Tuesday, December 24, 2019

The Great Barrier Reef ( Gbr ) - 1573 Words

The Great Barrier Reef (GBR) is located off the coast Queensland, Australia and stretches over 1800 miles. The reef is home to around 1500 species of tropical fish, and over 400 kinds of coral. This is a species diversity playground for many biologists. There is also a major concern that is upon the reef. Climate change is a main concern throughout the world. When referring to climate change people think of a change in climate patterns that can not be reversed once started. The Great Barrier Reef is one that is greatly affected by climate change. Reefs can be hurt easily by this major effect that is taking place on the Earth. According to one article climate change will effect coral reefs so bad that it will take them to a their tipping point and they won’t be able to make a turn around (O. Hoegh-Guldberg, et al). The Greenhouse affect is when the sun warms the planet breakdowns the atmosphere and more radiation comes through. This a major concern for the reef due to the fact that this causes climate change. The major key gas that the reef looks at is carbon dioxide. Coral reefs already release .02 to .08 Gt C carbon dioxide (Ware, J.R., et. al.) This combined with the CO2 that is released from the greenhouse affect puts a strain on the reef such as ocean acidity levels rising. Climate change can affect the Great Barrier Reef by sea levels rising from glaciers melting, light levels, changes in currents, and ocean acidity levels. According to JE Johnson and PA Marshal theShow MoreRelatedThe Location Of An Ecosystem1281 Words   |  6 Pagesparticular ecosystems. The Great Barrier Reef is found along the Queensland coastline. It stretches as far north as Papa New Guinea, 8o South Latitude, to just above (north) of Fraser Island, 24o South Latitude, (an approximate 2300 Km stretch). There are four main regions along the Great Barrier Reef. These are The Northern, Central, Mackay, and Southern Region. The Great Barrier Reef also has continuity both geographically and temporally. Reef drilling data has proved that the reef in the north is 1kmRead MoreA Statement Of Grant Purpose1493 Words   |  6 PagesCoral Coral Dive into the astounding natural wonder of the world’s largest, most complex, yet fragile ecosystem with Coral, an immersive virtual reality film set in The Great Barrier Reef. Explore 360 degrees around the most spectacular maritime scenery on earth and examine diverse marine life flourish the colorful coral reef ecosystem. Listen closely to an Aboriginal Australian woman announce an ancient proverb, â€Å"We are all visitors to this time, this place. We are just passing through. Our purposeRead MoreGreat Barrier Reef893 Words   |  4 PagesThe Great Barrier Reef a World Heritage listed, it is the vastest stretch of coral reef in the world. This essay will provide information on how the Great Barrier Reef is being protected against global warming for our future generations. We all love going to the beach for a swim or a snorkel however a different image was created by an article published by the Australian Academy of Science on their web site Nova Science in the News (2 009): â€Å"Imagine you are on a beautiful tropical island on theRead More Shipping and the Great Barrier Reef Essay4636 Words   |  19 Pagesthe Great Barrier Reef Australia’s Great Barrier Reef (GBR) is an unparalleled marine ecosystem that holds rank as one of the world’s most valuable natural wonders. The abundance of sea life offers both intrinsic and physical benefits, but unfortunately this extraordinary habitat is now threatened from several different angles. One of the greatest threats to the GBR is the presence of popular shipping routes which surround and penetrate the reef. These ships naturally pollute the GBR, butRead MoreAnalysis Of David Weaver s Ecotourism1626 Words   |  7 Pagesmentioned, the research question for this bachelor thesis is about how GBR can be seen as a sustainable destination. To figure this out, it is important to understand how tourism or visitors affect the GBR. During the interview with Weaver, he expresses himself about climate change, chemical waste, tourism impacts, global warming, etc. According to Weaver, tourism impacts includes that the good outcomes overwhelmed the negative impact s in GBR. Visitors bring a big amount of money to the area through entryRead MoreThe Bleaching Of Coral And Its Effects On Human Activities976 Words   |  4 Pagesactivities such as overfishing, pollution, disturbance in the reef and global warming. The bleaching of coral due to natural activities can be hard to control but the negative effects caused by human activities can be. Although if the reefs have any hope of recovery drastic actions needs to be taken to reduce carbon emissions, and to control policing and protection of these areas. COTS Outbreaks COTS or Crown of Thorn Starfish are important to the reefs ecosystems to maintain numbers fasting growing specieRead MoreThe Great Barrier Reef Is Important1142 Words   |  5 PagesThe Great Barrier Reef is one of the seven wonders around the world. It is approximately 344,400 kilometers long. The Great Barrier Reef is home to many marine organisms. More than 1,500 species of fish live in the Great Barrier Reef. The coral that forms The Great Barrier Reef is made of polyps. Billions of living coral polyps are attached to the reef. The colour of these polyps range from blue, green, purple, red and yellow. As the largest living structure on the planet, the Great Barrier ReefRead MoreEssay about Bleaching of Coral is Harming the Environment2094 Words   |  9 PagesMETHODS Bleaching occurrences have happened before the 1980s; however detailed information could not be gathered due to lack of reporting (Berkelmans, De’ath and Kininmonth). In 1911, the first bleaching event was reported at Bird Key Reef in the Florida Keys, in which unfamiliar warm weathers caused â€Å"injury† upon the corals and the death of many fishes (Berkelmans, De’ath and Kininmonth). In 1998, the worst bleaching event was recorded. In some parts of the world, live corals were completely harmedRead MoreMovie Review : Making The Revenant 1775 Words   |  8 Pageswarming destroying parts of civilization but it is also is destroying some of the most beautiful sea life. The Great Barrier Reef (GBR) in Australia is known for the most amazing coral and fascinating sea life that live within it. The reef covers 134,364 square miles and is the home to over four hundred types of coral and five thousand types of fish and mollusk species. Coral in the reef start to bl each and lose their color from consistent warm ocean temperatures. If the coral is under too much stressRead MoreEffects Of Pesticides On The Food Of The Public1457 Words   |  6 Pagescontamination of nearshore marine systems, including the Great Barrier Reef area. In all these areas, agricultural herbicides have long been used. These herbicides causes contaminants to enter the marine environment, and cause very slow degradation rates of the ecosystem. Before this study, the fate of these contaminants in marine environments was misunderstood. The study evaluated the usage of photosystem II (PSII) herbicides in the Great Barrier Reef region. Over the course of 12 months, experiments were

