Monday, November 25, 2019

Characteristics and Examples of Stabilizing Selection

Characteristics and Examples of Stabilizing Selection Stabilizing selection in evolution is a type of natural selection that favors the average individuals in a population. It is one of five types of selection processes used in evolution: The others are directional selection (which decreases the genetic variation), diversifying or disruptive selection (which shifts genetic variation to adjust to environmental changes), sexual selection (which defines and adapts to notions of attractive features of the individuals), and artificial selection (which is the deliberate selection by humans, such as that of the processes of animal and plant domestication). Classic examples of traits that resulted from stabilizing selection include human birth weight, number of offspring, camouflage coat color, and cactus spine density. Stabilizing Selection Stabilizing selection is one of three main types of natural selection in evolution. The others are directional and diversifying selection.  Stabilizing selection is the most common of those processes.  The result of stabilizing is the over-representation in a specific trait. For example, the coats of a species of mice in a forest will all be the best color to act as camouflage in their environment.  Other examples include human birth weight, the number of eggs a bird lays, and the density of cactus spines. Stabilizing selection is the most common of these processes, and its responsible for many of the characteristics of plants, humans and other animals. Meaning and Causes of Stabilizing Selection The stabilizing process is one that results statistically in an over-represented norm. In other words, this happens when the selection process- in which certain members of a species survive to reproduce while others do not- winnows out all the behavioral or physical choices down to a single set. In technical terms, stabilizing selection discards the extreme phenotypes and instead favors the majority of the population that is well adapted to their local environment. Stabilizing selection is often shown on a graph as a modified bell curve where the central portion is narrower and taller than the normal bell shape. Polygenic traits tend to result in a distribution that resembles a bell-shaped curve, with few at the extremes and most in the middle. David Remahl/Wikimedia Commons Diversity in a population is decreased due to stabilizing selection- genotypes which are not selected are reduced and can disappear. However, this does not mean that all individuals are exactly the same. Often, mutation rates in DNA within a stabilized population are actually a bit higher statistically than those in other types of populations. This and other kinds of microevolution keep the stabilized population from becoming too homogeneous and allow the population the ability to adapt to future environmental changes. Stabilizing selection works mostly on traits that are polygenic. This means that more than one gene controls the phenotype and so there is a wide range of possible outcomes. Over time, some of the genes that control the characteristic can be turned off or masked by other genes, depending on where the favorable adaptations are coded. Since stabilizing selection favors the middle of the road, a blend of the genes is often what is seen. Examples of Stabilizing Selection There are several classic examples in animals and humans of the results of stabilizing selection process: Human birth weight, especially in underdeveloped countries and in the past of the developed world, is a polygenetic selection which is controlled by environmental factors. Infants with low birth weight will be weak and experience health problems, while large babies will have problems passing through the birth canal. Babies with average birth weight are more likely to survive than a baby that is too small or too large. The intensity of that selection has decreased as medicine has improved- in other words, the definition of average has changed. More babies survive even if they might have been too small in the past (a situation resolved by a few weeks in an incubator) or too large (resolved by Caesarian section).Coat coloration in several animals is tied to their ability to hide from predator attacks. Small animals with coats that match their environments more closely are more likely to survive than those with darker or lighter coats: stabilizing selection results in an average colorati on thats not too dark or too light. Cactus spine density: Cacti have two sets of predators: peccaries which like to eat cactus fruits with fewer spines and parasitic insects which like cacti that have very dense spines to keep their own predators away. Successful, long-lived cacti have an average number of spines to help ward off both.The number of offspring: Many animals produce multiple offspring at once (known as r-selected species). Stabilizing selection results in an average number of offspring, which is an average between too many (when there is a danger of malnourishment) and too few (when the chance of no survivors is highest). Sources Cattelan, Silvia, Andrea Di Nisio, and Andrea Pilastro. Stabilizing Selection on Sperm Number Revealed by Artificial Selection and Experimental Evolution. Evolution 72.3 (2018): 698-706. Print.Hansen, Thomas F. Stabilizing Selection and the Comparative Analysis of Adaptation. Evolution 51.5 (1997): 1341-51. Print.Sanjak, Jaleal S., et al. Evidence of Directional and Stabilizing Selection in Contemporary Humans. Proceedings of the National Academy of Sciences 115.1 (2018): 151-56. Print.

Thursday, November 21, 2019

Civil Litigation Course work Essay Example | Topics and Well Written Essays - 3000 words

Civil Litigation Course work - Essay Example Scott was driving on. He rammed into Mr. Scott’s vehicle on the passenger’s side. According to the police reports, Mr. Marshall was not wearing a helmet as per the traffic regulations. Mr. Scott on the other hand though drunk, his status was not beyond the legal alcohol limit. However, he was charged and found guilty of a traffic offence as he was talking over the phone while driving contrary to section 3 of the Road Traffic Act. Mr. Marshall sued Mr. Scott for the injuries sustained. The aim of this report to is determine if Mr. Scott is liable to pay damages to Mr. Marshall and what possible defenses he could actually rely on to escape liability. 3 Issues and Law 3 The first issue that arises in this case is the need to determine whether Mr. Scott is guilty of careless driving under section 3 of the Road Traffic Act and if this would necessarily prejudice his civil liability. In this regard, the proceedings under Road Traffic Act do not prejudice his civil case. Accor ding to Keenan (2011, p. 53), the outcome of a criminal action does not affect the outcome of civil case. The next issue in this case is the issue of liability. The question is whether Mr. Scott was liable to pay any damages to Mr. Marshall for the injuries sustained. Sustaining injuries in an accident does not give one an automatic right to recover damages. The question to be determined is which party was liable for the accident. One party may be fully liable or both parties might be liable meaning that each party is partially liable. The person claiming damages for personal injury after a motor vehicle accident has to prove that the other party was negligent. This means that Mr. Marshall has to prove beyond reasonable doubt that whatever damage that resulted from the accident was wholly or partially the fault of Mr. Scott. 4 In this case, one of the initial things to be determined is whether Scott was negligent. Under the law of torts, Howarth (2006, p. 147) indicates that a perso n is negligent when he or she is in breach of the legal duty of care that brings damage to the claimant. Negligence as per Alderson B in the case of Blyth v Birmingham Water Works constitutes omission by a reasonable person who guided by ordinary consideration fails to do something and as a result causes injury to another person. The same principle of the tort of negligence applies to the motor vehicle accident. Liability in this respect is determined on the basis of the negligent party. Under the law of torts, there are three requirements that need to be fulfilled. The first requirement that needs to be fulfilled for a claim to succeed is that the party claiming negligence needs to establish a duty of care (Smith, 1983, p. 44). 4 In light of the case, Marshall needs to establish that Scott owed him a duty of care. As a general rule, any one driving on a public road has a duty to the public and where one chooses to drive, they should be able to control the motor vehicle so that it d oes not harm other people. In the instant case, Mr. Scott by virtue of driving on a public road had a duty to control it to ensure that any person on the same road was not hurt. Even if it was the fault of the other party Mr. Scott should have taken all the reasonable measure to control the happening of the accident. This is to his disadvantage. However the other party too being a public road user is burdened with the same duty of care to ensure that he controls the motor

