other issues too that are new. There are many attack vectors over the system of SDN. However, the more common ones are SDN are attacks over the architecture layers. The following are the attacks anticipated on the layers of the SDN. Attacks over Data Plane Layer Usually, the target for the network elements is right within the network itself. The attacker can possibly get an unauthorized access, either physically or virtually over the network or even try compromising the host, which is connected to the SDN and try attacking the network elements to disable. It is one kind of DoS (Denial of Service) attack or even could be a fuzzying attack that result to attack over the elements of the network. There are several APIs and protocols of southbound that are used to control for communicating the elements of the network, for communication. Though these protocols are built with own securing methods, to secure the network elements communication, there may be many of these protocols that may not be set in the best secured ways, as these are new. These protocols can be instrumental by the attackers to instantiate new flows into the flow tables of the devices. The can try to spoof the new flows in over to permit traffic of some specific types that are not allowed into the network. If an attacker is successful to initiate a flow that bypasses the steering of the traffic and that helps the traffic to guide through a firewall, the attacker is successful. Then the attacker will be able to steer the traffic in his or her direction and try to leverage the sniff traffic capability and can easily perform MITM (Man in the Middle) attack (Network World, 2014). Attack over Controller Layer SDN controller is an obvious target for attack by the attacker. The target for SDN controller is for several purposes. New flows can be instantiated by spoofing southbound messages or northbound API messages toward the devices of network. When the attacker is successful in doing so from a legitimate controller, then the attacker will get the ability to allow the flow of traffic over SDN according to his or her wish and can easily bypass the policies that are associated and relied over the security. The attacker may also try to DoS of the controller or any similar methods to interrupt or fail the controller. eventually, attack for the resource consumption can be attempted over the controller that would result in extremely slow response to the events of Packet_In or bog it down and it may slow down to send the Packet_Out messages. SDN controllers usually run on Linux operating system. But if SDN is operated on the other and regular operating systems, then the vulnerabilities related to the operating system will be the vulnerabilities of the SDN. Most of the times, deployment of the controllers are done into production with easier and default passwords with no configuration of the security settings. The SDN engineers usually do not want to touch, because of fear of breaking. Eventually, the SDN system is left with vulnerable configuration (Network World, 2014). Attacks at SDN Layer Attacking the northbound protocol security is also a likely and possible vector. SDN controller makes use of many of the northbound APIs. The northbound APIs can use Java, JSON, Python, REST, C and others. If the vulnerable northbound APIs can be leveraged by the attackers, then the control of the SDN controller and so the SDN network would be in control of the attacker. If the SDN controller lacks the security for northbound API in any form, then the attacker could then create SDN policies of own and can gain complete control of the entire environment of the SDN. Usually, REST API uses a default password that is trivial to determine. If the deployment of the SDN does not change the password that is default, then the attacker will be able to create his or her own packets for management interface of the controller and can query the SDN environment configuration and replace with a new own configuration(Network World, 2014). Security framework for one issue Securing the SDN Layer Out-of-Band (OOB) is a protection measure to control the network traffic. This network helps securing the controller management protocols, by using in the southbound and northbound communications. TLS or SSH or similar methods can be used to secure the controller management and northbound communications. Encryption and authenticable methods can be helpful for communication between data requesting services from the controller and applications (Network World, 2014). Presentations Slide 1 SDN Software Defined Network Computer networking approach Allows network managers to manage the network services, by high level functionality abstraction Abstraction done through system decoupling Sends congested traffic to the final destination, with appropriate decisions Protocol Open-Flow Other techniques Slide 2 Advantages (w.r.t. todays dynamic environment) Adaptable Dynamic Manageable Cost-effective Compatible Suitable Slide 3 Openflow Protocl Directly Programmable Centrally Managed Agile Open Standards-based and Vendor-Neutral Programmatically Configured Open Standards-based and Vendor Neutral Slide 4 Need for sdn Dynamically changing patterns of traffic IT Consumerization Cloud Services Incline Big Data and More Bandwidth Slide 5 Architecture Slide 6 Architecture components SDN App SDN Controller SDN Datapath SDN CDPI SDN NBI Slide 7 Security issues Slide 8 Security attacks Attacks over Data Plane Layer Attack over Controller Layer Attacks at SDN Layer Slide 9 Security framework Securing the SDN Layer OOB (Out-of-Band) protection measure References Network World, 2014, Securing SDN Deployments Right from the Start, Network World, viewed 23 May 2016. Bernardo and Chua, 2015,Introduction and Analysis of SDN and NFV Security Architecture (SA-SECA). 29th IEEE AINA. Canini, Marco and Venzano, Daniele and Peresini, Peter and Kostic, Dejan and Rexford, Jennifer; et al. 2012,.A NICE Way to Test OpenFlow Applications. NSDI. Al-Shaer, Ehab and Al-Haj, Saeed, 2010, "FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures".Proceedings of the 3rd ACM workshop on Assurable and usable security configuration Sherwood, Rob and Gibb, Glen and Yap, Kok-Kiong and Appenzeller, Guido and Casado, Martin and McKeown, Nick and Parulkar, Guru 2009. "Flowvisor: A network virtualization layer".OpenFlow Switch Consortium, Tech. Rep. Jafarian, Jafar Haadi and Al-Shaer, Ehab and Duan, Qi, 2012, "Openflow random host mutation: transparent moving target defense using software defined networking".Proceedings of the first workshop on Hot topics in software defined networks Jin, Ruofan and Wang, Bing, 2013, "Malware detection for mobile devices using software-defined networking".Research and Educational Experiment Workshop (GREE), 2013 Second GENI Feamster, Nick, 2010, "Outsourcing home network security".Proceedings of the 2010 ACM SIGCOMM workshop on Home networks Braga, Rodrigo and Mota, Edjard and Passito, Alexandre, 2010, "Lightweight DDoS flooding attack detection using NOX/OpenFlow".Local Computer Networks (LCN), 2010 IEEE 35th Conference on. Benton, Kevin and Camp, L Jean and Small, hris, 2013, "Openflow vulnerability assessment".Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking.