Sunday, December 15, 2019

Intelligent Campus Using Rfid Free Essays

string(145) " information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc\." chapter 1 introduction 1. 1GENERAL With the increasing denial of time and space the RFID technology is gaining momentum day by day. RFID is a source of identification of individuals and unique products. We will write a custom essay sample on Intelligent Campus Using Rfid or any similar topic only for you Order Now The budding technology RFID proves to threaten even the cloning technique, through the chip insertion. New ways of improving the existing RFID technology are being found and implemented. This advancement of RFID technology is looked beyond the security purposes. 1. 2 PRESENT SCENARIO Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of unique serial number) of an object wirelessly, using radio waves. RFID technologies are grouped under the more generic Automatic Identification and Data Capture (AIDC). The RFID technology is used only in security, tagging goods, inventory purposes. Since the RFID technology is not well established in India, the introduction of new methodology in the field of RFID will indeed enhance the use of RFID technology in various areas of science and technology. . 3 PROBLEM An individual should be allocated to maintain registers in all places and appointment of staffs for coordinating with students in all occasions. The ID card can be duplicated even thought it has some other advancement which will be used in rare occasions. 1. 4 SOLUTION The best solution to the above problem is to develop a single RFID tag that can be used inside the college campus. Each and every RFID tag holds a particular number and it is integrated with the id cards of each and every individuals. The RFID tag reader can be fixed anywhere in campus and it is used to collect the information about the tag location. The collected data can be sent to centralized server to handle that information. Another added advantage is that the ID cards can’t be duplicated. This has several advantages and it is a time saving one for the institution, students and staff members. 1. 5 HARDWARE AND SOFTWARE REQUIRED The hardware required is: 1) Personal computer. 2) RS 232. 3) Reader. 4) Power supply unit. 5) IR transmitter and receiver pair. 6) Buzzer. 7) LCD. 8) Tags. The software required is: 1) AVR studio 3. 5. 2) Visual studio 6. 0. 1. 6 BLOCK DIAGRAM Figure 1. 1 block diagram of intelligent campus using RFID CHAPTER 2 RFID system 2. 1 INTRODUCTION Radio Frequency Identification or RFID refers to the set of technologies that use radio waves for identifying objects or people. The RFID system is used to identify individual objects or things in the environment which can be monitored through use of wireless technology. RFID is a generic term for technologies that use radio waves to remotely store and retrieve data. In other words, it is a combined term with RF and ID where RF means a wireless communication technology and ID means identification information of tag. So it is said that RFID is theoretically a wireless networking technology to transmit identification information stored at an electronic memory space. 2. 2 COMPONENTS OF RFID SYSTEM: ? An RFID device (transponder or tag), that contains data about an item. ? An antenna used to transmit the RF signals between the reader and the RFID devices. ? An RF transceiver that generates the RF signals. A reader that receives RF transmissions from an RFID device and passes the data to the host system for processing. Figure 2. 1: RFID SYSTEM 2. 3 GENERIC RFID TAG ARCHITECTURE The tag contains circuit to both rectify DC power from the incoming RF signal as well as to detect and extract the information modulated on the signal. The antenna load is a controlled resistance that changes the impedance of the dipole, enabling the backscatter. The tag IC is mounted on a carrier known as a strap and subsequently bonded to the antenna to form the fully assembled tag. The chip itself is very small, enabled by modem CMOS technology. The mounting of the die on a carrier has been made very inexpensive and capable of large volume by either flip-flop or by other innovative technique such as the Alien Technologies Fluidic self Assembly process. [pic] Figure 2. 2: Basic Tag IC Architecture 2. 4 Components of a tag The major components of the tag are 1) Microchip. 2) Antenna. 2. 4. 1 Microchip Microchip is electronic equipment consisting of a small crystal of silicon semiconductor fabricated to carry out a number of electronic functions in an integrated circuit. The microchip used in a HF tag is a contact less read/ write passive RFID device that is optimized for 13. 56 MHz RF carrier signal. The device needs an external LC resonant circuit for wireless communication with the interrogator. The device is powered remotely by rectifying an RF signal that is transmitted from the interrogator and transmits or updates its contents from memory-based on commands from interrogator. 2. 4. 2 Antenna The antenna emits the radio signal to activate the tag and reading and writing data to it. Antennas are the conduits between the tag and the transceiver, which controls the system data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built in a door frame to receive tag data from persons or things. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continuously. If constant interrogation is not required, the field can be activated by the sensor device. 2. 5 rfid readers RFID reader is like any other device that can be connected to a PC Or might be in built like an external or internal modem. The RFID reader can be powered by a power source using an adapter †Reader† or †Interrogator†, a device that is able to locate and activate tags so that the information that has been programmed onto the tag is transmitted back to the reader and subsequently to interface computing systems. The information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc. You read "Intelligent Campus Using Rfid" in category "Papers" Not only do reader locate activate and receive transmissions from RFID tags, a reader has the ability of sending data back to read/write capable tag in order to append or replace data. Readers exist that can also scan bar codes in environments where both bar codes and RFID are used. 2. 6 COMPONENTS OF A READER The reader has the following main components: ? Transmitter and Receiver ? Microprocessor ? Memory ? I/O channels for external sensors, actuators and annunciators ? Controller ? Communication interface ? Power. [pic] Figure 2. 3: BLOCK diagram of a reader 2. 6. 1 TRANSMITTER The reader’s transmitter is used to transmit AC power and the clock cycle via antennas to the tags in its read zone. This is part of the transceiver unit, the component responsible for sending the reader signal to the surrounding environment and receiving tag responses back via the reader antennas. The antenna ports of reader are connecting to its transceiver component. One reader antenna can be attached to each such antenna port. Receiver receives analog signals from the tag via the reader antenna. It then sends the signals to reader microprocessor, where it is converted to its equivalent digital form. 2. 6. 2 MICROPROCESSOR This component is responsible for implementing the reader protocol to communicate with compatible tags. It performs decoding and error checking of the analog signal from the receiver. In addition, the microprocessor might contain custom logic for doing low level filtering and processing of read tag data. 2. 6. 3 MEMORY Memory is used for storing data such as the reader configuration parameters and list of tag reads. Depending on the memory size, however, a limit applies as to how many such tag reads can be stored at one time. If the connection remains down for an extended period with the reader reading tags during this downtime, this limit might be exceeded an part of the stored data lost. 2. 6. 4 I/O channels Readers do not have to be turned on for reading tags at all time. A sensor of some sort, such as a motion or light sensor, detects the presence of tagged objects in the readers read zone. This sensor can then set the reader on to read this tag. Similarly, this component also allows the reader to provide local output depending on some condition via an annunciators or an actuator. 2. 6. 6 CONTROLLER A controller is an entity that allows an external entity, either a human or a computer program, to communicate with and control a reader’s function and to control annunciators and actuators associated with the reader. . 6. 7 COMMUNICATION INTERFACE The communication interface component provides the communication instructions to a reader that allows it to interact with external entities, via a controller to transfers its stored data and to accept commands and send back the corresponding responses. 2. 6. 8 POWER This component supplies power to the reader component. The power sources g enerally provided to this component through a power cord connected to an appropriate external electrical outlet. 2. 7 COMMUNICATION BETWEEN A READER AND A TAG Depending on the tag type, the communication between the reader and a tag can be one of the following: †¢ Modulated backscatter †¢ Transmitter type †¢ Transponder type The area between a reader antenna and one full wave length of the RF wave emitted by the antenna is called near field. The area beyond one full wavelength of the RF wave emitted from a reader antenna is called far field. Passive rfid systems operating in LF and HF use near field communication, whereas those in UHF and microwave frequencies use far field communication. The signal strength in near field communication attenuates as the cube of the distance from the reader antenna. In far field, it attenuates as square of the distance from the reader antenna. 2. 7. 1 MODULATED BACK SCATTER Modulated backscatter communication applies to passive as well as to semi active tags. In This type of communication, the reader sends out a continuous wave (CW) RF signal containing ac power and clock signal to the tag at carrier frequency. Through physical coupling, the antennas supplies power to the microchip. About 1. 2v are generally necessary to energize the tag microchip for reading microchips. For writing, the microchip usually needs to draw about 2. 2v from the reader signal. The microchip now modulates or breaks up the input signal in to a sequence of on and off patterns that represents its data and transmits it back. When the reader receives this modulated signal, it decodes the pattern and obtains the data. Thus, in modulated backscatter communication, the reader always â€Å"talks† first, followed by the tag. A tag using this scheme cannot communicate at all in the absence of a reader because it depends totally on the reader’s power to transmit its data. pic] Figure 2. 4: backscatter communication 2. 7. 2 TRANSMITTER TYPE This type of communication applies to active tags only. In this type of communication, the tag broadcasts its message to the environment in regular intervals irrespective of the presence or absence of a reader. Therefore, in this type of communication, the tag always â€Å"talks† first rather than the reader. [pic] Figure 2. 5: T RANSMITTER communication 3. 4. 3 TRANSPONDER TYPE In this type of communication, the tag goes to a â€Å"sleep† or in to dormant stage in the absence of interrogation from a reader. In this stage, the tag might periodically send a message to check any reader is listening to it. When a reader receives such a query message, it can instruct the tag to â€Å"wake up† or end the dormant stage. When the tag receives this command from the reader, it exits its current state and starts to act as a transmitter tag again. The tag data is sent only the reader specially asks. [pic] Figure 2. 6: TRANSPONDER communication chapter 3 microcontroller 3. 1 INTRODUCTION The hardware includes the following components: ? Atmega162 (micro controller). ? Power supply. ? In system programming. ? Buzzer. Liquid crystal display. ? Reset. ? Max 232. 3. 2 Hardware details of ATMEGA162 controller Utilizes the AVR – RSIC architecture. 3. 2. 1 Features ? High-performance and Low-power Advanced RISC Architecture. ? Most single clock execution. ? 32 x 8 general purpose working registers. ? Fully static operation. ? On chip 2 cycle multiplier. ? Up to 16 MIPS throughput at 16 MHz. ? 131 powerful instructions. 3. 2. 2 Non-volatile Program and Data Memories ? 16K Bytes of In-System Self-programmable Flash. ? Endurance: 10,000 Write/Erase Cycles. ? 512 Bytes EEPROM. ? 1K Bytes Internal SRAM. Up to 64K Bytes Optional External Memory Space. ? Programming Lock for Flash program and EEPROM data Security. 3. 2. 3 Peripheral Features ? Two 8-bit Timer/Counters with Separate Modes. ? Two 16-bit Timer/Counters with Separate Compare Modes, and Capture Modes. ? Real Time Counter with Separate Oscillator. ? Six PWM Channels. ? Dual Programmable Serial USARTs. ? Master/Slave SPI Serial Interface. ? Programmable Watchdog Timer with Separate On-chip Oscillator. ? On-chip Analog Comparator. ? External and internal interrupt sources. 3. 2. 4 SPECIFICATION ? Low power high speed CMOS process technology. Fully static operation. ? Power consumption at 4 MHz, 3v, 25c. ? Active: 3. 0 MA. 3. 2. 5 Special Microcontroller Features ? Power-on Reset and Programmable Brown-out Detection. ? Internal Calibrated RC Oscillator. ? External and Internal Interrupt Sources. ? Five Sleep Modes: Idle, Power-save, Power-down, Standby, and Extended Standby. 3. 2. 6 I/O and Packages ? 35 Programmable I/O Lines. ? 40-pin PDIP, 44-lead TQFP, and 44-pad MLF. 3. 2. 7 Operating Voltages ? 1. 8 – 5. 5V for ATmega162V. ? 2. 7 – 5. 5V for ATmega162. 3. 2. 8 Speed Grades ? 0 – 8 MHz for ATmega162V. ? 0 – 16 MHz for ATmega162. 3. ATMEGA162 architectural overview The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. . 3. 