Wednesday, November 20, 2019

Attend a live concert( this year) and report on it. You must include Essay

Attend a live concert( this year) and report on it. You must include proof of your attendance - Essay Example Record responses to the performances in the concert. What was good or bad and what made it so? Be specific. If it was a group concert, how did the performers work as an ensemble? ?What kinds of themes, messages or ideas came across to you in the concert? What did the experience cause you to think about or feel? ?Comment on the visual impact of the concert: setting, lights, concert dress, movement. How did these add to or detract from the mood and power of the music? What did you notice about audience behavior? (500 words) The date of the concert is on Monday, March 28th, 2011, at 8 p.m. PDT. The location of the concert is at the Staples Center in Los Angeles, California. The performer was Lady GaGa. I loved this performance. It was dynamic, fun, engaging, and it was everything I was hoping for in a concert. The general style of the music was poppy (a la pop music similar to something that Madonna, JLo, Mariah Carey, or Britney Spears might put out). There were some cultural implicati ons that were related to the work done in class. I realized how much our society has become so highly sexualized. That is definitely apparent in the music of Lady GaGa. Her music is soaked with sexual innuendo. Her show just reeks of sultry seductiveness. She has the allure of a porn star and the stage presence of a pole dancer. No one can ignore Lady GaGa’s amazing power which draws you in, like a tide drawn to the Supermoon.

Monday, November 18, 2019

Competitive Advantage Case Study Example | Topics and Well Written Essays - 2000 words

Competitive Advantage - Case Study Example This paper will compare and contrast the competitive advantages of renowned engine manufacturer Rolls-Royce Plc (Rolls-Royce) and retail store giant Tesco Plc (Tesco). Traditionally, the competitive advantage business organizations can be fully identified by conducting a value chain analysis. However, recognizing the numerous changes in the businesses' market environment, this paper will also complement value chain analysis with a method introduced by Shawn Cartwright, the value web analysis. It should be noted that this tool brings into consideration the analysis of competitive advantage of dotcoms or firms whose operations are conducted online or whose brick and mortar strategies are complemented by online presence (Cartwright and Oliver 2000). This report will be organized as follows. The first section will take a look at the operations of Rolls-Royce Plc. A brief organizational profile will be presented together with the company's identified core competencies. The paper will then evaluate Rolls-Royce's competitive advantage in light of the value chain and the value web analysis. The second section will also evaluate Tesco Plc in the same manner. This paper will conclude with a comparison and contrast of the previously identified competitive advantages. Rolls-Royce is currently the world's second largest airline engine manufacturer beh... Aside from aero-engine, the company is also involved in other industries like defence, marine, and energy markets. The business organization traces its origin in 1971 and was founded by Henry Royce and CS Rolls. With its humble beginning, it has now ascended in the global business marketplace with its cutting edge technology and diverse product offerings. The company is not just a provider of high-quality products but also offers unmatched after sales service to its clients. Its market base spans over 120 countries around the globe, becoming a significant supplier of engine to important customers worldwide. Also, in order to complement its product, Rolls-Royce has established online presence through Aeromanager in offering aftermarket services. 2.1 Core Competencies The success of Rolls-Royce in the global aero-engine industry is attributed to its core competencies. A core competence, according to Prahalad and Hamel (1990) is something that a firm can do well and meet three specific conditions: "it provides customer benefit; it is hard for competitors to imitate; and it can be leveraged widely to many products and market." A company's core competencies are the capabilities which the company needs in order to build a competitive advantage. In the case of Rolls-Royce, its core competency is apparently in the production of engine. It should be noted that the expertise of the business organization in the creation of aero-engine is applied to a wide range of industries where it operates such as defence, marine, and energy. With the company's expertise in the production of a single product engine, Rolls-Royce, with its technological is able to transform this engine into one which can be used in other industries. It should be noted that all the end

Saturday, November 16, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit

Wednesday, November 13, 2019

We Can Stop Global Warming Essay -- Climate Change, 2015

As human beings begin life in the 21st century, the possibilities seem endless. The technological advancements of the past few centuries have rid us of many of the problems that once plagued our species, including deadly diseases and wide spread famine in many places, yet it is all of our technology that may ultimately prove to be our undoing. The byproducts of the modern, technology-driven world are carbon dioxide and other greenhouse gases, and they are the leading cause of the current global warming crisis. The U.N. scientific panel of 2007 concluded that the evidence of global warming is  unequivocal.. Also, in agreement with the Intergovernmental Panel on Climate Change (IPCC), the U.N. scientific panel supports the claim that humanity is playing a role in the warming (New York Times). The evidence is all around and irrefutable; the Earth is warming: the only question that remains is what to do about it. America is a world leader, and so far we have done too little of signifi cance to mitigate this problem; it is up to the American people, as a concerned public and electorate, to bring about the changes necessary to spare the planet from global warming's potentially disastrous consequences. While many Americans do not fully understand global warming, or the processes behind it, we all notice changes that are occurring in the environment around us. Hotter summers, shorter winters, less snowfall, and changes in plant cycles are just a few of the climatic changes being caused by increased atmospheric temperatures: the result of greenhouse gases being emitted by human beings, also known as global warming (EPA). While the Earth does go through natural cycles of warmer and cooler weather, the current warming trend is different. The... ...hope that with determination the American people, through political and personal responsibility, can steer our nation on a better course, and avoid global warming's terrible consequences. Works Cited Environmental Protection Agency. 2015. United States of America. 2 April 2015. . National Oceanic and Atmospheric Administration. 2015. United States of America. 1 April 2015. . Natural Resources Defense Council. 2015. Issues: Global Warming. 7 April 2015. . The New York Times. March 8th 2015. Science Topics. 1 April 2015. . The White House. 2015. Energy and Environment. 9 April 2015.

Monday, November 11, 2019

With wind power technologies

AbstractionWith wind power engineerings deriving rapid impulse particularly offshore wind farm engineering, assorted issues affecting internal and external electrical connexion of offshore air current turbines to the grid arise. This literature reappraisal presents a survey of past researches refering offshore wind farm engineering and high spots wind farm connexion issues. Section 1 presents the debut of the subject followed by an overview of offshore air current farms in Section 2. Following, types of generators used are discussed in Section 3. Section 4 and 5 nowadayss the nucleus of the research, detailing transmittal and interconnectedness of offshore air current farms utilizing both AC and DC severally. Finally the last subdivision concludes the reappraisal.Section OneIntroductionWind power coevals has been on the rise as of late [ 1 ] . USA late took over Germany as the current universe ‘s leader of air current power capacity [ 2 ] , using air current energy as an option of electricity coevals. European states are preponderantly inclined towards wind power in add-on to Asiatic states such as China and India, which are amongst the top air current power manufacturers [ 2 ] . There is a bound to onshore air current farm connexion nevertheless, due to set down bounds and with the huge potency of air current harvest home from the seas and less obstructor compared to onshore air currents [ 3 ] , it is merely evident that the following logical measure is to travel into offshore wind farms. Furthermore, with changeless power produced from the changeless air current velocity of the sea [ 1 ] , and the possible combination of moving ridge and tidal power [ 4 ] , chances of offshore air current farms are promoting. Installations of offshore air current farms are non fiddling, as many factors and concerns are taken into history over the substructure and layout. The unsmooth hostile environment of the sea gives rather a challenge for installing and transmittal to the grid and it is a critical concern. Overall, there are several electrical challenges sing offshore air current farms in contrast to the mechanical challenges that has well reduced over the past decennary [ 1 ] . A major challenge sing offshore air current farms would be its transmittal from generator to the grid [ 5 ] . The conventional AC transmittals provide restrictions as offshore air current farms move farther off from the shore. These restrictions will be studied and possible solutions are to be recommended. This literature reappraisal presents an overview of grid connexion of offshore air current turbines, diging into types of generators used, every bit good as air current farm interconnectedness, transmittals of power to onshore grid and reappraisals of jobs related.Section TwoGeneral Overview of Offshore Wind FarmsWind farms are considered offshore if they are at least 30km from the seashore [ 6 ] . Presently, the biggest offshore air current farms has a capacity of up to 200MW [ 7 ] , with each turbines bring forthing 2-3MW. Offshore air current farms are dearly-won ( 30-60 % higher [ 4 ] ) than onshore due to the larger, higher rated power of turbines, undersea connexions and overall cost of installing and care [ 3 ] . Harmonizing to Reference [ 3 ] , air current farms have electrical subsystems which consist of:Internal medium-voltage ( MV ) grid for aggregation of power produced by single generators ;Offshore electrical substructure for transit of power to the shore ;Onshore system which link the farm to HV webs.The power produced by each air current turbine is collected via the internal MV grids utilizing either radial or pealing connected design [ 3 ] . Radial design, being the cheapest pick, uses a individual overseas telegram feeder that is connected to the turbines in contrast to the ring connected web where cabling and exchanging output higher costs. Radial design suffer from low dependability, though it can be improved by forking the radial feeders [ 3 ] . Depending on air current farm size and distance from shore, every bit good as environmental restriction, [ 3 ] nowadayss two strategies of electrical substructures for transporting power to the shore. Scheme 1 utilizations an seaward substation incorporating switchgears and transformers [ 8 ] , which step up electromotive forces and transmit it utilizing HV overseas telegrams, while Scheme 2 utilizations undersea MV overseas telegrams [ 3 ] . The defined point of common yoke ( PCC ) is where the offshore air current farm connects to the grid [ 3 ] . If an offshore substation is present beforehand ( Scheme 1 ) , the HV overseas telegrams are connected straight to the grid but if MV overseas telegrams are used for transmittal ( Scheme 2 ) , so an onshore step-up transformer is required with HV overseas telegrams before being fed to the grid [ 3 ] . Figure 1 below shows the two different electrical system strategies. Figure 1: Wind farm electrical system schemes [ 3 ] Offshore substation is normally required for electromotive forces above 33kv [ 9 ] and is costlier due to dearly-won indoor equipment and environmental protection [ 9 ] but contributes to take down power losingss and simpler electromotive force control [ 3 ] .Section ThreeWind Turbines and GeneratorsDifferent types of air current generators have been designed and manufactured within the past two decennaries, to provide to the demands of planetary air current power capacity every bit good as the turning development of air current power engineering [ 10 ] . These wind generators are designed to back up and manage mistakes on the grid [ 7 ] . There are assorted types of generators for air current turbines and they are categorized harmonizing to synchronal or initiation type generators.3.1 Synchronous GeneratorsThe power convertor in Figure 2 refers to a rectifier, with constellation a being stator connected and the remainder being rotor connected [ 11 ] .3.2 Initiation GeneratorsAs for initiation generators, typical constellations for air current farms are shown in Figure 3 below For constellation a, the power convertor is a soft starting motor whereas for constellation B and vitamin D, it refers to a frequence convertor. Configuration degree Celsius has an external variable rotor opposition [ 11 ] .3.3 Fixed Speed and Variable Speed Wind TurbinesIn conventional systems, fixed velocity air current turbines are used in order to accomplish equal frequence of the grid and the electrical end product [ 6 ] . However, variable velocity air current turbines are has an advantage over fixed velocity air current turbines due to holding advanced power electronic constituents and good control for grid support. Fixed velocity turbines are by and large cheaper, simple and robust and Reference [ 7 ] presented a new control method to get the better of the restrictions and believes that the fixed velocity turbines will be popular once more if betterments are made over its grid support. Fixed velocity or variable velocity air current turbine design relies to a great extent on an optimal rotational velocity expressed by a factor called tip-speed ratio [ 6, 12 ] Wind turbines will work under certain tip-speed ratio for the coveted turbine efficiency. In Figure 4, a typical graph demoing the relation of air current turbine efficiency and tip-speed ratio is shown. Mentioning to the graph, accomplishing 47 % efficiency requires the air current turbine to hold a tip-speed ratio of 8 [ 13 ] . Figure 4: Example relation between air current turbine efficiency and tip-speed ratio [ 13 ]3.4 Fixed Speed GeneratorsFixed Speed Synchronous GeneratorsFixed velocity synchronal generators produce end product frequence based on the turbine ‘s rotational frequence ; which implies that it is synchronized with the generator ‘s shaft velocity [ 6 ] . These machines can bring forth electricity by itself without the grid ‘s power, so in instance of care or fix plants, isolation of the generators must be implemented [ 6 ] for safety grounds.Fixed Speed Induction GeneratorsInitiation generators are normally used for fixed velocity turbines, particularly squirrel-cage type generators and they connect straight to the AC grid without the demand for frequence convertors [ 13 ] . Reference [ 6 ] provinces that the grid ‘s excitement controls the frequence of the generator ‘s end product. When air current velocities go above the rated velocity threshold ( shutdown or roll uping wind velocity [ 5 ] ) of normally 25/ , the end product power is constrained by natural stall or active pitching of turbine blades and if that fails, the turbine is so stopped. For improved turbine efficiency, fixed wind generators can exchange between pole yokes to run at two different velocities [ 13 ] . This characteristic is to let low air currents velocity to hold better efficiency. Initiation generators are favoured for their low cost and isolation for care plants is non required compared to the synchronal generators, due to its inability to bring forth electricity when the grid ‘s power is cut off. However, initiation generators have a disadvantage of that it consumes reactive power from the grid, though including capacitances between the generator and the grid could counterpoise the job [ 6 ] [ 13 ] . Initiation generators besides require a cut-off system to avoid it moving as a motor when air current speeds lessenings.3.5 Variable Speed GeneratorsThrough variable velocity generators, we can do the rotor to run at a fixed tip-speed ratio over changing air current velocities to obtain maximal efficiency [ 13 ] . This is achieved by utilizing frequence convertors or commanding the rotor ‘s faux pas [ 13 ] . The former method licenses wider velocity scope. Reference [ 10 ] has made a comparing survey on seven variable velocity changeless frequence ( VSCF ) air current generators dwelling of both synchronal and induction generators. The initiation generators studied specifically are double fed initiation generators ( DFIG ) and VSCF squirrel coop initiation generators ( SCIG ) , whereas the synchronal generator types were lasting magnet synchronal generators ( PMSG ) and electrically excited synchronal generator ( EESG ) [ 10 ] . Both of the synchronal generators are direct driven in contrast to the geared goaded initiation generators. Based on the comparing consequences, the geared driven double fed initiation generators ( DFIG ) emerged as the most appealing due to its high one-year energy production ( AEP ) per cost and lowest generator system cost and it is recommended for big power evaluation use [ 10 ] .Doubly Fed Induction Generator ( DFIG )This lesion rotor machine can work as a variable-speed generator through debut of variable electromotive forces into its rotor at slip frequence [ 14 ] . The variable velocity is deter mined by the two IGBT based electromotive force beginning convertors ‘ evaluations and it is through these convertors that the rotor get the variable electromotive forces [ 14 ] .Section FourOffshore Wind Farm AC TransmissionAC transmittal is a good developed engineering [ 15 ] and soon used in most air current farms [ 16 ] . For offshore air current farms that are below 100km distance from shore and less than 150MW capacity, high electromotive force AC ( HVAC ) transmittal is a favoured pick for being the most economical method [ 17 ] . AC transmittal has the advantages of [ 16 ] :Simpler installing, care and interconnectednessCost effectualOperational consistenceAC links are non used for longer distances due to high electrical capacity and bring forth reactive currents [ 15 ] . This implies bigger reactive power due to the bear downing currents produced as overseas telegrams become longer and reactive power compensators are needed [ 5 ] [ 15 ] . AC transmittal loses its economic entreaty when active current is less than the bear downing current [ 15 ] . The transporting burden current capacity of the AC overseas telegrams is reduced because the overseas telegrams must physically transport both burden and bear downing currents at the same clip [ 16 ] . Reference [ 16 ] shows that bear downing current is expressed by =2F where F is frequence, is electrical capacity and is electromotive force ; and the relation of current capacity is 2= 2+2, where is the overseas telegram current capacity and is load current. Based on look, utilizing DC outputs =0 at steady province [ 16 ] , which shows the advantage of DC holding higher transporting load current capacity. Besides bear downing currents, AC cables besides experience power losingss ( 2 ) [ 16 ] and there are bounds to a figure of AC overseas telegrams that can be installed due to the environment [ 18 ] .Section FiveOffshore Wind Farm DC Transmission5.1 HVDC LinksConventionally, offshore wind farms are connected to the grid via AC transmittal as antecedently stated. Latest developments nevertheless, have suggested that AC links are to be substituted with a District of Columbia transmittal system. Typically used for far wind farms of more than 60km, HVDC links are non limited by the length of transmittal and therefore will be a executable and economical option when air current farms are larger and further off from shore compared to AC links [ 1 ] . HVDC transmittal is associated with variable velocity air current turbines due to the ability t o command the frequence of air current turbine grids and is independent of the power system frequence [ 11 ] . Reference [ 19 ] has stated the list of advantages of HVDC compared to HVAC, based on Reference [ 8 ] , which are:Independence of directing and having frequences every bit good as isolation of system from other webs.The distance of HVDC transmittal are unaffected by overseas telegram bear downing current.HVDC overseas telegrams are capable of higher transmittal capacity.Power losingss on overseas telegram are low.Controllability of power flow.5.2 Wind Farm AC Grid ConfigurationThe simplest DC grid connexion for air current farms is by feeding the AC grid air current turbines into a power convertor and linking it to the AC grid utilizing HVDC links. The figure below illustrates this. Figure 5: Group connexion of a air current farm to an HVDC nexus [ 11 ] The benefits of this constellation is that sum of power convertors are lessened compared to DC grid constellation, but they supply reactive power to the air current farm, enabling it to defy grid mistakes [ 11 ] .5.3 Wind Farm DC Grid ConfigurationAn alternate method is to hold each turbines have their ain rectifier such as Figure 6. Figure 6: Individual connexion of air current turbines to HVDC links [ 11 ] Compared to AC grid constellation, DC grid enables control of frequence and velocity of each single turbines [ 11 ] . Reference [ 1 ] explains the working of an DC grid air current farm in more item. Figure 7: Example of DC grid [ 1 ] Mentioning to Figure 7, the electromotive force from the air current generators is first rectified, gathered and so transferred to an offshore platform where the electromotive force is stepped up well by a DC/DC convertor, or else the system will endure high losingss during transmittal [ 1 ] . Power is so transmitted through a District of Columbia overseas telegram, connected to an inverter onshore and finally fed into the grid.5.4 Line Commutated Control ( LCC ) HVDC utilizing ThyristorsLCC transmittal require commuting electromotive force which is conventionally supplied through a normal or a inactive ( STATCOM ) type synchronal compensator [ 19 ] . The advantages of LCC systems in seaward air current farms are [ 19 ] :LCC transmittal can be used for high capacity power, making 1600MW nexus compared to VSC transmittals, which reach 300MW [ 17 ] .Over 30 old ages of development in LCC engineeringThe convertor station for an LCC system is twice the size in contrast to a VSC system du e to the switchgears and breaker- switched AC harmonic filters necessitating much infinite.LCC systems have lower power losingss compared to VSC systems.5.5 Voltage Source Converter ( VSC ) HVDC utilizing IGBTsBesides conventional LCC transmittal, another engineering is the electromotive force beginning convertor ( VSC ) transmittal utilizing IGBTs. The electromotive forces beginning comes from capacitances [ 20 ] . The advantages of VSC transmittals used in air current farms are [ 19 ] :VSC systems are self-commutating and external electromotive force beginning is non required for operation.Reactive power control does non necessitate switchable AC harmonic filters and is independent of active power control.The power reactive power flow is independently controlled, doing AC electromotive forces from each terminal controllable.5.6 HVDC and HVAC CombinationNot all offshore air current farms are built in it ‘s wholly. They are normally built in stages. For such state of affairss, Reference [ 21 ] recommends transmission combination of HVAC and HVDC. Preliminary stages of building of air current farms can use AC connexion due to the initial little graduated table and subsequently utilizing HVDC connexion as the air current farm ‘s scale expands [ 21 ] .Section SixDecisionOverview of offshore air current farms has been presented in this literature reappraisal. Different topologies and internal grid connexions are outlined. Furthermore, we have looked into applications of synchronal and initiation generators used in air current turbines and explored the difference between fixed velocity and variable velocity generators, which are indispensable in air current turbines in regard to generated end product power. Finally, a general sum-up of the transmittal methods for offshore wind farms were documented, traveling into specific AC transmittal drawbacks and the emerging tendency of HVDC transmittals. Based on the generalised apprehension of the air current farms, we aim to further analyze the jobs of its connexion, with respects to the air current farm ‘s internal grid and AC transmittal to the chief grid. Comparisons between internal DC and AC grid of air current farms will besides be studied. Power flow surveies and simulations will be conducted and aimed at bring forthing new recommendations and solutions.MentionsC. Meyer, et al. , â€Å" Control and Design of DC Grids for Offshore Wind Farms, † Industry Applications, IEEE Transactions on, vol. 43, pp. 1475-1482, 2007.G. W. E. Council, â€Å" Global Installed Wind Power Capacity ( MW ) – Regional Distribution, † 2008.M. Dicorato, et al. , â€Å" Critical issues in big offshore air current farm design and operation, † in Clean Electrical Power, 2009 International Conference on, 2009, pp. 471-478.M. Nandigam and S. K. Dhali, â€Å" Optimal design of an offshore air current farm layout, † in Power Electronics, Electrical Drives, Automation and Motion, 2008. SPEEDAM 2008. International Symposium on, 2008, pp. 1470-1474.J. Machowski, et al. , Power System Dynamics: Stability and Control, Second Edition erectile dysfunction. : John Wiley & A ; Sons, Ltd, 2008.J. Twidell, A Guide to Small Wind Energy Conversion Systems: Cambridge University Press, 1987.D. H. Anca, et al. , â€Å" Grid support of a air current farm with active stall air current turbines and AC grid connexion, † Wind Energy, vol. 9, pp. 341-359, 2006.N. M. Kirby, et al. , â€Å" HVDC transmittal for big offshore air current farms, † Power Engineering Journal, vol. 16, pp. 135-141, 2002.W.Grainger and N.Jenkins, â€Å" Offshore Wind Farm Electrical Connection Options. †L. Hui and C. Zhe, â€Å" Design optimisation and rating of different air current generator systems, † in Electrical Machines and Systems, 2008. ICEMS 2008. International Conference on, 2008, pp. 2396-2401.L. H. L. H. Hansen, F. Blaabjerg, E. Ritchie, S. Munk-Nielsen, H. Bindner, P. S & A ; oslash ; rensen, B. Bak-Jensen, â€Å" Conceptual study of Generators and Power Electronics for Wind Turbines, † 2001.S. Heier, Grid Integration of Wind Energy Conversion Systems, Second erectile dysfunction. : John Wiley & A ; Sons, Ltd, 2006.T. John Olav Gi & A ; aelig ; ver, â€Å" Using power quality features of air current turbines for measuring impact on electromotive force quality, † Wind Energy, vol. 5, pp. 37-52, 2002.T. John Olav Gi & A ; aelig ; ver, â€Å" Grid Integration of Wind Farms, † Wind Energy, vol. 6, pp. 281-295, 2003.P. Sally D. Wright, et al. , â€Å" Transmission Options for Offshore Wind Farms in the United States, † p. 12, 2002.ESS, â€Å" Appendix 3-C, Transmission Issues for Offshore Wind Farms with Specific Application to Siting of the Proposed Cape Wind Project, † Restrictions of Long Transmission Cables for Offshore Wind Farms 2003.S. Foste r, et al. , â€Å" Control of an LCC HVDC system for linking big offshore air current farms with particular consideration of grid mistake, † Pittsburgh, PA, United provinces, 2008.T. Kenichi, et al. , â€Å" New control for HVDC system connected to big windfarm, † Electrical Engineering in Japan, vol. 166, pp. 31-39, 2009.L. Xu and B. R. Andersen, â€Å" Grid connexion of big offshore air current farms utilizing HVDC, † Wind Energy, vol. 9, pp. 371-382, 2006.E. Spahic and G. Balzer, â€Å" Impact of the VSC HVDC Connection of Large Offshore Wind Farms on Power System Stability and Control, † in Power Tech, 2007 IEEE Lausanne, 2007, pp. 207-212.E. Spahic and G. Balzer, â€Å" Offshore air current farms – VSC-based HVDC connexion, † in Power Tech, 2005 IEEE Russia, 2005, pp. 1-6.

Friday, November 8, 2019

Zeus - Fast Facts About the Olympian God Zeus

Zeus - Fast Facts About the Olympian God Zeus Name: Greek - Zeus; Roman - JupiterParents: Cronus and RheaFoster Parents: Nymphs in Crete; nursed by AmaltheaSiblings: Hestia, Hera, Demeter, Poseidon, Hades, and Zeus. Zeus was the youngest sibling and also the oldest since he was alive before the regurgitation of the gods by Papa Cronus.Mates: (legion:) Aegina, Alcmena, Antiope, Asteria, Boetis, Calliope, Callisto, Calyce, Carme, Danae, Demeter, Dia, Dino, Dione, Cassiopeia, Elare, Electra, Europa, Eurymedusa, Eurynome, Hera, Himalia, Hora, Hybris, Io, Juturna, Laodamia, Leda, Leto, Lysithoe, Maia, Mnemosyne, Niobe, Nemesis, Othris, Pandora, Persephone, Protogenia, Pyrrha, Selene, Semele, Taygete, Themis, Thyia [from Carlos Paradas list]Wives:  Metis, Themis, HeraChildren: legion, including: Moirai, Horae, Muses, Persephone, Dionysus, Heracles, Apollo, Artemis, Ares, Hebe, Hermes, Athena, Aphrodite Role of Zeus For Humans: Zeus was god of the sky, weather, law ​and order. Zeus presides over oaths, hospitality, and suppliants.For Gods: ​Zeus was king of the gods. He was called the father of gods and men. The gods had to obey him.Canonical Olympian?  Yes. Zeus is one of the canonical Olympians. Jupiter Tonans Zeus is the king of the gods in the Greek pantheon. He and his two brothers split the rule of the world, with Hades becoming king of the Underworld, Poseidon, king of the sea, and Zeus, king of the heavens. Zeus is known as Jupiter among the Romans. In art work depicting Zeus, the king of the gods often appears in altered form. He frequently shows up as an eagle, as when he abducted  Ganymede,  or a bull. One of the main attributes of Jupiter (Zeus) was  as  a thunder god. Jupiter/Zeus sometimes takes on the characteristics of a supreme deity. In  Suppliants, of Aeschylus, Zeus is described as: king of kings, of the happy most happy, of the perfect most perfect power, blessed ZeusSup. 522. Zeus is also described by Aeschylus with the following attributes: the universal fatherfather of gods and menthe universal causethe all-seer and all-doerthe all-wise and all-controllingthe just and the executor of justicetrue and incapable of falsehood. Source:  Bibliotheca sacra Volume 16  (1859). Zeus Courting Ganymede Ganymede is known as the cupbearer of the gods. Ganymede had been a mortal prince of Troy when his great beauty caught the eye of Jupiter/Zeus. When Zeus kidnapped the most beautiful of mortals, the Trojan prince Ganymede, from Mt. Ida (where Paris of Troy was later a shepherd and where Zeus had been raised in safety from his father), Zeus paid Ganymedes father with immortal horses. Ganymedes father was King Tros, the eponymous founder of Troy. Ganymede replaced Hebe as cupbearer for the gods after Hercules married her. Galileo discovered the bright moon of Jupiter which we know of as Ganymede. In Greek mythology, Ganymede was made immortal when Zeus took him to Mt. Olympus, so its appropriate that his name should be given to a bright object that is forever in Jupiters orbit. On Ganymede, from  Vergils Aeneid Book V  (Dryden translation): There Ganymede is wrought with living art,Chasing thro Idas groves the trembling hart:Breathless he seems, yet eager to pursue;When from aloft descends, in open view,The bird of Jove, and, sousing on his prey,With crooked talons bears the boy away.In vain, with lifted hands and gazing eyes,His guards behold him soaring thro the skies,And dogs pursue his flight with imitated cries. Zeus and Danae Danae was the mother of the Greek hero Perseus. She became pregnant by Zeus in the form of a beam of sunlight or a shower of gold. Zeus offspring included  Moirai, Horae, Muses, Persephone, Dionysus, Heracles, Apollo, Artemis, Ares, Hebe, Hermes, Athena, and Aphrodite. Sources Carlos Parada - ZeusTheoi Zeus

Wednesday, November 6, 2019

Changes in the Middle East After the World War I

Changes in the Middle East After the World War I Introduction The modern-day Middle East is a caricature of the aftermaths of the First World War. Approximately, twenty autonomous states, which fall under the umbrella of Middle East, still nurse the wound of the historical war (world’s first war). Advertising We will write a custom essay sample on Changes in the Middle East After the World War I specifically for you for only $16.05 $11/page Learn More These countries include Afghanistan, Iraq, Iran, Kuwait, Kyrgyzstan, Lebanon, Pakistan, Bahrain, Oman, United Arab Emirates, Israel, Qatar, Jordan, Turkey, Syria, Saudi Arabia, Turkmenistan and Uzbekistan Egypt and Sudan are still debatable if they belong to Asia or North Africa. During World War I, many nations especially those in the Middle East suffered political instability, social, and economic imbalance. Nevertheless, the First World War spurred the technological development in Middle East nations. After the World War I, most of the countries we re under colonialism; nevertheless, the departure of colonialists spurred civil wars, ethnic wars, boundary disputes, political uprisings, and subsequent economic decline that many of these nations fight to control. Changes in the Middle East after the commencement of World War I Power derangement was the worldwide impact of the First World War and Middle East was no exception. Furthermore, according to political analyst the genesis of the political upheavals in the modern day Middle East dates back in 1914 during the world war (Craig et al, 2009, P.20). The Ottoman Empire an influential political identity in the Middle East, which the Arabians defended, was the main target during the war. Subsequently, after the empire crumbled, the Britain controlled Lebanon, Syria, Iraq, Jordan, and Palestine among other countries in the Middle East (Magnus, 2005, p.40). The involvement in the war by the countries from the Middle East not only led to loss of power but also spurred the economic d ecline and created social problems. The second change set in by the First World War was the technology development in the Middle East. Britain, Germany, and France had adopted the use of powerful machines like guns, bombs and nuclear weapons, which the people of Middle East acquired. The forces/ people from Middle East who participated in the war acquired operating and construction skills for the deadly weapons (Wilbur, 1991, p.50). Consequently, the current technological trend especially in weapons is now on the rise in the Middle East. Therefore, the war led to the acquisition of military personnel, weapons, and fighting strategies in the Middle East.Advertising Looking for essay on asian? Let's see if we can help you! Get your first paper with 15% OFF Learn More The third change set by the First World War is the psychological torture and imbalance by the military personnel and citizens of Middle East. Deaths, insecurity, and family loss led to the victims , civilians, and military to undergo psychological trauma. Moreover, the abrupt change of power from monarchical to colonialism negatively affected the citizens of Middle East. Consequently, the occupation of Middle East by foreigners stimulated anger and frustrations among the citizens. Lastly, racism and ethnic bias started immediately as the world uprising commenced. The creation of sanctions by Britain and France, the crush of the Ottoman Empire and the occurrence of the Armenian genocide exacerbated racial conflicts and ethnicity in the Middle East (Niall, 2006, p.30). Therefore, the occurrence of the First World War was the genesis of all the social, economic, and political problems as expounded next. The rise of each Middle East country and historical overview since the end of the World War I Though not fully involved in the First World War, Afghanistan was always in constant conflicts with the Greeks, Persians, British (Anglo-afghan war) and Mongols among others. The major war that involved Russians in 1980, led to the death and displacement of many Afghanis. Since the end of World War I up to now, Afghanistan has not known peace, civil wars and terrorism have contributed to the poor economic, social, and political stability. On the contrary, Bahrain, which was a British colony (after the First World War) up to 1971, has experienced an economic boom due to availability of political stability, tourism sector and petroleum industry. Although it contains immense natural resources, Iran is a state that has experienced political instability since the end of the First World War. However, it is currently struggling to implement political, economic, and social reforms. Likewise, Iraq has experienced both civil and internally wars, but the fall of Saddam Hussein and control of political aggression by the U.S have led to transition.Advertising We will write a custom essay sample on Changes in the Middle East After the World War I specifically for you for only $16.05 $11/page Learn More Israel is a state that holds the landmarks of all the three main religions (Christianity, Muslim and Jewish) in the world. Nevertheless, ethnic clashes have led to political upheaval since the end of the first war. On the other hand, Jordan was a colony of Britain (after WWI) but gained independence in 1945, which led to the establishment of international trade and economic reforms. In the same way, Lebanon became independent but civil wars due to political instability reigned for sometime. Currently, the state is struggling to reinstate political and economic reforms. Like Lebanon, after independence from Britain Pakistan has been in conflicts with the Indians over the Kashmir region but currently the political reforms and international treaties are in place to ensure there is peace. Besides the Gulf War and colonialism that are now at bay, Kuwait, Oman, Qatar and Kyrgyzstan, are the few nations in the region, which are econo mically stable due to the presence of petroleum industry, modern infrastructures, and natural gas among others. However, Qatar is the nations with the highest income per capita in the Middle East region. Turkey is a nation formed by Anatolian remnants after the fall of the Ottoman Empire. The nation has successfully adopted reforms, which have led to economic prowess. Similarly, Saudi Arabia experiences political instability and economic growth from oil reserves since the end of the First World War. While Tajikistan and Syria after gaining independence from Soviet Union and the French respectively they have adopted economic, political, and social reforms that have led to the nation’s stability. In addition, the independence of Turkmenistan and U.A.E from Soviet Union and Britain respectively, has led to the establishment of autonomous states with economic stability. Lastly, Yemen and Uzbekistan colonies of British and Soviet Union respectively have gained independence and d ue to possession of natural resources, their economic power is on the rise. Conclusion Although most of the countries in the Middle East are lucky to posses’ natural resources like gas, petroleum and minerals, the impact of the First World War I still holds back their economic growth. Advertising Looking for essay on asian? Let's see if we can help you! Get your first paper with 15% OFF Learn More Political instability and social problems like racism and ethnicity are some of the vices acquired during the first world, which the states struggle to control decades after the end of the war. However, a few of the states have put in place reforms to control the problems initiated by the First World War. References Craig, A. M., Graham, W. A., Kagan, D., Ozment, S., Turner, F. M. (2009). The Heritage of World Civilizations. Upper Saddle River, NJ: Pearson Prentice Hall. Magnus, B. (2005). Reclaiming a Plundered past: archaeology and nation Building in modern Iraq. USA: University of Texas Press. Niall, F. (2006). The War of the World: Twentieth-Century Conflict and the Descent of The West. New York: Penguin Press. Wilbur, C. L. (1991). Zeppelins of World War I. New York: Paragon Press

Monday, November 4, 2019

Certificate in Education Personal Statement Example | Topics and Well Written Essays - 1000 words

Certificate in Education - Personal Statement Example I ensured that as we progressed with the lesson, I asked a number of questions and picked the students at random to answer them. Even the weaker students seemed to have grasped everything from mm lesson. The students would also continue asking me question regarding the application of depreciation in business world. Indeed learning took place because toward the end of the lesson, the students could answer me most of the question from depreciation concept. At the end of the lesson, I summarised the lesson by discussing the main points and ensure the students study more on depreciation; I gave them a handout to all students to read during their free time. I was really impressed as a teacher since I had achieved my goals of transferring knowledge to students. If repeating the same exercise, I would ensure I first know what the students know about the topic so that I can know the approach to use and the effort to apply so that the students can understand the concept. I attended another colleague's teaching session in a catering class where the topic for discussion was opening of wine. As a learner in this catering class, I found the lesson very interesting and all the other students had an interest in the topic. I really enjoyed my every moment with the catering students since in their class; there were more practical sessions unlike in other subjects. The lesson started af... (Arnot, McIntyre, Pedder and Reay, 2004) The teacher asked question as he proceeded with the lesson and we as students, we found the lesson to very interesting and we were all fully attentive throughout the lesson. We occasionally asked the teacher questions regarding the topic and this was a clear revelation that we understood the concepts as the lesson was interesting. The teacher praised us each time we answered the question and encouraged those who did not give a perfect answer so that they do not feel shy not to answer a question next time. There were more practical sessions throughout the lesson than talking. We were asked to demonstrate on the best way we are supposed to serve wine as discussed in class. At least all students were given a chance to demonstrate what they had learnt and this gave a chance to other students to learn from their colleagues. The lesson had been prepared well since the teacher had prepared PowerPoint presentation which made the lesson more interesting. The teacher demonstrated good PowerPoint presentation skills and the class was enjoyable. After we had demonstrated on how to serve and open wine, the teacher concluded the lesson by summarising the main points. (Barnett, 2003) Question Three To evaluate the teaching session taught to by on my peers, I can see the teaching was a success. There was full participation by all students as they kept on asking and answering questions throughout the lesson. I had fully prepared for the lesson and I had allocated time for introduction, discussion and finally for summarising the lesson. Throughout the session, the students had an interest of learning about depreciation as they were eager to know how it is applicable in business. The most

Saturday, November 2, 2019

Ken Griffey Jr. Negotiation Essay Example | Topics and Well Written Essays - 1000 words

Ken Griffey Jr. Negotiation - Essay Example The parties to the negotiation for Ken Griffey's services were divided into four categories. Those categories include: Ken Griffey and those individuals representing or affiliated with Mr. Griffey, the Cincinnati Reds and all those working with them, the Seattle Mariners and their management, and the New York Mets who were minor players in the drama. Bit players including the commissioner and the commissioner's office, the Cincinnati and Seattle baseball fans, and the players that were traded for Griffey could have had some impact as well (especially looking at the transaction five years later). Each of these four entities and the bit players all played their role in the transaction. Some had more impact than others, and some made this entire deal quite interesting to watch from an analytical viewpoint. The setting for this transaction was that Ken Griffey was finishing a contract with the Seattle Mariners. He was a 10/5 year man, which meant that he had control over where he was ultimately going to play baseball, and for what team because he had veto power over any trade involving himself. It was not that he was dissatisfied with the Mariners, and he especially was not dissatisfied with their more than lucrative offer of over $17 million per year, but the was more a case of his wife and family's dissatisfaction with not being able to see Daddy during the season, since they lived in Miami and Seattle is just about as far away from Miami as you can get and still be in the same country. This case hinged more on the matter of love than the love of money, which is quite evident based on the fact that Griffey signed for less money than for what Seattle's offer was worth. The only mistake that the individuals representing Griffey made was that they could have probably gotten even more money from Cincinnati than what they did by holding out a little longer than what they did. Brian Goldberg, Griffey's agent and advisor, knew that no matter what team Griffey ended up playing for, he (Goldberg) was in for a big, fat commission check from this transaction. His advice to Griffey was probably to make a choice based on where he (Griffey and his family) was going to be happiest. Goldberg knew that Griffey would probably be the happiest in Cincinnati, because of other factors as well. Those factors included the fact that Griffey's father had also played for the Reds and was a revered figure in the city because of the success of the team while Griffey's father was playing for them. The team at that time was nicknamed "The Big Red Machine" and won two straight World Series championships. From an analytical standpoint, the New York Yankees could benefit from this knowledge by finding out exactly who the ballplayer is married, engaged or seeing and their feelings about living in New York.Since it was not the money that clinched the deal, then in any future negotiations the Yankees might make, we may wish to keep in mind the spouse, or loved one, of the player and 'wine and dine' them as well as the player. (I'm sure The Boss has already thought of this being the entrepreneur that he is, but I thought I'd throw it in for reference).In analyizing the actions of the New York Mets, who, during the negotiations, attempted to entice Griffey to play in New York instead of Cincinnati a number of the actions that they