Monday, November 25, 2019

Characteristics and Examples of Stabilizing Selection

Characteristics and Examples of Stabilizing Selection Stabilizing selection in evolution is a type of natural selection that favors the average individuals in a population. It is one of five types of selection processes used in evolution: The others are directional selection (which decreases the genetic variation), diversifying or disruptive selection (which shifts genetic variation to adjust to environmental changes), sexual selection (which defines and adapts to notions of attractive features of the individuals), and artificial selection (which is the deliberate selection by humans, such as that of the processes of animal and plant domestication). Classic examples of traits that resulted from stabilizing selection include human birth weight, number of offspring, camouflage coat color, and cactus spine density. Stabilizing Selection Stabilizing selection is one of three main types of natural selection in evolution. The others are directional and diversifying selection.  Stabilizing selection is the most common of those processes.  The result of stabilizing is the over-representation in a specific trait. For example, the coats of a species of mice in a forest will all be the best color to act as camouflage in their environment.  Other examples include human birth weight, the number of eggs a bird lays, and the density of cactus spines. Stabilizing selection is the most common of these processes, and its responsible for many of the characteristics of plants, humans and other animals. Meaning and Causes of Stabilizing Selection The stabilizing process is one that results statistically in an over-represented norm. In other words, this happens when the selection process- in which certain members of a species survive to reproduce while others do not- winnows out all the behavioral or physical choices down to a single set. In technical terms, stabilizing selection discards the extreme phenotypes and instead favors the majority of the population that is well adapted to their local environment. Stabilizing selection is often shown on a graph as a modified bell curve where the central portion is narrower and taller than the normal bell shape. Polygenic traits tend to result in a distribution that resembles a bell-shaped curve, with few at the extremes and most in the middle. David Remahl/Wikimedia Commons Diversity in a population is decreased due to stabilizing selection- genotypes which are not selected are reduced and can disappear. However, this does not mean that all individuals are exactly the same. Often, mutation rates in DNA within a stabilized population are actually a bit higher statistically than those in other types of populations. This and other kinds of microevolution keep the stabilized population from becoming too homogeneous and allow the population the ability to adapt to future environmental changes. Stabilizing selection works mostly on traits that are polygenic. This means that more than one gene controls the phenotype and so there is a wide range of possible outcomes. Over time, some of the genes that control the characteristic can be turned off or masked by other genes, depending on where the favorable adaptations are coded. Since stabilizing selection favors the middle of the road, a blend of the genes is often what is seen. Examples of Stabilizing Selection There are several classic examples in animals and humans of the results of stabilizing selection process: Human birth weight, especially in underdeveloped countries and in the past of the developed world, is a polygenetic selection which is controlled by environmental factors. Infants with low birth weight will be weak and experience health problems, while large babies will have problems passing through the birth canal. Babies with average birth weight are more likely to survive than a baby that is too small or too large. The intensity of that selection has decreased as medicine has improved- in other words, the definition of average has changed. More babies survive even if they might have been too small in the past (a situation resolved by a few weeks in an incubator) or too large (resolved by Caesarian section).Coat coloration in several animals is tied to their ability to hide from predator attacks. Small animals with coats that match their environments more closely are more likely to survive than those with darker or lighter coats: stabilizing selection results in an average colorati on thats not too dark or too light. Cactus spine density: Cacti have two sets of predators: peccaries which like to eat cactus fruits with fewer spines and parasitic insects which like cacti that have very dense spines to keep their own predators away. Successful, long-lived cacti have an average number of spines to help ward off both.The number of offspring: Many animals produce multiple offspring at once (known as r-selected species). Stabilizing selection results in an average number of offspring, which is an average between too many (when there is a danger of malnourishment) and too few (when the chance of no survivors is highest). Sources Cattelan, Silvia, Andrea Di Nisio, and Andrea Pilastro. Stabilizing Selection on Sperm Number Revealed by Artificial Selection and Experimental Evolution. Evolution 72.3 (2018): 698-706. Print.Hansen, Thomas F. Stabilizing Selection and the Comparative Analysis of Adaptation. Evolution 51.5 (1997): 1341-51. Print.Sanjak, Jaleal S., et al. Evidence of Directional and Stabilizing Selection in Contemporary Humans. Proceedings of the National Academy of Sciences 115.1 (2018): 151-56. Print.