1 features OF ATMEGA162 The 16K bytes of In-System Programmable Flash with Read-While-Write capabilities, 512 bytes EEPROM, 1K bytes SRAM, an external memory interface, 35 general purpose I/O lines, 32 general purpose working registers, a JTAG interface for Boundary-scan, On-chip Debugging support and programming, four flexible Timer/Counters with compare modes, internal and external interrupts, two serial programmable USARTs, a programmable Watchdog Timer with Internal Oscillator, an SPI serial port, and five software selectable power saving modes. The fast-access Register File contains 32 x 8-bit general purpose working registers with a single clock cycle access time. This allows single-cycle Arithmetic Logic Unit (ALU) operation. In a typical ALU operation, two operands are output from the Register File, the operation is executed, and the result is stored back in the Register File – in one clock cycle. Six of the 32 registers can be used as three 16-bit indirect addresses register pointers for Data Space addressing – enabling efficient address calculations. One of these address pointers can also be used as an address pointer for look up tables in Flash Program memory. These added function registers are the 16-bit X-, Y-, and Z-register, described later in this section. The ALU supports arithmetic and logic operations between registers or between a constant and a register. Single register operations can also be executed in the ALU. After an arithmetic operation, the Status Register is updated to reflect information about the result of the operation. [pic] Figure 3. 1: BLOCK Diagram. Program flow is provided by conditional and unconditional jump and call instructions, able to directly address the whole address space. Most AVR instructions have a single 16-bit word format. Every program memory address contains a 16 or 32-bit instruction. [pic] Figure 3. 2: BLOCK Diagram of the AVR Architecture Program Flash memory space is divided in two sections, the Boot Program section and the Application Program section. Both sections have dedicated Lock bits for write and read/write protection. The SPM instruction that writes into the Application Flash memory section must reside in the Boot Program section. During interrupts and subroutine calls, the return address Program Counter (PC) is stored on the Stack. The Stack is effectively allocated in the general data SRAM, and consequently the Stack size is only limited by the total SRAM size and the usage of the SRAM. All user programs must initialize the SP in the reset routine (before subroutines or interrupts are executed). [pic] Figure 3. 3: Data Memory Map 3. 3. 2 ALU – Arithmetic Logic Unit The high-performance AVR ALU operates in direct connection with all the 32 general purpose working registers. Within a single clock cycle, arithmetic operations between general purpose registers or between a register and an immediate are executed. The ALU operations are divided into three main categories – arithmetic, logical, and bit-functions. 3. 3. 3 Status Register The Status Register contains information about the result of the most recently executed arithmetic instruction. This information can be used for altering program flow in order to perform conditional operations. Status Register format [pic] Bit 7 – I: Global Interrupt Enable: The Global Interrupt Enable bit must be set for the interrupts to be enabled. The individual interrupt enable control is then performed in separate control registers. If the Global Interrupt Enable Register is cleared, none of the interrupts are enabled independent of the individual interrupt enable settings. The I-bit is cleared by hardware after an interrupt has occurred, and is set by the RETI instruction to enable subsequent interrupts. Bit 6 – T: Bit Copy Storage: The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T bit as source or destination for the operated bit. Bit 5 – H: Half Carry Flag: The Half Carry Flag H indicates a half carry in some arithmetic operations. Half Carry is useful in BCD arithmetic. Bit 4 – S: Sign Bit, S = N. V: The S-bit is always an exclusive or between the Negative Flag N and the Two’s Complement Overflow Flag V. Bit 3 – V: Two’s Complement Overflow Flag: The Two’s Complement Overflow Flag V supports two’s complement arithmetic. Bit 2 – N: Negative Flag: The Negative Flag N indicates a negative result in an arithmetic or logic operation. Bit 1 – Z: Zero Flag: The Zero Flag Z indicates a zero result in an arithmetic or logic operation. Bit 0 – C: Carry Flag: The Carry Flag C indicates a carry in an arithmetic or logic operation. 3. 3. 4 Stack Pointer The Stack is mainly used for storing temporary data, for storing local variables and for storing return addresses after interrupts and subroutine calls. The Stack Pointer Register always points to the top of the Stack. The Stack Pointer points to the data SRAM Stack area where the Subroutine and Interrupt Stacks are located. This Stack space in the data SRAM must be defined by the program before any subroutine calls are executed or interrupts are enabled. Stack Pointer FORMAT pic] The Stack Pointer is incremented by one when data is popped from the Stack with the POP instruction, and it is incremented by two when data is popped from the Stack with return from subroutine RET or return from interrupt RETI. The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The number of bits actually used is implementation dependent. 3. 3. 5 Reset and Interrupt Handling The AVR provi des several different interrupt sources. These interrupts and the separate Reset Vector each have a separate program vector in the program memory space. All interrupts are assigned individual enable bits which must be written logic one together with the Global Interrupt Enable bit in the Status Register in order to enable the interrupt. There are basically two types of interrupts. The first type is triggered by an event that sets the Interrupt Flag. For these interrupts, the Program Counter is vectored to the actual Interrupt Vector in order to execute the interrupt handling routine, and hardware clears the corresponding Interrupt Flag. Interrupt Flags can also be cleared by writing a logic one to the flag bit position(s) to be cleared. If an interrupt condition occurs while the corresponding interrupt enable bit is cleared, the Interrupt Flag will be set and remembered until the interrupt is enabled, or the flag is cleared by software. The second type of interrupts will trigger as long as the interrupt condition is present. These interrupts do not necessarily have Interrupt Flags. If the interrupt condition disappears before the interrupt is enabled, the interrupt will not be triggered. 3. 3. 6 In-System Reprogrammable Flash Program Memory The ATmega162 contains 16K bytes On-chip In-System Reprogrammable Flash memory for program storage. Since all AVR instructions are 16 or 32 bits wide, the Flash is organized as 8K x 16. For software security, the Flash Program memory space is divided into two sections, Boot Program section and Application Program section. [pic] Figure 3. 4 Programmable Memory Map The Flash memory has an endurance of at least 10,000 write/erase cycles. The ATmega162 Program Counter (PC) is 13 bits wide, thus addressing the 8K program memory locations. 3. 4 EEPROM Data Memory The ATmega162 contains 512 bytes of data EEPROM memory. It is organized as a separate data space, in which single bytes can be read and written. The EEPROM has an endurance of at least 100,000 write/erase cycles. The access between the EEPROM and the CPU is described in the following, specifying the EEPROM Address Registers, the EEPROM Data Register, and the EEPROM Control Register. 3. 4. 1 EEPROM Read/Write Access The EEPROM Access Registers are accessible in the I/O space. A self timing function, however, lets the user software detect when the next byte can be written. If the user code contains instructions that write the EEPROM, some precautions must be taken. In heavily filtered power supplies, VCC is likely to rise or fall slowly on Power-up/down. This causes the device for some period of time to run at a voltage lower than specified as minimum for the clock frequency used. In order to prevent unintentional EEPROM writes, a specific write procedure must be followed. The EEPROM Address Register [pic] Bits 15. 9 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bits 8. 0 – EEAR8. 0: EEPROM Address The EEPROM Address Registers – EEARH and EEARL specify the EEPROM address in the 512 bytes EEPROM space. The EEPROM data bytes are addressed linearly between 0 and 511. The initial value of EEAR is undefined. A proper value must be written before the EEPROM may be accessed. The EEPROM Data Register –EEDR [pic] Bits 7. 0 – EEDR7. 0: EEPROM Data For the EEPROM write operation, the EEDR Register contains the data to be written to the EEPROM in the address given by the EEAR Register. For the EEPROM read operation, the EEDR contains the data read out from the EEPROM at the address given by EEAR. The EEPROM Control Register – EECR [pic] Bits 7. 4 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bit 3 – EERIE: EEPROM Ready Interrupt Enable Writing EERIE to one enables the EEPROM Ready Interrupt if the I bit in SREG is set. Writing EERIE to zero disables the interrupt. The EEPROM Ready interrupt generates a constant interrupt when EEWE is cleared. Bit 2 – EEMWE: EEPROM Master Write Enable The EEMWE bit determines whether setting EEWE to one cause the EEPROM to be written. When EEMWE is set, setting EEWE within four clock cycles will write data to the EEPROM at the selected address. If EEMWE is zero, setting EEWE will have no effect. When EEMWE has been written to one by software, hardware clears the bit to zero after four clock cycles. See the description of the EEWE bit for an EEPROM write procedure. Bit 1 – EEWE: EEPROM Write Enable The EEPROM Write Enable signal EEWE is the write strobe to the EEPROM. When address and data are correctly set up, the EEWE bit must be written to one to write the value into the EEPROM. The EEMWE bit must be written to one before a logical one is written to EEWE; otherwise no EEPROM write takes place. The following procedure should be followed when writing the EEPROM (the order of steps 3 and 4 is not essential): 1. Wait until EEWE becomes zero. 2. Wait until SPMEN in SPMCR becomes zero. 3. Write new EEPROM address to EEAR (optional). 4. Write new EEPROM data to EEDR (optional). 5. Write a logical one to the EEMWE bit while writing a zero to EEWE in EECR. 6. Within four clock cycles after setting EEMWE, write a logical one to EEWE. The EEPROM can not be programmed during a CPU write to the Flash memory. The software must check that the Flash programming is completed before initiating a new EEPROM write. Step 2 is only relevant if the software contains a Boot Loader allowing the CPU to program the Flash. If the Flash is never being updated by the CPU, step 2 can be omitted. Caution: An interrupt between step 5 and step 6 will make the write cycle fail, since the EEPROM Master Write Enable will time-out. If an interrupt routine accessing the EEPROM is interrupting another EEPROM access, the EEAR or EEDR Register will be modified, causing the interrupted EEPROM access to fail. It is recommended to have the Global Interrupt Flag cleared during all the steps to avoid these problems. When the write access time has elapsed, the EEWE bit is cleared by hardware. The user software can poll this bit and wait for a zero before writing the next byte. When EEWE has been set, the CPU is halted for two cycles before the next instruction is executed. Bit 0 – EERE: EEPROM Read Enable The EEPROM Read Enable Signal EERE is the read strobe to the EEPROM. When the correct address is set up in the EEAR Register, the EERE bit must be written to a logic one to trigger the EEPROM read. The EEPROM read access takes one instruction, and the requested data is available immediately. When the EEPROM is read, the CPU is halted for four cycles before the next instruction is executed. The user should poll the EEWE bit before starting the read operation. If a write operation is in progress, it is neither possible to read the EEPROM, nor to change the EEAR Register. 3. 5 Timing External memory devices have various timing requirements. It is important to consider the timing specification of the external memory device before selecting the wait-state. The most important parameters are the access time for the external memory in conjunction with the set-up requirement of the ATmega162. [pic] Figure 3. 5: External Data Memory Cycles without Wait-state. 3. 6 Crystal Oscillator XTAL1 and XTAL2 are input and output, respectively, of an inverting amplifier which can be configured for use as an On-chip Oscillator. Either a quartz crystal or a ceramic resonator may be used. C1 and C2 should always be equal for both crystals and resonators. The optimal value of the capacitors depends on the crystal or resonator in use, the amount of stray capacitance, and the electromagnetic noise of the environment. The Oscillator can operate in four different modes, each optimized for a specific frequency range. [pic] Figure 3. 6: Crystal Oscillator Connections 3. 6. 1 Low-frequency Crystal Oscillator The Low-frequency Crystal Oscillator must be selected by setting the CKSEL Fuses to â€Å"0100†, â€Å"0101†, â€Å"0110† or â€Å"0111†. The crystal should be connected as shown in Figure. If CKSEL equals â€Å"0110† or â€Å"0111†, the internal capacitors on XTAL1 and XTAL2 are enabled, thereby removing the need for external capacitors. The internal capacitors have a nominal value of 10 pF. When this Oscillator is selected, start-up times are determined by the SUT Fuses (real time-out from Reset) and CKSEL0 (number of clock cycles) as shown in below tables [pic] Table 4. 1 Start-up DELAYS from Reset when Low-frequency Crystal Oscillator is selected . 7 Watchdog Timer If the Watchdog Timer is not needed in the application, this module should be turned off. If the Watchdog Timer is enabled, it will be enabled in all sleep modes, and hence, always consume power. In the deeper sleep modes, this will contribute significantly to the total current consumption. Chapter 4 Intelligent campus using rfid 4. 1 INTRODUCTION This project describes about the efficient used of RFID technology around us, it also describes about the use of both hardware and software. In addition we also focus on monitoring every individual inside the campus. 4. 2 Basic setup [pic]Figure 4. 1 basic setup The basic external setup for the project is shown in figure 8. 1. The HF reader is connected to microcontroller through RS-232 cable and the IR pairs are connected to the port pins of microcontroller. The microcontroller is then connected to the host computer (server) through RS-232 cable. The detailed explanation of the blocks are given below 4. 3 PERIPHERALS 4. 3. 1 I/O PORTS All AVR ports have true read-modify-write functionality when used as general digital I/O ports. This means that the direction of one port pin can be changed without unintentionally changing the direction of any other pin with the SBI and CBI instructions. Port A Port A is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port A, one each for the Data Register – PORT A, SIB($IB($3B), Data Direction Register – DDRA, $1A($3A) and the Port A. Input Pins – PINA, $19($39). The Port A Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port B Port B is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port B, one each for the Data Register – PORT B, $18($38), Data Direction Register – DDRB, $17($37) and the Port B Input Pins – PINB, $16($36). The Port B Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port C Port C is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port C, one each for the Data Register – PORT C, $15($35), Data Direction Register – DDRC, $14($34) and the Port C Input Pins – PINC, $13($33) The Port C Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port D Port D is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port D, one each for the Data Register – PORT D, $12($32), Data Direction Register – DDRD, $11($31) and the Port D Input Pins – PIND, $10($30). The Port D Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. 4. 4 USART (Universal Synchronous and Asynchronous serial Receiver and Transmitter): The Universal Synchronous and Asynchronous serial Receiver and Transmitter (USART) is a highly flexible serial communication device. The main features are: ? Asynchronous or Synchronous Operation ? Master or Slave Clocked Synchronous Operation ? Odd or Even Parity Generation and Parity Check Supported by Hardware ? Data Overrun Detection ? Framing Error Detection ? Three Separate Interrupts on TX Complete, TX Data Register Empty and RX Complete ? Multi-processor Communication Mode ? Double Speed Asynchronous Communication Mode The ATmega162 has two USARTs, USART0 and USART1. USART0 and USART1 have different I/O Registers. Portd0 is the receiver pin and portd1 is the transmitter pin. Here we are using IC MAX232 as a UART driver. [pic] Figure 4. 2 uart driver. 4. 4. 1 AVR UART – Compatibility The USART is fully compatible with the AVR UART regarding: ? Bit locations inside all USART Registers ? Baud Rate Generation ? Transmitter Operation ? Transmit Buffer Functionality ? Receiver Operation 4. 4. 2 USART Initialization The USART has to be initialized before any communication can take place. The initialization process normally consists of setting the baud rate, setting frame format and enabling the Transmitter or the Receiver depending on the usage. For interrupt driven USART operation, the Global Interrupt Flag should be cleared (and interrupts globally disabled) when doing the initialization. The TXC Flag can be used to check that the Transmitter has completed all transfers, and the RXC Flag can be used to check that there are no unread data in the receive buffer. 4. 5 SENSOR Sensors are the devices that are used to convert the physical parameter into signal that can be measured electrically and it can be easily given as an input to the microcontroller. The effectual sensor should have the following properties namely, ? Sensor should be sensitive to measured property. ? It should be insensitive to any other property. ? It should not influence any other property. An IR sensor is used. It uses IR LED as an IR transmitter, which emits IR rays in the wavelength of 940 nm and a phototransistor is used as IR receiver, which detects IR rays and the output comes in collector. If the receiver is receiving IR rays the output will be low otherwise output is high. The output of the receiver is given to the comparator chip LM393, which compares the receiver output with the prefixed voltage signal. The output of the comparator is given to microcontroller. [pic] Figure 4. 3 CIRCUIT DIAGRAM OF IR SENSOR 4. 5. 1 IR TRANSMITTER LED, a special type of semiconductor diode that has a pn junction acts as a transmitter. The wavelength and the color of the light depend on the band gap energy of the material forming pn junction. The materials used for a LED have a direct band gap energy corresponding to near IR, but Germanium and silicon are indirect band gap materials resulting in a non – radiative recombination. Hence does not emit light. The advantages of LED over incandescent sources are: ? Less costly Long life span ? Insensitive to vibration and shocks. 4. 5. 2 IR RECEIVER A phototransistor is used to detect the IR rays from the LED. It is a bi polar junction that is encased in a transparent case so that light can reach the base collector junction. The phototransistor works like a photodiode with a very high very high sensitivity for light, because the electrons that are gene rated by photons in the base collector junction are injected to base and amplified like a transistor. It has a slower response time than photodiode. [pic] Figure 4. 4 BLOCK DIAGRAM OF IR SENSOR 4. 5. 3COMPARATOR The comparator is a circuit which compares a signal voltage applied at one input of an op-amp with a known reference voltage at the other input. For an inverting comparator the reference voltage is applied to the (+) input and input is given to the (-) terminal. The common mode voltage range includes ground, and the differential input voltage equals power supply voltage. [pic] Figure 4. 5: PIN CONFIGURATION OF LM 393 4. 6 BUZZER It is a transducer which converts electrical signal to sound signal. Piezoelectricity is the ability of certain crystals to produce a voltage when subjected to mechanical stress. The effect is reversible (i. . ) crystals when subjected to external applied voltage can change shape by a small amount and the effect is of nanometers. [pic] Figure 4. 6 circuit diagram of buzzer 4. 7 RS-232C RS-232 stands for Recommend Standard number 232 and C is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. [pic] Fig ure: 4. 7. RS-232 CONNECTOR 4. 7. 1 DB9 INFORMATION The DB9 connection has 9 pins which are each described in the below table. The illustration below is an example of the female serial connector, which would usually be located on the connector that would connect to the computer. 9 pin connector on a DTE device (PC connection) | |Pin No |Direction of the signal | |1 |Carrier(CD) ( from DCE) incoming signal from the modem | |2 |Received data (RD) incoming data from DCE | |3 |Transmit data (TD) outgoing data to a DCE | |4 |Data terminal ready (DTR) outgoing handshake signal | |5 |Signal ground common reference voltage | |6 |Data set ready (DSR) incoming handshaking signal | |7 |Request to send (RTS) outgoing flow control signal | |8 |Clear to send (CTS) incoming flow control signal | |9 |Ring indicator (RI) (from DCE) incoming signal from a modem | Table: 4. 1: DB9 connector DTE stands for Data Terminal Equipment, and DCE stands for Data Communications Equipment. These terms are used to indicate the pin-out for the connectors on a device and the direction of the signals on the pins The RS-232 standard states that DTE devices use a 9-pin male connector, and DCE devices use a 9-pin female connector. 4. 8 LCD LCD is an output device which is used to display a character or a text through microcontroller. So, the LCD is connected in the output port pins of microcontroller. A 2 line LCD display has totally 32 pins. 32 characters can be displayed in our LCD. [pic] Figure 4. 8: 16Ãâ€"2 LCD DISPLAY The starting address for the first line is $80 and for end address is $8F and for second line the starting address is $C0 and the end address is $CF. Pin no |Pin name |I/P or O/P |External connection |Function | |1 |VSS |– |Power supply |GND | |2 |VDD |– | |+5V | |3 |VO |– | |V lcd adjustment | |4 |RS |I/p |MPU |Register select signal | |5 |R/W |I/p |MPU |Read/write select signal | | | | | |Read-1; write-2. | |6 |E |I/p MPU |Operation enable signal | |7-10 |DB0-DB3 |I/p |MPU |Lower order lines | |11-14 |DB4-DB7 |I/p |MPU |Higher order lines | |15-16 |LED,,+,, |I/p |LED backlight power supply |LED,,+,, voltage | | |LED,,-,, | | |type : 4. 2V;Max: 4. 5V | | | | | |LED,,-,, : GND | Table 4. 2 discription of lcd terminals Chapter 5 VISUAL BASIC 5. 1 INTRODUCTION The Visual Basic language is quite powerful – if one can imagine a programming task; it can probably be accomplished using Visual Basic. Once the basics of Visual Basic are understood then one becomes productive. 5. 2 About Visual Basic The â€Å"Visual† part refers to the method used to create the graphical user interface (GUI), Rather than writing numerous lines of code to describe the appearance and location of interface elements, simply add pre built objects into place on screen. The â€Å"Basic† part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more programmers. Visual Basic has evolved from the original BASIC languages and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to accomplish anything that can be accomplished using any other Windows programming language. The Visual Basic programming language is not unique to Visual Basic. The Visual Basic programming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The Visual Basic Scripting Edition (VB Script) is a widely used scripting language and a subset of the Visual Basic language. The investment one makes in learning Visual Basic will carry over to many other areas. Whether the goal is to create a small utility for an individual, a work group a large enterprise-wide system, or even distributed applications spanning the globe via the Internet, Visual Basic has the required tools. 5. 3 ADVANTAGES ? Data Access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ? ActiveXTM Technologies allow you use the functionality provided by other applications, such as Microsoft Word Processor, Microsoft Excel spreadsheet, and other Windows applications. Even applications can be automated and objects can be created using the Professional or Enterprise editions of Visual Basic. ? Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within the application, or to create Internet server applications. ? The finished application is a true. exe file that uses a Visual Basic Virtual Machine that you can freely distribute. 5. 4 Program description The front end is visual basic and this programming concept is chosen because it is more users friendly. The information or the status about the persons is displayed and the same can be stored in a database so that it can be accessed later. [pic] Figure 5. : output and database creation, checking form Chapter 6 conclusion RFID technology is a budding technology that is fast growing world wide. RFID proves to be cutting edge technology through its applications. This project moves a step ahead in RFID’s application and presents a new dimension to view through. This project proves to be entirely different and innovative of RFID technology with the existing components. Such an introduction of a new methodology in the RFID technology enhances its use and improves the present knowledge. The project â€Å"INTELLIGENT campus using RFID† will sure make a great difference in the present industrial applications of RFID. It will provide the ultimate solution for the problems that exists in various cases. This is a prototype of the proposed idea wherein the entire reason behind it is to provide a fully compact, covering larger distance. 6. 1 PROCESS EXPLANATION The various processes that take place during the working of the project are as follows: The RFID tag is a passive, high frequency device in which some unique data’s can be stared in the form of serial numbers known as ELECTRONIC PRODUCT CODE (EPC). Whenever the RFID tag comes in the field of a particular reader, the reader detects the tag and sends the detected information about the EPC to the microcontroller. ACTIVITY FLOWCHART Figure 6. 1: activity flow chart The received information will be fed into the microcontroller which compares the epc number to specific information’s about group of individuals. If the received information is already in the list, it will allow the user to enter inside the campus and also maintains a database for storing this information. The reader refreshes its data continuously checks after certain amount of time interval and when the RFID reader detects the absence of a tag it will remove the tag details from the list. The database can be created with the help of visual basic programming. [pic] Figure 6. 2: database creation of persons entering into the campus Whenever the tag enters into a specific location such as class rooms, library etc, the reader present in that location will detects the tag. Two IR transmitter – receiver pairs are used for the purpose of monitoring whether the person is entering the room or leaving the room. The IR rays interfering sequence is fed to the microcontroller and it is used for detecting the status of the person having that particular tag. The details or the status are also saved into database using visual basic coding. The databases can be shared in the network and it can be used for finding or monitoring each and every individual belonging to that campus. [pic] Figure 6. 3: database creation of persons entering into PARTICULAR LOCATION. The same can be used to find the individual location using search option. 6. 2 FUTURE ENHANCEMENTS The project could further be developed and enhanced in an effective way by suitable polarization RFID reader antennas and increasing the frequency range so that it would not only provide the solution for monitoring persons in a smaller area as mentioned in this model. The security can also be increased by replacing IR devices by some bio-metric ideas. ———————– 162- MICRO CONTROLLER LCD I/O P O R T S I/O P O R T S BUZZER IR 1 IR 2 USART USART PC RFID END CREATES A DATA BASE (In/Out) 1-2 OR 2-1 Yes No Interruption Occurred CHECHS FOR IR SIGNAL CREATES A DATA BASE (Present inside the campus) INFORMATION TRANSFER FROM RFID READER TO M162 Yes RFID TAG PRESENT No READER SIGNAL TRANSMIT START How to cite Intelligent Campus Using Rfid, Papers

Saturday, December 7, 2019

Ethics Of Living Jim Crow Essay Example For Students

Ethics Of Living Jim Crow Essay The Ethics of Living Jim Crow ? My InterpretationThe Ethics of Living Jim Crow is an autobiographical account of author Richard Wrights education in race relations in a totally segregated south. Wright talks about his experiences growing up in the south and the racism he encountered. He attempts to show us what being on the receiving end of racism is really like, and the lessons he learned from them. I believe that Wrights intended audience seems to be directed towards white people so that they may gain an understanding of the hardships blacks went through early in our nations history. Wright starts off by explaining where he grew up. The house he lived in was located behind the railroad tracks and his ?skimpy yard was paved with cinder blocks? (600). To see green you had to look beyond the railroad tracks to the whites section of town. I felt that here the author seemed to know that there was a difference between the two, but at his young age he did not understand why the two were different. In the first part of the article Wright describes a fight that he gets into with some white boys and the punishment he receives from his mother for it. His mother tells him that he is ?never, never, under any conditions, to fight white folks again? (601). She goes on to say that he should be thankful that the white kids didnt kill him. I think that in telling Wright this, his mother is teaching him that blacks are not as good as whites and that he should be thankful that they allow blacks to exist in the same world as the whites. Wright goes on describing different jobs he had and the dealings he had with his white bosses. In one section the author talks about watching his white boss drag and kick a black woman into the store where he worked. After a few minutes the woman comes out bloody and crying. The author explains what happened with some of his black co-workers. None of them are surprised by this and one adds that she was lucky to just have been beaten and not raped as well. I think the author here is showing that blacks in the early south were almost immune to this type of racism. It is so commonplace that the blacks hardly blink when it happens. Wright later talks about moving to a larger city and the interactions he had with the white people there. The author explains that the whites there were a little more accepting, and would actually hold conversations with the blacks. The author points out that caution must be used when talking with whites on subjects like the Ku Klux Klan, Abraham Lincoln, the civil war, and ?any topic calling for positive knowledge or manly self-assertion on the part of the Negro? (610), should be avoided. Throughout this article Wright talks about learning his ?Jim Crow lessons.? Jim Crow refers to the name of a character in minstrelsy (in which white performers in blackface used African American stereotypes in their songs and dances); it is not known how it became a term describing racial segregation. The term Jim Crows literal definition means ?separate but still equal.? I believe the author finds the part about being equal very ironic with his title and when he mentions his ?Jim Crow lessons.?The last part of the article describes how blacks felt about the way they had to live. A friend of the author summed it up by saying, ?Lawd, man! Ef it wuznt fer them polices ?n them ol lynch-mobs, there wouldnt be nothin but uproar down here!? (610). With this, I believe, the author has come to the realization that when it comes to racism, the blacks in the south knew about it, received it frequently, and came to accept it and the atrocities that come with it. English Essays

Saturday, November 30, 2019

Time And The Tempest Essay Research Paper free essay sample

Time And The Tempest Essay, Research Paper The Tempest, penned by dramatist William Shakespeare, as one of his last plants circa 1612 is a narrative about many things: love, retaliation, greed, political relations, thaumaturgy, and enigma. Even the impression of clip plays a major function, and it is this facet we shall be discoursing in the undermentioned pages. Time plays a reasonably big function in many of the thoughts put frontward in this instead pensive narrative of one adult male s ( Prospero ) treachery at the custodies of his brother and his initial efforts at retaliation. Basically The Tempest terminals with the antique moral that clip heals all lesions as he eventually finds it in his bosom to forgive his brother and convey the narrative to a peaceable declaration. It is non merely here nevertheless, that we find clip to be a utile secret plan device. One should besides pay attending to the assorted departures on within the drama such as Pospero s remarks on the brevity of life # 8211 ; every bit good as the rubr ic of the drama itself. We will write a custom essay sample on Time And The Tempest Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page To get down with we shall look at the rubric The Tempest which serves to keep a dual significance. Whilst the word Tempest of class can be seen to mention to the great storm that is used by Prospero to incarcerate his prisoners on the isle, every bit good as the storm of emotion invoked in the characters an the instability of power amongst them caused by the state of affairs, there is another ground why The Tempest is such an disposed name. Indeed, why did Shakespeare non call it The Storm or some other such equivalent words? I believe this stems from its sound. The word s foremost half is temp stemming from the Latin tempestas, average clip, and can besides be seen in it s passage to English in pacing, which means clip, in relation to rush or degree of motion in action. This serves as a farther note to the spectator on the importance of clip, both in the drama s class every bit good as in it s implicit in subjects. The subject of clip in relation to its brevity besides appears as a running subject throughout The Tempest. Although it is merely genuinely noticeable when it comes to a caput with Prospero s address to Miranda and Ferdinand, in which he tells them non to worry about his attempted blackwash: be cheerful, sir: our revels are now ended: these histrions were all liquors, and are melted into thin air: And, like the groundless cloth of this vision Yea, which it inherit, shall fade out, And, like this unsubstantial pageant faded, Leave non a rack behind: we are such material As dreams are made on, and our small life, Is rounded with a slumber. It is here that we see Prospero s plaint on his age and ailing wellness, take a firm standing the young persons non worry about his public assistance, as he is old and that life is excessively short for concerns and declinations. It is possible to see here that possibly Shakespeare has created Prospero as a contemplation of himself, and that these ar e similar ideas to his as he wrote the drama ; sing his age ( early 50s ) at the clip of composing The Tempest and the fact that its release coincided approximately with the clip of his retirement. This could in fact be the beginning of the drama s inspiration as many of its concurrent subjects stem rather closely to this Carpe Diem political orientation. In fact it s whole gay nature seems to stem from this thought of life being excessively abruptly for concern, sorrow, animus, and other such negative emotions. Music, which besides seems to play a instead major function in The Tempest, seems to function as a reminder of this besides. Siting on a bank Crying once more the male monarch my male parent s wreck, This music crept by me upon the Waterss ; Stilling both their rage and my passion. Here we see Ferdinand s liquors roused by the sound of Ariel s music, reminding him the futility of keening what is past and to look towards the beauty of the present. In the declaration of The Tempest we can see Shakespeare s commentary on forgiveness through the transition of clip. Whilst many critics view this as the drama s primary weak point, believing its signifier simply to be a instead weak effort at weaving it up with a peaceable stoping in order to follow with authoritative amusing signifier ( this depends on whether 1 was to really category this as a comedy ) , I believe that given the instead deep content involved every bit good as it s embracing of so many genres ( ie love affair, play, phantasy every bit good as comedy ) , such accusals are badly founded. As Prospero s program are eventually coming into fruition, he eventually realises after a conversation with Ariel that Yet with my nobler ground, gainst my rage Do I take portion: the rarer action is In virtuousness than in retribution: they being penitent, The exclusive impetus of my purpose doth extend Not a frown further. Here he convinces himself that retaliation is non necessary . He shall admit his offender s repentance and forgive their workss in order to travel on ( albeit with some recompense ) , and non go on the short balance of his life in malice. It is here besides in the shutting scene that we see Prospero/Shakespeare keening that he hopes to see the nuptial Of these our dear-beloved solemniz vitamin D ; And thence retire me to my Milan, where Every tierce thought shall be of my grave. Another distinctive feature of this drama is besides the baffled nature of clip s ain transition throughout. Each character seems to hold their ain typical feeling of the narrative s length. Ariel for illustration, spends the full drama numbering the proceedingss til his eventual release which he knows will merely come at the decision of these events. Prospero, on the other manus, passes the clip rapidly ; we see how he has been fixing twelve old ages for this event, and he know he has much to make in the three or so short hours that ensue: the really infinitesimal commands the ope thine ear is another good indicant of his realization that this timing is short and important as his life s works reach their zenith. Of class there is besides Caliban, Trinculo, and Stephano who, whilst being together on the island, all seem to hold wholly different dockets and therefore different impressions of the passing of clip: Caliban becomes excited by the impression of happening a new God and like Ariel herb of graces every minute he has to wait before the hr of Prospero s repose when Stephano has promised to assassinate him, whilst Stephano and Trinculo appear more than happy to roll around in a bibulous daze with really small respect to where or when they should be. This of class discontents Caliban and motivate his reminder I will hold none on T: we shall lose our clip And all be turned to cirripeds, or to apes With brows villanous low. On the other manus, nevertheless, the full island is seen to be encapsulated in thaumaturgy and enigma. Within the charming circle Prospero has created to pin down his prisoners existent clip ( as opposed to the sensed transition of clip single to each character ) seems to take on a slow, phantasmagoric quality that weighs everybody down and makes the events appear to happen in a sleepy, surreal manner. Such deformation helps farther impart a sense of mysticism and enigma to The Tempest. So every bit should by now be seen, clip plays a major, non wholly unsubversive function in Shakespeare s concluding farewell to theatre. Despite it s slightly deficient in deepness of content there is still a universe of beauty and elaborateness here to be seen. Through the usage of linguistic communication and characters, Shakespeare has managed to get the hang the usage and the impression of clip and its assorted signifiers of use, to enrich this moony comedy/romance/drama in ways perchance no other adult male could.

Tuesday, November 26, 2019

dazed and confused vs the breakfast club essays

dazed and confused vs the breakfast club essays The carefree years vs. the petty years At one time or another, a movie is made about every generation. Dazed and Confused is for the 1970s group of Americans (during the coming of age) when bellbottoms and marijuana were the fashion, drinking and driving had yet to become unthinkable, and safe sex was used only to avoid pregnancy. The Breakfast Club is a remembrance of the 1980s era of pegged jeans, glitter and leg warmers, when AIDS started but only through rumors, and drugs were the only escape. Throughout the precedent decades teens in schools across the country experience a society that consists of social groups, also known as cliques. Cliques, which are natural to American society, can take the concentration off of the anxiety and reason each teenager sets foot in a high school. Dazed and Confused and The Breakfast Club are perfect examples of the typical American high school. Dazed and Confused follows the lives of various groups of teenagers, during the last day of school in 1976, as they stray around their hometown. The movie is all about their philosophies on life, work, love and especially their futures that we never hear about. Among the characters, there is Randall Floyd a young football player, pressured into choosing between being drug-free or authority-free. Then there is Mitch, an upcoming high school freshman trying to fit in, who spends the day running away from the senior hazing team, while attempting to hang out with the older crowd. Its a time when everyone wastes their lives away in the carefree high school years together no matter who you are. The movie is not only funny and entertaining. It is a historic document of life, and is one of the most honest teen movies in the movie archives. The message of the movie is not much but to stand up for what you believe and resist all authority. Dazed and Confused captures the "have fun now before it's too late" state of mind...

Friday, November 22, 2019

AntiWar Movement

The antiwar movement against Vietnam in the US from 1965-1971 was the most significant movement of its kind in the nation’s history. After evaluating different social theories such as: Functionalism, Conflict and Interactionism, I have decided to classify the Anti-War movement during the Vietnam War as a Conflict Theory. I feel the Anti-War Movement’s has characteristics of Neo-Marxism. Though the first American protests against U. S. intervention in Vietnam took place in 1963, the antiwar movement did not begin in diligence until two years later, when President Lyndon B. Johnson ordered massive U. S. military intervention and the sustained bombing of North Vietnam. Chambers) 2000. In the spring of 1965, â€Å"teach? ins† against the war were held on many college campuses. The Anti-War Movement was centered on America’s higher-education system, the students, playing leading roles. Teach-ins were extreme, massive public protests. By 1968 Protesters numbered close to seven million and over half of them were Caucasian college students. The teach-ins were primarily peaceful, but effective. They were successful in capturing the attention of the public as well as those in government. The motivation behind teach-ins were just that, with the hopes of further escalation in Vietnam to slow down or come to a halt. In April 1965, President Johnson gave a major Vietnam address at John Hopkins University, in response to the growing campus protest activity. This speech marked the political impact of campus demonstrations. (Electric Library) This is an example of Neo-Marxism. The protestors were getting a partial system change. They had the attention of the public, and most importantly the government. However, by 1967 a lot of anti-war activists began to think peaceful protests were not going to be enough to influence war policy, so they began using civil disobediences, strikes, public disruption, shouting at government speakers and guerilla theatre to get their message heard loud and clear. In March 1967, a national organization of draft resisters was formed. In April 1967, more than 300,000 people demonstrated against the war in New York. Six months later, 50,000 surrounded the Pentagon, sparking nearly 700 arrests. By this time it became typical for, senior Johnson administration officials to encounter demonstrators when speaking in public, forcing them to restrict their outside appearances. Many also had sons, daughters, or wives who opposed the war, fueling the sense of attack. Prominent participants in the antiwar movement included Dr. Benjamin Spock, Robert Lowell, Harry Belafonte, and Rev. Martin Luther King, Jr. With prominent leaders extending their support in the movement it gave the activist a great deal of motivation and validation. The social theory of Neo-Marxism was in full effect. By 1968, the Johnson administration realized the impact of widespread public opposition to the war and the troubling prospects in Vietnam, causing them to put a halt on the bombing of North Vietnam and to stabilize the ground war. This policy reversal was the major turning point. U. S. troop strength in Vietnam would climax at 543,000 (Chambers) 2000. The antiwar movement reached its peak under President Richard M. Nixon. In October 1969, more than 2 million people participated in Vietnam Moratorium protests across the country. The following month, over 500,000 demonstrated in Washington and 150,000 in San 4 Francisco. Militant protest, continued to spread, leading many Americans to wonder whether the war was worth a split society. And other forms of antiwar activity lingered on. The Nixon administration took a host of measures to dull the movement, mainly mobilizing supporters, smearing the movement, tracking it, withdrawing U. S. troops from Vietnam, instituting a draft lottery, and eventually ending draft calls. Once U. S. troops began coming home, the antiwar movement gradually declined between 1971 and 1975 (Chambers) 2000. The American movement against the Vietnam War was the most successful antiwar movement in U. S. history. The Neo-Marxism social theory is easily applied to the Anti-War Movement. The characteristics of the conflict were disorder, boycotts, intense conflict, commitment, and emotional involvement all of which resulted in system change. The activists involved in the Anti-War movement of this time were passionate and dedicated to seek change. They sought out peace and love for our Country and did not lose sight of their objective. They went to great lengths to achieve what seemed like the impossible. References http://www.encyclopedia.com/doc/1O126-VietnamAntiwarMovement.html AntiWar Movement The antiwar movement against Vietnam in the US from 1965-1971 was the most significant movement of its kind in the nation’s history. After evaluating different social theories such as: Functionalism, Conflict and Interactionism, I have decided to classify the Anti-War movement during the Vietnam War as a Conflict Theory. I feel the Anti-War Movement’s has characteristics of Neo-Marxism. Though the first American protests against U. S. intervention in Vietnam took place in 1963, the antiwar movement did not begin in diligence until two years later, when President Lyndon B. Johnson ordered massive U. S. military intervention and the sustained bombing of North Vietnam. Chambers) 2000. In the spring of 1965, â€Å"teach? ins† against the war were held on many college campuses. The Anti-War Movement was centered on America’s higher-education system, the students, playing leading roles. Teach-ins were extreme, massive public protests. By 1968 Protesters numbered close to seven million and over half of them were Caucasian college students. The teach-ins were primarily peaceful, but effective. They were successful in capturing the attention of the public as well as those in government. The motivation behind teach-ins were just that, with the hopes of further escalation in Vietnam to slow down or come to a halt. In April 1965, President Johnson gave a major Vietnam address at John Hopkins University, in response to the growing campus protest activity. This speech marked the political impact of campus demonstrations. (Electric Library) This is an example of Neo-Marxism. The protestors were getting a partial system change. They had the attention of the public, and most importantly the government. However, by 1967 a lot of anti-war activists began to think peaceful protests were not going to be enough to influence war policy, so they began using civil disobediences, strikes, public disruption, shouting at government speakers and guerilla theatre to get their message heard loud and clear. In March 1967, a national organization of draft resisters was formed. In April 1967, more than 300,000 people demonstrated against the war in New York. Six months later, 50,000 surrounded the Pentagon, sparking nearly 700 arrests. By this time it became typical for, senior Johnson administration officials to encounter demonstrators when speaking in public, forcing them to restrict their outside appearances. Many also had sons, daughters, or wives who opposed the war, fueling the sense of attack. Prominent participants in the antiwar movement included Dr. Benjamin Spock, Robert Lowell, Harry Belafonte, and Rev. Martin Luther King, Jr. With prominent leaders extending their support in the movement it gave the activist a great deal of motivation and validation. The social theory of Neo-Marxism was in full effect. By 1968, the Johnson administration realized the impact of widespread public opposition to the war and the troubling prospects in Vietnam, causing them to put a halt on the bombing of North Vietnam and to stabilize the ground war. This policy reversal was the major turning point. U. S. troop strength in Vietnam would climax at 543,000 (Chambers) 2000. The antiwar movement reached its peak under President Richard M. Nixon. In October 1969, more than 2 million people participated in Vietnam Moratorium protests across the country. The following month, over 500,000 demonstrated in Washington and 150,000 in San 4 Francisco. Militant protest, continued to spread, leading many Americans to wonder whether the war was worth a split society. And other forms of antiwar activity lingered on. The Nixon administration took a host of measures to dull the movement, mainly mobilizing supporters, smearing the movement, tracking it, withdrawing U. S. troops from Vietnam, instituting a draft lottery, and eventually ending draft calls. Once U. S. troops began coming home, the antiwar movement gradually declined between 1971 and 1975 (Chambers) 2000. The American movement against the Vietnam War was the most successful antiwar movement in U. S. history. The Neo-Marxism social theory is easily applied to the Anti-War Movement. The characteristics of the conflict were disorder, boycotts, intense conflict, commitment, and emotional involvement all of which resulted in system change. The activists involved in the Anti-War movement of this time were passionate and dedicated to seek change. They sought out peace and love for our Country and did not lose sight of their objective. They went to great lengths to achieve what seemed like the impossible. References http://www.encyclopedia.com/doc/1O126-VietnamAntiwarMovement.html

Wednesday, November 20, 2019

Discrimination and Male-Female Earnings Essay Example | Topics and Well Written Essays - 5500 words

Discrimination and Male-Female Earnings - Essay Example Even so, in terms of pay, women are seen to receive less than men. Research has shown that on similar levels of an organizational hierarchy, men make almost twenty-five percent more than that earned by women. Many experts are of the opinion that pay discrimination is a myth in present globalized economy. They are of the opinion that such pay differentials largely occur due to certain social factors such as, a difference of education, choice of job and difference in career objectives. Hence, it cannot be adequately termed as discrimination. Even after taking into account such factors, it has been observed that unfair discrimination of wages still exists. Women in the modern economic world constitute almost half the workforce in most industries. Women, although are not the primary, are considered as equal breadwinners in five out of ten families in most developing nations. In most societies, women obtain similar or even more education than men. Yet, it is seen that most institutions pr efer paying women lesser. The studies conducted over gender discrimination of wages suggest that if the wage gap continues to widen as its present level, then it would take another fifty years for women to earn at the same level (Gardeazabal and Ugidos 165). Women continue to be discriminated in respect of pay, hiring, and promotions. These factors have become so common in the workplace that women have begun accepting them as part of their work life. Â  The first few years after graduation are the most important period for both men and women in respect of starting and setting up their career paths. At this time, both the counterparts are young, unmarried and have very little or no job experience.

Tuesday, November 19, 2019

Case Study article, Labor Force Participation of Men and Women in the Essay

Case Study article, Labor Force Participation of Men and Women in the U.S. Economy, - Essay Example milarly, with more women now opting to work, fathers are also forced to look after their children and hence men participation in the workforce has seen a decline. Another reason for the increase in the women participation is the introduction of birth control and family planning programmes. This again has relieved women from their conventional household duties. All these points seem valid but the author fails to comment on the sustainability of these changes. I believe these changes will be short lived. In the long run, the decline in birth rate will mean that less labor force will be available for economic development and GDP will fall at a faster rate with less young and energetic people working in the economy and older people retiring early. The increase in women participation should be, therefore, taken as more of a problem then something to be happy about as it would harm the economy in the long

Saturday, November 16, 2019

The Wasp Factory Essay Example for Free

The Wasp Factory Essay After the bleakly comical last line of the first chapter, we are introduced to the routines of Frank, and the meticulous detail that he attaches to them.  In the opening passage, we are reminded of the fact that he lives on an isolated island, which can be considered as a key gothic theme, that of a removed or mysterious setting for the plot to unravel. A gothic story always seems to employ a setting that has particular obscurity or mystery, one that is removed from society. The ruins of gothic buildings gave rise to multiple linked emotions by representing the inevitable decay and collapse of human creations. Protestants often associated medieval buildings with what they saw as a dark and terrifying period, characterised by harsh laws enforced by torture, and with mysterious, fantastic and superstitious rituals. On page 22, Frank describes his actions of killing a jellyfish while running along the beach. His actions are described in painstaking detail, to the extent that the entire passage could probably be shortened down to a few sentences. This helps to reinforce the impression that Frank is fundamentally an unhinged persona, describing his actions in an almost autistic manner. Secondly in this instance, we are presented with the uncanny, a term coined by Freud as the class of frightening things that leads us back to what is known and familiar. We recognise the features of Franks life which are in accordance with that of a modern society. The quotidian things that he talks about we can (generally) relate to. However it is the contrast between these everyday terms and things like the sacrifice poles that creates the typical gothic tool of the uncanny. On the one hand we can relate to some of Franks views, but on the other we are shocked by the gruesome and graphic nature of his actions. On pages 23-24, Frank describes the wars that he enjoying carrying out. Ostensibly, these are simple childlike war games, something we are all familiar with, but Frank takes it a step further, employing real explosives, something that is not so normal. His obsession with his routine which must be carried out exactly the same every time also makes use of another gothic feature, that of a ritualistic aspect. This coincides particularly with the mood and themes of the Victorian gothic novel, with their morbid obsession with mourning rituals, mementos, and mortality in general.There is something sinister about the fact that Frank feels the need to return to the sacrifice poles in order to smear blood on them and consequently mark his territory. By doing so, he is further cutting himself off from the rest of the world by stating that they are not allowed onto his land, and what will happen if they do. Another typical feature of Gothic Fiction that of graphic violence or suffering. The description of the violence coincides with Franks detailed approach to life in general. Acts of violence are described in a clinical manner. It is from this that the true horror emerges. Violence is portrayed as cold and menacing, so that the killer is very methodical in his or her ways. Certainly Frank embraces the need to document his every move when he kills a large rabbit, even going as far as to say that he slit the buck in the anus. The Wasp Factory is very much a Gothic novel. Apart from all the elements included above, it also hold true to that other staple of Gothic Fiction, the idea that the Gothic Novel transcends time. Whether set in the Victorian Era, the 18th Century or the modern day, the themes stay the same. The idea is that while times may change, the fundamental elements of the Gothic are eternal and universal.

Thursday, November 14, 2019

Authors Playing With Our Emotions Essays -- The Fear, Speaking Bittern

Authors Playing With Our Emotions in Robert Frost’s â€Å"The Fear†, Chuck Palahniuk’s â€Å"Speaking Bitterness†, Shirley Jackson’s â€Å"The Lottery†, and Flannery O’Connor’s â€Å"A Good Man Is Hard to Find† Some authors are very clever in the way they toy with our emotions. It is not uncommon to find yourself giggling at a story while simultaneously realizing you probably should not be laughing at something that is actually quite gruesome. These mixed emotions are stressful for a reader, and this anxiety is an author’s way of creating paranoia. Paranoia is a fear caused mainly by extreme anxiety, and in many cases the anxiety is a result of dissonant emotions that create tension. Robert Frost’s â€Å"The Fear†, Chuck Palahniuk’s â€Å"Speaking Bitterness†, Shirley Jackson’s â€Å"The Lottery†, and Flannery O’Connor’s â€Å"A Good Man Is Hard to Find† all utilize dissonant emotions to cause stress for the reader. Frost and Palahniuk focus on the conflict between fear and a lack of reason for fear. Jackson and O’Connor focus on the dissonance between humor and gore, and also the conflict between a need to feel sympathy for a character and a lack of connection to said character. But there are also the fearless, bold, and strong-minded people. There are people who may not be affected by the tricky ways of these authors. However, they are the exceptions, and just because they do not feel it does not mean they are not supposed to. Despite these exceptional people, authors design their stories specifically to include the tension from dissonant emotions in order to elicit paranoia-related anxiety. It is natural to want to identify the source of an emotion, so when authors create an overwhelming sense of fear without explanation, the reader experie... ... author wants them to be guided. The paranoia aspect is a theme that the authors are trying to utilize as a means to a certain end of their choosing, and that is why they induce such anxiety in their readers. A sense of paranoia is elicited by the tension created by conflicting emotions. Works Cited Frost, Robert. â€Å"The Fear†. Robert Frost’s Poems. New York: St. Martin’s, 2002. 107-111. Print. Jackson, Shirley. â€Å"The Lottery†. The Story and Its Writer: An Introduction to Short Fiction. Ed. Ann Charters. 8th ed. Boston: Bedford/St. Martin’s, 2003. 586-592. Print. O’Connor, Flannery. â€Å"A Good Man Is Hard to Find†. The Story and Its Writer: An Introduction to Short Fiction. Ed. Ann Charters. 8th ed. Boston: Bedford/St. Martin’s, 2003. 1042-1053. Print. Palahniuk, Chuck. â€Å"Speaking Bitterness†. Haunted. Chuck Palahniuk. New York: Doubleday, 2005. 258-268. Print.

Monday, November 11, 2019

High School Reunions Essay

An observation of a high school re-union was followed by an interview with two of the people attending for this ethnography. The two attendees used for the interview were one male and one female. After identifying some of the possible rationales regarding the culture of the reunion in the observation, the interview was conducted on the basis of the rationales. This was then analysed and compared to some of the findings from cultural research and theory before a conclusion of sorts was made. Observation The group environment and context for the observation was that of the Aliso Niguel High School Class Reunion, Class of 1999. The High School is located in Aliso Niguel CA. The reunion being observed took place in Irvine, CA. There were approximately 300 people present. The general patterns of behaviours amongst the people consisted of lots of mingling and idle chat. Some of the people were notably more reserved than others. It seemed as though the single people were working harder to start conversation and were far more approachable. In contrast, couples didn’t seem to portray the same type of inviting body language when on their own, but became more confident when with a spouse or friend. Approximately, 80% of the attendees held drinks in their hand as a norm and there were also presents and cards being exchanged from the outset. From overhearing the participant’s conversation it seemed as though many of them still lived in the Southern California area and this became a main source of conversation throughout. The interaction was generally based upon excitement, smiling and heightened voices at notably louder than normal volume. With regards to dress codes, there didn’t seem to be much evidence of diversity. This was particularly notable in the case of the females. The majority of them had light hair past their shoulders and the clothing style that was adopted by the attendees was strikingly similar. There were very few obese or overweight people that attended. These people perhaps did not attend as failed invites were not taken. There were clear indications of sub-groups at the gathering, although they seemed to carry conversation with the rest of the attendees in accordance with the larger group. Amongst the males there were indications of many stereotypes such as â€Å"meat head† or â€Å"gym jocks†, as I overheard one female state. Although as many of these people are now approx. 27-30 years old, it was harder to categorize them in such terms. There did seem to be a stronger merge between coupled groups and singled groups rather than any cross over. There appeared to be a symbol of people trying to meet a certain criteria throughout. For instance, there was a group of approximately 15 females. I overheard that all of them got married within the last 2 years and many of them either attended and/or where present at each other’s wedding. This could be indicative of a desire to follow patterns and trends in behaviour as though as everyone else is getting married then so must they, so that they aren’t left behind. Contrastingly, the males seemed to compare status in relation to possessions, such as career, cars, and houses paying particular attention to the location of the houses. There appeared to be a great deal of stereotypical role playing. This was perhaps due to the situation and the fact that earlier identities were known by other attendees. Expectation of success may have accentuated the desire for the attendees to exaggerate their status so as to appear successful. I felt that many of the attendees really liked re-living the past. They may have either really enjoyed their high school years, or were very curious as to what their classmates were doing now. However, this could also be a test of identity or serve as a self measuring experience on the basis of their peer’s behaviours and successes. Interviews The questions that I asked were qualitative, semi structured and thematic in nature focusing mainly upon stereotypes and reasoning. This was to see if the thoughts of the interviewees compared with what seemed apparent about the culture of the re-union gathered from the observation. That is to say, was this something of a self regulation exercise for the attendees or was it an exercise in cultural normality? On being asked for their reasoning in relation to the re-union, the male interviewee stated that: ‘No one takes it seriously. Certainly not me. ’ The second female interviewee stated in relation to the same question that: ‘You kinda get to know everyone personally again‘. These responses suggested two different rationales. In the case of the male, it appeared as though the reunion was something of a casual affair that could turn out to be fun as long as it wasn’t taken seriously or that anything was invested in the occasion. Whereas the female’s response indicated that there was a personal form of intimate gratification involved in seeing other people again. The latter response would suggest that there is some form of self regulation going on in relation to peers (Devine, 1989). Whether this was merely for the purposes of satisfying interest or to measure oneself against the progress of other peers was less clear (Tajfel, 1982). On being given and questioned about some of the stereotypes of others observed at the re-union, the male interviewee stated that: ‘The stereotypes you have mentioned are generally applied to people you haven’t interacted with. They’re based upon ignorance. They go away once you get talking’ This indicates a difference between known and unknown people, which is common in western individualistic society (Hofstede, 2001). It appeared that the male attendee was not willing to accept or perhaps did not realise the significance of stereotypical role playing and instead took everyone at face value once a conversation took place with another. This rejection of stereotypes was also found in the response of the female attendee who stated that: ‘I don‘t really know, I always talk to people at parties and they always seem friendly, bar one or two. Is that a stereotype? †¦ha ha! ’ This raised some interesting points. For instance, although the attendee may well have pre-conceived notions about certain stereotypes, the individuals may have felt that they were the only people that perceived them in that way (Devine, 1989). Due to the experience of the situation that reinforced certain social norms, this stereotype may diminish or grow regardless of the former social group. This was put forward by Gudykunst, who suggested that, â€Å"Some of our stereotypes are unique and based on our individual experiences, but some are shared with other members of our in-groups. The stereotypes we share with others are our social stereotypes. We may know what the social stereotype of a group is, but still hold a different view of the group. † (Gudykunst, 1997, p127) On asking about what they felt they had gained from the experience of the re-union and what others may have also gained, the male attendee stated that: ‘I found out all the different directions that people have taken. It’s not just about getting married, buying a house and having kids. Most people have branched right out since then’ The second female attendee stated in relation to the same question that: ‘I feel good that everyone seems to be doing so well. Everyone’s the same, but do their thing differently, if you know what I mean’ The notion of difference was clear in the responses of the interviewees. It would appear that although the roles and social norms were fairly similar and the content of the conversations were uniformly based upon success, the overview was based upon everyone’s success and happiness maintained through a degree of different life styles. This was again perhaps unsurprising given the individuality that is so common to western cultures (Hofstede, 2001). The emphasis on success and progression was also unsurprising for similar reasons. However, the amount of actual difference that was displayed at the re-union in terms of dress code and normative behaviour could be seen in contradiction of this difference (Tajfel, 1982). It would appear that such difference was only referred to in conversation rather than in actual behaviour. It would appear that sub-cultures were compromised at the re-union and stereotypes were overlooked as long as the attendees followed the correct social norms whilst at the re-union. Bibliography Devine, P, G. , (1989) Stereotypes and Prejudice: Their Automatic and Controlled Components. Journal of Personality and Social Psychology, 56, 5-18. Gudykunst, W. , & Bond, M, H. , (1997) Inter-group Relations Across Cultures. In J. W. Berry, M. H. Segall, & C. Kagitcibasi (Eds. ) Handbook of cross-cultural Psychology: Social Behaviour and Applications, 3, 119-161. Hofstede, G. (2001) Culture’s Consequences, Thousand Oaks, CA: Sage. Tajfel, H. , (Ed. ) (1982) Social Identity and Inter-group Relations London: Cambridge University Press.

Saturday, November 9, 2019

Economic freedom Essay

Does economic freedom help explain why the standard of living improves in some countries and declines in others? First of all we have to understand, what economic freedom is? Economic freedom according to William W. Beach and Tim Kane, PhD. â€Å" Economic freedom is that part of freedom that is concerned with the material autonomy of the individual in relation to the state and other organized groups. An individual is economically free who can fully control his or her labor and property.† (Taken from 2007 Index of economic freedom chapter no.3 by William W. Beach and Tim Kane, PhD). Or in simple words we can also say that everybody in his or her own country is said to be economically free, if their respective government protects their rights in every possible way and without any constraint. i.e. if an individual wants to learn anything, to do any kind of business or wants a job, then, he or she has a right to do that, while it is the responsibility of the government to make it convenient and possible for them. The first study of economic freedom was published in the year 1995, and it was improved over the years. There are about ten different types of economic freedoms, which are known as index of economic freedoms. The main purpose of defining these freedoms is to rank the countries in order to pave the way for foreign investment. Following is the list of ten economic freedoms: (taken from 2007 Index of economic freedom from chapter no.3 by William W Beach and Tim Kane, PhD). 1) Business freedom: To check the status of starting, operating and closing any business in how much time. 2) Trade freedom: To check the barriers and constraints in tariffs, import and export in the country. 3) Monetary freedom: To check the measure of price stability and how governments are controlling the prices, inflation etc. 4) Freedom from government: To check either state is providing public goods with minimum expenditure or not. 5) Fiscal freedom: To check the burden on the government with respect to revenue side. 6) Property rights: To check whether the public have keeping the private property rights, defined and secured by the laws, and are clearly defined by the government. 7) Investment freedom: To check whether the government deserves to have the foreign investment or not. 8) Financial freedom: To check the operation of financial institutions i.e. banking systems; are they out of government control or not. 9) Freedom from corruption: To check the status of corruption in the society, i.e. in the business system, judiciary, and administrative system in the country. 10) Labor freedom: To check the status of growth of labor and business either they are working without government interruption or not. (Taken from 2007 index of economic freedom from chapter no.3 by William W Beach and Tim Kane, PhD). Each one of the ten freedoms is measured on a 0-100 percent scale, 100 as the maximum freedom while 0 is the least or minimum freedom. The study of economic freedom was conducted on about 157 countries of the world. To show how it works, I choose two countries that are North Korea and South Korea. North Korea has a communist form of government and is ranked at no.157 in the index of 157 countries, its economy is 3% free. It has exports of $1.3 billion, it exports: minerals, metallurgical products, manufacturing (including armaments), textiles, fishery products etc. and imports of   $2.3 billion, it imports: petroleum, coking coal, machinery and equipment, textile grains etc. In communist form of government every asset in the country belongs to the state, therefore there is no business freedom i.e. 0 % (in 0-100 % scale) in N. Korea. Also government controls all the imports and exports so trade freedom i.e. 0 % is also nil. No data on income or corporate taxes is available so fiscal freedom i.e. 0 % is also zeroed. Also government owns all the property including businesses therefore freedom from government i.e. 0% is also nil. No publicly record of inflation data therefore monetary freedom i.e. 0% is also zero. Also no private financial sector, therefore financial freedom i.e. 0% is also nil. Wages and incentives are also controlled by government therefore labor freedom i.e. 0% is also nil, also corruption is heavily present in the country so corruption freedom i.e. 10% is also negligible, but there is some investment freedom i.e. 10%, after the opening of foreign investment zone in the far remote area of rajin sonberg where basic facilities are also not provided till date. The government does not cover property rights i.e. 10%, so they are also negligible.   (Taken from 2007 index of economic freedom from chapter no.5). While South Korea has democratic form of government and it is ranked at no.36 out of 157 in the index of economic freedom, and its economy is 68.6% free. S. Korea has export of $299.2 billion, it exports: semi conductors, wireless telecommunication, equipment, motor vehicles, computers, steel, ships and petrochemicals etc. It has imports of $269.8 billion, it imports: machinery, electronics, electronic equipment, oil, steel, transport, organic chemicals and plastics etc. As South Korea has democratic form of government, in that form, the government tries every possible effort to please its citizens, therefore starting, operating and closing the business in that country is relatively easy, there is a lot of business freedom i.e. 83.1% present in the country. S. Korea as compared to N. Korea has good trade freedom i.e. 64.2% present but there are some restrictions in its some activities like import, non-transparent regulations and standards etc. S. Korea has high income tax rate of about 38.5% and relatively low corporate tax of about 27.5%, so we can say that it has a good fiscal freedom i.e. 0-100 bracket it has about 81% free. After the foreign investment promotion act of Nov 1998 the government opens the doors to foreign investment in almost every sector except media, electric power and some agricultural sectors, and also residents and non residents can now holds foreign exchange accounts, so there is a lot of investment freedom i.e. about 70% free. The private property right i.e. 70% is secure by the government; corruption i.e. 50% is present at some extent in the country. The labor i.e. 57.7% market is working under restrictive employment regulations due to which employment and production growth rate is very low. Government interference in private sector is negligible, so freedom from government is 81.5%. The government regulates the prices in some sectors like agriculture, telecommunication and other utilities, which monetary freedom 79%, the government in retained some ownerships, second largest domestic bank is under them, which makes the financial freedom about 50% free. (Taken from 2007 index of economic freedom from chapter no.5).   In short economic freedom in South Korea is much superficial than North Korea, and it is mainly due to democratic and communism forms of governments, democratic people are enjoying the fruits of freedom while others do not.