Thursday, November 21, 2019

Civil Litigation Course work Essay Example | Topics and Well Written Essays - 3000 words

Civil Litigation Course work - Essay Example Scott was driving on. He rammed into Mr. Scott’s vehicle on the passenger’s side. According to the police reports, Mr. Marshall was not wearing a helmet as per the traffic regulations. Mr. Scott on the other hand though drunk, his status was not beyond the legal alcohol limit. However, he was charged and found guilty of a traffic offence as he was talking over the phone while driving contrary to section 3 of the Road Traffic Act. Mr. Marshall sued Mr. Scott for the injuries sustained. The aim of this report to is determine if Mr. Scott is liable to pay damages to Mr. Marshall and what possible defenses he could actually rely on to escape liability. 3 Issues and Law 3 The first issue that arises in this case is the need to determine whether Mr. Scott is guilty of careless driving under section 3 of the Road Traffic Act and if this would necessarily prejudice his civil liability. In this regard, the proceedings under Road Traffic Act do not prejudice his civil case. Accor ding to Keenan (2011, p. 53), the outcome of a criminal action does not affect the outcome of civil case. The next issue in this case is the issue of liability. The question is whether Mr. Scott was liable to pay any damages to Mr. Marshall for the injuries sustained. Sustaining injuries in an accident does not give one an automatic right to recover damages. The question to be determined is which party was liable for the accident. One party may be fully liable or both parties might be liable meaning that each party is partially liable. The person claiming damages for personal injury after a motor vehicle accident has to prove that the other party was negligent. This means that Mr. Marshall has to prove beyond reasonable doubt that whatever damage that resulted from the accident was wholly or partially the fault of Mr. Scott. 4 In this case, one of the initial things to be determined is whether Scott was negligent. Under the law of torts, Howarth (2006, p. 147) indicates that a perso n is negligent when he or she is in breach of the legal duty of care that brings damage to the claimant. Negligence as per Alderson B in the case of Blyth v Birmingham Water Works constitutes omission by a reasonable person who guided by ordinary consideration fails to do something and as a result causes injury to another person. The same principle of the tort of negligence applies to the motor vehicle accident. Liability in this respect is determined on the basis of the negligent party. Under the law of torts, there are three requirements that need to be fulfilled. The first requirement that needs to be fulfilled for a claim to succeed is that the party claiming negligence needs to establish a duty of care (Smith, 1983, p. 44). 4 In light of the case, Marshall needs to establish that Scott owed him a duty of care. As a general rule, any one driving on a public road has a duty to the public and where one chooses to drive, they should be able to control the motor vehicle so that it d oes not harm other people. In the instant case, Mr. Scott by virtue of driving on a public road had a duty to control it to ensure that any person on the same road was not hurt. Even if it was the fault of the other party Mr. Scott should have taken all the reasonable measure to control the happening of the accident. This is to his disadvantage. However the other party too being a public road user is burdened with the same duty of care to ensure that he controls the motor

Wednesday, November 20, 2019

Attend a live concert( this year) and report on it. You must include Essay

Attend a live concert( this year) and report on it. You must include proof of your attendance - Essay Example Record responses to the performances in the concert. What was good or bad and what made it so? Be specific. If it was a group concert, how did the performers work as an ensemble? ?What kinds of themes, messages or ideas came across to you in the concert? What did the experience cause you to think about or feel? ?Comment on the visual impact of the concert: setting, lights, concert dress, movement. How did these add to or detract from the mood and power of the music? What did you notice about audience behavior? (500 words) The date of the concert is on Monday, March 28th, 2011, at 8 p.m. PDT. The location of the concert is at the Staples Center in Los Angeles, California. The performer was Lady GaGa. I loved this performance. It was dynamic, fun, engaging, and it was everything I was hoping for in a concert. The general style of the music was poppy (a la pop music similar to something that Madonna, JLo, Mariah Carey, or Britney Spears might put out). There were some cultural implicati ons that were related to the work done in class. I realized how much our society has become so highly sexualized. That is definitely apparent in the music of Lady GaGa. Her music is soaked with sexual innuendo. Her show just reeks of sultry seductiveness. She has the allure of a porn star and the stage presence of a pole dancer. No one can ignore Lady GaGa’s amazing power which draws you in, like a tide drawn to the Supermoon.

Monday, November 18, 2019

Competitive Advantage Case Study Example | Topics and Well Written Essays - 2000 words

Competitive Advantage - Case Study Example This paper will compare and contrast the competitive advantages of renowned engine manufacturer Rolls-Royce Plc (Rolls-Royce) and retail store giant Tesco Plc (Tesco). Traditionally, the competitive advantage business organizations can be fully identified by conducting a value chain analysis. However, recognizing the numerous changes in the businesses' market environment, this paper will also complement value chain analysis with a method introduced by Shawn Cartwright, the value web analysis. It should be noted that this tool brings into consideration the analysis of competitive advantage of dotcoms or firms whose operations are conducted online or whose brick and mortar strategies are complemented by online presence (Cartwright and Oliver 2000). This report will be organized as follows. The first section will take a look at the operations of Rolls-Royce Plc. A brief organizational profile will be presented together with the company's identified core competencies. The paper will then evaluate Rolls-Royce's competitive advantage in light of the value chain and the value web analysis. The second section will also evaluate Tesco Plc in the same manner. This paper will conclude with a comparison and contrast of the previously identified competitive advantages. Rolls-Royce is currently the world's second largest airline engine manufacturer beh... Aside from aero-engine, the company is also involved in other industries like defence, marine, and energy markets. The business organization traces its origin in 1971 and was founded by Henry Royce and CS Rolls. With its humble beginning, it has now ascended in the global business marketplace with its cutting edge technology and diverse product offerings. The company is not just a provider of high-quality products but also offers unmatched after sales service to its clients. Its market base spans over 120 countries around the globe, becoming a significant supplier of engine to important customers worldwide. Also, in order to complement its product, Rolls-Royce has established online presence through Aeromanager in offering aftermarket services. 2.1 Core Competencies The success of Rolls-Royce in the global aero-engine industry is attributed to its core competencies. A core competence, according to Prahalad and Hamel (1990) is something that a firm can do well and meet three specific conditions: "it provides customer benefit; it is hard for competitors to imitate; and it can be leveraged widely to many products and market." A company's core competencies are the capabilities which the company needs in order to build a competitive advantage. In the case of Rolls-Royce, its core competency is apparently in the production of engine. It should be noted that the expertise of the business organization in the creation of aero-engine is applied to a wide range of industries where it operates such as defence, marine, and energy. With the company's expertise in the production of a single product engine, Rolls-Royce, with its technological is able to transform this engine into one which can be used in other industries. It should be noted that all the end

Saturday, November 16, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit