Thursday, December 26, 2019

Library management system based on finger print and rfid - Free Essay Example

Sample details Pages: 20 Words: 5981 Downloads: 1 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Chapter 1:Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. Don’t waste time! Our writers will create an original "Library management system based on finger print and rfid" essay for you Create order The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thu s ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Lon Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as transponders. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatenergizes the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements ID Priority Details NR-02-001 1 Delivery: The system development process and deliverable documents shall conform to the process and deliverables defined in the document CIIT-CE-02H Degree Project Students Handbook. NR-02-002 1 Standard: The standard of the final product shall be of undergraduate level or above. 3.2 External requirements ID Priority Details NR-03-001 3 Security: This is a degree project having no strict security requirements. NR-03-002 1 Ethical: The application will not use any type of un-ethical electronic material while project development and execution. NR-03-003 1 Legislative: The application shall not use any private or confidential data, or network information that may infringe copyrights and/or confidentiality of any personnel not directly involved in this product. NR-03-004 3 Safety: the application is safe and not harmful in any case. 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: ID Priority Details FR-01-001 1 PIC18F452 FR-01-002 1 MAX232 FR-01-003 2 NRF905 RF TRANSCEIVER FR-01-004 2 ID20 RFID READER MODULE FR-01-005 2 SM630 FINGERPRINT MODULE 3.3.2 Category 2 ID Priority Details FR-02-001 1 VISUAL STUDIO FR-02-002 1 MYSQL DATABASE APPLICATION FR-02-003 1 PROTEUS 7.6 FR-02-004 2 CCS COMPILER FOR PIC FR-02-005 1 PC EXPRESS FR-02-006 1 CIRCUIT MAKER 2000 FR-02-007 1 EASY PCB 3.3.3 Category 3 ID Priority Details FR-03-001 2 LM7805 REGULATOR IC FR-03-002 2 LM7833 REGULATOR IC FR-03-003 1 7 VOLTS POWER SUPPLY FR-03-004 1 BRIDGE RECTIFIERS Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 1 VCC 2 TRX_CE 3 CPCLK 4 AM 5 MISO 6 SCK 7 GND 8 TXEN 9 PWR 10 CD 11 DR 12 MOSI 13 CSN 14 GND 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 650s Figure 3 This transceiver was used because it has high data rate, long distance and low voltage consumption. Also it has some addition features like address matching, carrier detection alert and high noise immunity. 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 1 Power supply + 2 Module TX 3 Module RX 4 GND 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 1 GND 2 VCC 3 To external antenna and tuning capacitor 4 To external antenna 5 Card present 6 Future 7 Format Selector (+/-) 8 Data 1 9 Data 0 10 3.1 KHz logic 11 DC Voltage Supply 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output 7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. 1 C1+ + connector for capacitor C1 2 V+ output of voltage pump 3 C1- connector for capacitor C1 4 C2+ + connector for capacitor C2 5 C2- connector for capacitor C2 6 V- output of voltage pump / inverter 7 T2out Driver 2 output 8 R2in Receiver 2 input 9 R2out Receiver 2 output 10 T2in Driver 2 input 11 T1in Driver 1 input 12 R1out Receiver 1 output 13 R1in Receiver 1 input 14 T1out Driver 1 output 15 GND Ground 16 VCC Power supply The receivers reduce RS-232 inputs (which may be as high as 25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 H This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit via RF transceiver for further process. RF transceiver keeps on transmitting until it receives acknowledgment from the main unit that correct data is received. The antitheft unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The RFID reader is operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. 5.4 working of Fingerprint Module The fingerprint module contains four pins connection which are VCC, TX, RX and GND. As PIC 18f452 has only one built-in serial port. CCS C compiler has feature to create software serial ports. So PORT E( E0 , E1) made software serial port for Finger Print Module. TX pin of Finger Print module is pulled up with 10kohm resistor and connected to the PIN_E0 (RX) of PIC 18F452 and RX pin of finger print module is connected to PIN_E1 (TX) of PIC18F452. Syntax for creating software serial port: #use rs232(baud=57600, xmit=PIN_E1, rcv=PIN_E0, parity=N, bits=8, stream=ts) 5.4.1 Steps to add new finger print Syntax: 0x4D + 0x58 + 0x10 + 0x03 +0x40 + high byte of the to be added fingerprint ID + low byte of the to be added fingerprint ID + Check Sum. Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x40 + 0x31 + 0x48 If error occurred: 0x4D + 0x58 + 0x30 + 0x02 + 0x40 + 0x34 + 0x4B Flow chart of adding new fingerprint: 5.4.2 Steps to search Fingerprint Syntax0x4D + 0x58 + 0x10 + 0x05 + 0x44 + search high bytes of starting Fingerprint ID + search low bytes of low bytes + high bytes of the number of fingerprints searched + low bytes of the number of fingerprints searched + Check Sum. Response from Finger module: If fingerprint matched:0x4D + 0x58 + 0x30 + 0x04 + 0x44+ 0x39 + high bytes of ID for the found fingerprint + low bytes of ID for the found fingerprint + check sum If fingerprint not matched:0x4D + 0x58 + 0x30 + 0x02 + 0x44 + 0x3A + 0x55 Flow chart for search fingerprint 5.4.3 Steps to format finger print database Syntax0x4D + 0x58 + 0x10 + 0x01 + 0x46 + 0xFC Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x46 + 0x31 + 0x4E Flow chart for Formatting Fingerprint Database: 5.4.4 Steps toDelete fingerprint Syntax: 0x4D + 0x58 + 0x10 + 0x03 + 0x42 + high bytes of the to-be-deleted fingerprint ID + low bytes of the to-be-deleted fingerprint ID Response from Fingerprint module: If operation successful: 0x4D + 0x58 + 0x30 + 0x02 + 0x42 + 0x31 + 0x4A If error occurred: 0x4D + 0x58 + 0x30 + 0x02 + 0x42 + 0x35 + 0x4E Flow chart for deleting fingerprint: 5.5 Working of RF transceivers The RF transceiver used in the system had 14 pins, 2 of ground and 1 VCC. We use built-in SPI interface for transceiver module. SCK pin of RF transceiver is connected with SCK pin of microcontroller. SDI and SDO pins of RF transceiver are connected with SDO and SDI pins of microcontroller, respectively. DR pin of RF transceiver is connected to INT0 pin of microcontroller. TRX_CE, TXEN, PWR, AM, CD and CSN pins of RF transceiver are connected to RA0, RA1, RA2, RA3, RA5 and RC1 respectively. 5.5.1 Steps to Transmit Data: When the microcontroller has data for a transmitting, the address of the receiving node (TX-address) and payload data (TX-payload) are clocked into RF transceiver through the SPI interface. Microcontroller sets TRX_CE pin and TX_EN pin=1 (high), this activates RF transceiver for transmission. Radio is automatically powered up (PWR pin=1). Data packet is completed (CRC calculated, preamble added). Data packet is transmitted (50kbps, GFSK, Manchester-encoded). When data packet transmission is completed it sets Data Ready (DR) pin=1(high). If AUTO_RETRAN pin=1(high), the RF transceiver continuously retransmits the packet until it sets TRX_CE pin=0 (low). When RF transceiver sets TRX_CE pin=0 (low), it finishes transmitting the outgoing data packet and then it sets into standby mode (Sleep mode). Flow chart for transmitting Data through RF transceivers: 5.5.2 Steps to Receive Data 1) Receiving mode is selected by setting TRX_CE=1 (high) and TX_EN=0 (low). 2) After 650s RF Transceiver starts monitoring the air for incoming communication. 3) When the RF Transceiver receive a carrier at the receiving frequency 434 MHz, it sets Carrier Detect (CD) pin=1 (high). 4) When an address matches, it sets Address Match (AM) pin=1 (high). 5) When a valid packet has been received (correct CRC found), RF Transceiver removes the preamble, address and CRC bits from the data packet and sets the Data Ready (DR) pin=1 (high). 6) Microcontroller receives payload data from RF transceivers by SPI interface. 7) Microcontroller sets the TRX_CE pin=0 (low) to enter standby mode. 8) When all payload data is retrieved, RF transceiver sets Data Ready (DR) pin and Address Match (AM) pin = 0 (low) again. Flow chart for receiving data: 5.6 RFID Reader The RFID reader has 4 pins. VCC, TX, RESET, GND. PORT B (B7, B3) made software serial port for RFID reader. TX pin of RFID reader is connected to the PIN_B7 (RX) of PIC 18F452 and RESET pin of RFID reader is connected to PIN_B6 of PIC18F452. Syntax for creating software serial port: #use rs232(baud=9600, xmit=PIN_B3, rcv=PIN_B7, parity=N, bits=8, stream=RFID) RFID reader automatically detects RFID tag and sends its ID to microcontroller for further processing. Microcontroller reset RFID reader after receiving ID from it. Flow chart of RFID reader working: 5.7 Compiler used for microcontroller Microcontroller compiler used is CCS C compiler for PIC. This was used due to professional reasons. It provides a complete integrated tool suite for the debugging and developing embedded system running on Microchip PIC. The heart of this development tools suite is the CCS intelligent code utilizing C compiler which frees designers in order to concentrate on the design functionality instead of need to become an MCU architecture expert. 5.8Software implementation The student form is created in the visual studio tool. Various information is saved in it as per required for a student console. These forms are linked to the database contents. The student form is shown below: Figure 17 This is the form for saving the student record in the database. One the student record has been saved, every time the student places his finger or thumb on the fingerprint reader, its thumb string is compared in the database. Through an automatic system coded in the visual studio tool, the form which appears on the screen of the student login is as follows: Figure 18 In this form, the student information field is read only and cannot be edited. The book record field has the student library status, which has a checkbox for issued or non-issued status. 5.9Database system The data base structure is simple and consists of some details as under: CREATE DATABASE `LibrarySystem`; Table Name: CREATE TABLE student( `txt_name` VARCHAR( 30 ) NOT NULL , `txt_id` VARCHAR( 30 ) NOT NULL PRIMARY KEY, `txt_address` VARCHAR( 60 ) NOT NULL , `txt_library_status` VARCHAR( 20 ) NOT NULL , txt_finger_print` VARCHAR( 60 ) NOT NULL, txt_book_name` VARCHAR( 40 ) NOT NULL txt_book_name` VARCHAR( 60 ) NOT NULL, ) ; Chapter 6: Evaluation We have focused on thorough testing through-out the design and implementation phase. Starting from the theoretical design and ending at the practical implementation. In this procedure there were a lot of hurdles especially regarding the PCB design of the reader. The TRX7960 IC which was being used in the design of the reader was not available in Pakistan. It was imported from china which took a long time and thus shortening our time for the design of the reader. The tinning process required for the PCB design of the reader was quiet expensive and required much time. Thus we switched to the RFID module as it was much compatible with our system and easy to use. The wireless communication between the two units i.e. main and anti-theft unit was our first task successfully completed. Then the register calling of fingerprint module and setting its commands, and finally the code for the RFID module was accomplished. The design of the software side which consisted of the database, the studen ts form, and the interface between the data from the serial port and the database components was quiet an easy task. It was accomplished within few days. Although hundred percent of our system design was not accomplished, hurdles such as non availability of the reader IC in Pakistan and 2-3 months required for the accurate PCB design of the reader circuit, still there was much to learn and acquire. At the end, it is not about the hundred percent success that one gets, its about how much one has learnt from his failure. 6.1 Function Testing Before and after integrating the system, testing was done and the results were as follows: Testing Requirements PIC 18F452 and DC supply Requirement Tested CYCLE 1 CYCLE 2 FINAL STATUS DETAILS FR-03-001 Failed Ok Ok Regulator IC FR-03-002 Ok Ok Ok MAX232 IC FR-03-003 Ok Ok Ok SIP FR-03-004 failed Ok Ok Crystal oscillator FR-01-001 FR-01-002 Failed Failed Ok Serial communication Failed(dead) Failed(dead) Ok transceiver FR-01-005 Ok Ok Ok Fingerprint module 6.2 Results After thorough testing of the components, these were integrated together and the overall system faced failure more than four times. After recovering all the unexpected errors in the system, it started generating correct outputs. Then it was interfaced with the PC through serial communication which also faced much error. Finally all the data was sent to the PC and processed using visual basic and compared with the database components. Chapter 7: Conclusion and Future work 7.1 Conclusion The objective of our project Library Management System Based On Finger Prints And RFID was to design a system based on RFID technology that not only enhances the library security but also covers the idea of library automation. The final design of the project accomplished the idea of multinode environment and it is responsible for issuing books and the security of books through anti theft unit. This design also deals with the issues (reliable data transfer) of multinode environment. This project facilitates the users in numerous ways like time saving in issuing books, security, library management, categorizing and many more. 7.2 Future work Based on the ways in which some businesses are currently using radio frequency identification, people use to say that the world will be very different once readers and RFID tags are everywhere. In an RFID-enhanced future, the benefits would accrue not just to businesses, but also to consumers. Some benefits of RFID to the customers may include: Easy item returns: You might be able to return RFID-tagged items of apparel without a store receipt. The unique identifier in the tag would reference a database record with the time of purchase and the original price and even credit card information, if desired. Smart appliances: Your washing machine could choose its cycle setting based on tag information in the items to be washed. Your smart refrigerator could take inventory automatically, alerting you to expired or recalled foodstuffs, creating shopping lists automatically, and even searching the Internet to find recipes you can prepare with the items in the refrigerator. Your closet could alert you to what clothing it contains and what is out for cleaning and search the Internet for fashion advice Personalization: You might carry an RFID tag that stores (or references) personalization data. When you walk up to a clothing rack in a shop, LEDs might flash on the hangers with items in your size and preferred colours. Easy shopping: You could purchase or rent items by simply walking out of a shop with them. The RFID payment device in your pocket and the RFID tags in the items you carry would allow payment to be made automatically. RFID is said by many in the industry to be the frontrunner technology for automatic identification and data collection. The efficient use of this technology can greatly enhance the library environment and thus prove a technological milestone in the sector.

Wednesday, December 18, 2019

Desirees Baby, by Kate Chopin Essay example - 1137 Words

Throughout time, humans struggled with issues of conformity and individuality. In the modern world, individuality is idealized, as it is associated with strength. Weak individuals are usually portrayed as conforming to society and having almost no personal ideas. In â€Å"Desiree’s Baby†, a short story, the author Kate Chopin deals with the struggles of African descendants in the French colonies during the time of slave labor. The protagonist is a white woman named Desiree who is of unknown origin and birth as she was found abandoned as an infant at an aristocrat’s doorstep. Eighteen years after her discovery, she and a fellow aristocrat, Armand Aubigny, fall in love and get married. They soon have a child, yet conflict arises when the child†¦show more content†¦From this, the reader understands that Armand is attempting to assume a persona of the powerful aristocratic slave-owner. However, in this attempt, Armand demonstrates his very weakness: he is in secure and so must prove his strength. Another example of Armand’s weakness lies in his attempt to destroy all evidence relating to his relationship with Desiree. Armand feels that a marriage to a potentially black woman could be damaging to his to his place in society so he burns all of the evidence of her presence in his life: â€Å"In the centre of the smoothly swept back yard was a great bonfire, â€Å" (Chopin 13). Although it is true that during the setting of the story, such a marriage could have been damaging, if he truly were a strong character, he would have defended his own beliefs and maintained his marriage. A final example of Armand’s weakness is in his discovery of a letter from his mother to his father and the reactions implied by the author. The letter carries details about Armand’s own race and how he is actually black. Armand’s implied reactions are that he will in fact take no action: despite the fact that Desiree was not of Africa n descent, she will live her life in the belief that she is. This is the ultimate example of Armand’s weakness as he is too fearful of establishing his own identity to truly do so. Armand has been shown to be a weak, socially malleable character because of his internalShow MoreRelatedAnalysis of Desiree’s Baby by Kate Chopin1328 Words   |  6 PagesDesiree’s Baby and Southern Social Structure The short story Desiree’s Baby by Kate Chopin provides a sobering depiction of how the dark forces of prejudice and social hierarchy tore apart a plantation owning family in the state of Louisiana. Desiree’s character is that of a lady who carries the burden of being submissive to a domineering husband, a role she keeps until the very end of the narrative. Desiree is portrayed as an agent of light so to speak throughout the plotline but is seriously blindedRead MoreDesirees Baby by Kate Chopin Essay1239 Words   |  5 PagesImagine finding out that your entire life was a lie, and that every single thing you knew about your identity and your family was completely false! Armand Aubigny, one of the main characters in Desiree’s Baby by Kate Chopin, experiences this exact dilemma throughout this short story. Desiree’s Baby is a story about a young man and woman, who fall in love, but Desiree, who does not know her birth parents, is considered nameless. When s he and Armand have a child, they are both very surprised becauseRead MoreSymbolism In Desirees Baby, By Kate Chopin1120 Words   |  5 Pagesbut while leaving the reader guessing, hints are included to guide an inference. In Kate Chopins â€Å"Desirees Baby† she explores the ideas of racism and the idea that women are under men and are the cause of all problems, she also includes symbolism to portray a deeper meaning which is present in her other works. Although it is not blatantly said in the story, it can be inferred that Desiree killed herself and her baby near the end of the story. There is a sense of uncertainty yet prominent foreshadowingRead MoreEssay on Desirees Baby by Kate Chopin1317 Words   |  6 Pages Desirees Baby by Kate Chopin Desirees Baby is a short story written by Kate Chopin. It is set in 19th century Louisiana. The story starts with Madame ValmondÃÆ' © going to visit DesirÃÆ' ©e and her baby. She thinks back on her memories of DÃÆ' ©sirÃÆ' ©e as a baby: It made her laugh to think of DÃÆ' ©sirÃÆ' ©e with a baby. Why it seemed but yesterday that DesirÃÆ' ©e was little more than a baby herself. This quote tells us two things. The first is that Madame ValmondÃÆ' © must Read MoreForeshadowing And Symbolism In Desirees Baby By Kate Chopin701 Words   |  3 PagesIn the short story called â€Å"Desiree’s Baby† written by Kate Chopin, the author used many different literary elements to describe and build up many characters. But two of the one that stands out the most was the foreshadowing and symbolism. These elements helped to build up Desiree Valmonde, one of the main character in the short story. First thing first is the foreshadowing, since it was the first thing most of the reader noticed. After the couple-Armand Aubigny and Desiree Valmonde- got marriedRead MoreThe Concept Of Race In Dà ©sirà ©es Baby By Kate Chopin762 Words   |  4 Pages In her short story named â€Å"Dà ©sirà ©e’s Baby†, Kate Chopin gives readers an inside view of the concept of race in the pre-Civil War era of Louisiana. Chopin’s protagonist, Dà ©sirà ©e, clashes with societal standards because of her mixed-race child and unknown racial origins. Race becomes a major conflict throughout the story and drives Dà ©sirà ©e’s husband to blame her for the child. The ironic ending of the story not only gives a surprising twist but also makes a stand against the concept of biologicalRead More Symbolism in Desirees Baby by Kate Chopin Essay944 Words   |  4 PagesSymbolism in Desirees Baby by Kate Chopin Desirees Baby is Kate Chopins most well-known short story and most anthologized piece of work. The story takes place in southern Louisiana and her writing reflects her Creole-French descent. Chopin begins the story with a descriptive quote, when she reached LAbri she shuddered at the first sight of it, as she always did. It was a sad looking place...Big solemn oaks grew close to it and their thick leaved, far-reaching branches shadowed it likeRead MoreThemes And Summary In Desirees Baby, By Kate Chopin1242 Words   |  5 PagesSummary: The story of â€Å"Desirees Baby† by Kate Chopin opens up with Madame Valmondà © going to visit Desiree and her infant. On her journey to L’Abri, a plantation owned by Armand Aubigny, she reminisces about Desiree’s youth. Desiree was an abandoned baby found by Monsieur Valmondà ©. Madame Valmondà © trusted Desiree was sent to her by God as she was not able to have her own children. Eight years has passed and Armand Aubigny, the son of a wealthy cruel master, suddenly falls in love with DesireeRead More Desirees Baby by Kate Chopin Essay examples873 Words   |  4 PagesDesirees Baby by Kate Chopin Desirees Baby, by Kate Chopin, is a story about the effect love and pride have on our actions. Love changes people for the better. Love is patient and kind. Love is not jealous or boastful or proud or rude. Love does not demand its own way. Love is not irritable, and it keeps no record of when it has been wronged. It is never glad about injustice but rejoices whenever the truth wins out. Love never gives up, never loses faith, is always hopeful, and enduresRead MoreAnaylsis of Desirees Baby by Kate Chopin Essay881 Words   |  4 PagesProf. J. Wynter â€Å"Desiree’s Baby† In Desiree’s Baby, Kate Chopin shows how over valuing of white race and status can destroy a relationship and a family. Race and status are intangible ideas humans make up to segregate one another and should not be valued higher than a human life, but this is not the case in Desiree’s Baby.† Destructive behavior begins when the child is three months old; rumors of the baby’s race spark Armand’s imperious exacting nature. He notices the baby appears to be of

Tuesday, December 10, 2019

Importance of Closing Gap-Free-Samples for Students-Myassignment

Question: What is the Importance of Closing the Gap in the areas of education and training and health between the Indigenous and non Indigenous Communities of Australia? What is the evidence on these fronts? Answer: Introduction: The Australian government in 2008 committed to address the major indigenous disadvantage diagnosed in the national economy, the closing gap. The gap refers to the unequal spread between health condition and life expectancy of both indigenous and non-indigenous Australians (The Conversation, 2017). The inequality is crucially evident in shorter life expectancy of people, higher mortality rate of infants, poor health condition and alarmingly lower levels of education that further affects the employment condition of the nation. This report discusses why it is so important to eradicate the closing gap issue in education and health specially and what the probable effects the chronic issue exerts on the standard of living of different communities of Australia. Importance Of Closing Gap: For any developed or developing countries of the world, role of education is immense as it shapes and consolidates the human capital of the nation. Education is base for human to evolve over time to meet the needs of employment and contribute to gross domestic production. Even to generate awareness regarding health and maintaining a good health care system role of education and sector specific training is of great importance. Education paves the ground for productivity expedites the technological advancements creates awareness and move toward accumulation human capital. Greater the extent of training and health education higher will be the probability of healthy new children born with lower morbidity and infant mortality rate on the face of improved health care service. Australia as a nation falls in the upper-middle income to high income group with higher rate of per capita income that further allow the population to lead a decent standard of living. Most of the Australians access the benefits like higher life expectancies and higher rate of literacy both by male and female. The population of 24.13 million (2016) consist of indigenous and huge ratio of non-indigenous people (Together, 2017) . There is massive community of non-indigenous people consisting of aboriginal and Torres Strait Islander people. Even though the stats regarding demographics and education gives greater rate of improvement on an overall basis, the non-indigenous as well as part of indigenous communities in the nation fall victim of higher inequality in accessing education, health and other basic amenities of life. Closing gap as a government policy to deal with the issue of growing inequality is admirable but difficult to achieve sue to range of complexities stemming from factors like social, cultural and physical access to various programs. Closing gap initiative in education is linked intrinsically to various socio-economic issues like quality of health and health related services, employment, housing and rate of incarceration. All of these combines to shape up the social determination of success exerted from education. Moreover the higher rate of unemployment is Australia is also indicative of lack of skilled workforce besides the lack of opportunity to be employment for the skilled labors. The greater unemployment is sourced from those who lack educational background or proper completion of degrees leading to skewed skill set amid the labor force. The closing gap appears as chronic curse on the nation debilitating the national supremacy of Australia among the countries of the world (The Conversation, 2017). With passage of time if the gap is not bridged then it would lead toward sporadic inequality in the basic indicators leading to downgrading of the standard of living. Evidences: Health: The health study shows the aboriginals and strait islander people are expected to live 10-17 years lesser than the indigenous Australians. They are more prone to be affected with disease like heart attacks, kidney failures and diabetes. The mortality rates of Aboriginals and Torres Strait islander people in Australia are just the same as some of the most impoverished nation of the world. As per the United Nations Report published as The State of the Worlds Indigenous People (2009), Australia is one of the nation is the world with hideous indigenous and non-indigenous life expectancy gap (Together, 2017) . The discrepancy of infant mortality rate between 2008 and 2012 among indigenous and non-indigenous people has been evident in the rates that shows 6.2 newborn aboriginal infants die per 1000 babies while only 3.7 non-indigenous infant dies (closingthegap.pmc.gov.au, 2017). The non-indigenous girls live 84.3 years compared to 73.7 years expected life for the indigenous girls. The gap between boys is even more 69.1 years and 79.9 years respectively (UNICEF, 2017). Figure 1: Closing Gap in Health between Indigenous and Non-indigenous Population Source: (Prime Ministers Report 2017) Education: The study of the updates from closing gap policy it has been identified that the factors like access to early childhood education and improvement in literacy and numeracy rate have not met the expected level of target though the factor school completion and school attendance shows improvement to be on the track. While the target of 4-year-old children pre-school attendance in remote communities was set at 95% as of 2013, only 85% of them have been enrolled (UNICEF, 2017). The goal is yet set high and continued to progress towards it. Figure 2: Closing Gap in education between Indigenous and Non-Indigenous Population Source: (Prime Ministers Report 2017) The target regarding reducing the gap in reading, writing and basic numeracy to half by 2018 has not been on the track as 95.9% of non-indigenous students were up the national minimum compared to 77.1% indigenous students. The target of 90% in school attendance showed good results that further explained the link between absenteeism and social disadvantages academic performance (Together, 2017) . The gap of 20-24 years old attaining year 12 educational degree has been fulfilled with fall by 11.6% in 2013 showing remarkable improvement in this factor. In 2012-13 indigenous20-24 years old Year 12 or equivalent education was 58.11% compared with 87% for the non-indigenous Australians (closingthegap.pmc.gov.au, 2017). This has higher implication in health and employment of population. The unemployment rate amid indigenous was five times higher than the non-indigenous Australian was in 2012. Data reveals that between 2205 and 2015, there has been 93% hike in the aboriginals and Torres str ait islander students in attaining higher education with 47% growth for overall domestic students. The school attendance rate in 2016 amid the non-indigenous students re higher at 93.1% in contrast to the 834% of the indigenous students. Effect On Population: The implication of closing gap issue on national socio-economic health is immense. The wider inequality in accessing, attaining and absorbing the basic yet crucially important amenities of sound lifestyle like education and health actually influences the overall family wellbeing of the population. The gap between indigenous and non-indigenous population of Australia reflects into the inequality and gap between the two communities in terms of basic indicators. Indigenous population as almost 19.3% of the them live below the poverty line showing much worse condition in comparison with non-indigenous people who captures only 12.4% living below the line of poverty line (closingthegap.pmc.gov.au, 2017). More information conforming to the worse condition of the indigenous population of Australia is evident in the fact that 23% of them live in households mostly overcrowded in 2012-2013. The remote area captures even worse condition with higher proportion of 55-65% of people (Together, 2017) . The household they are living in are of unacceptable standards. 78% of their population are victim of poor quality, structure and facilities available in 2012-2013 (UNICEF, 2017). Median income of indigenous household is at $465 that is half of the income of non-indigenous household recorded at $869. This group is more vulnerable backed by the fact it captured higher rate i.e. 25-33% of hospitalization and violence related issues than other population. Even the indigenous new born of 49 per 1000 children were under intensive care in contrast with the 6 per 1000 children of non-indigenous community (UNICEF, 2017). Conclusion: From the national economic standpoint, the importance of closing gap is immense to promote equality and development within all the existing communities of the nation. Otherwise this would keep on adding more economic and social problems for the nation leading to chronic ailment affecting its growth overtime. This has pushed the government to be pro-active on the issue and take actions with targets set while allocating more investments in the sectors to confirm equality between the communities in terms of education, training and health. References Biddle, N. and Taylor, J., 2012. Demographic consequences of the Closing the gapindigenous policy in Australia.Population Research and Policy Review,31(4), pp.571-585. Bowes, J. and Grace, R., 2014. Review of early childhood parenting, education and health intervention programs for Indigenous children and families in Australia. Clark, J.V. ed., 2013.Closing the achievement gap from an international perspective: Transforming STEM for effective education. Springer Science Business Media. Lawrence, D., Hancock, K.J. and Kisely, S., 2013. The gap in life expectancy from preventable physical illness in psychiatric patients in Western Australia: retrospective analysis of population based registers.Bmj,346, p.f2539. Mitrou, F., Cooke, M., Lawrence, D., Povah, D., Mobilia, E., Guimond, E. and Zubrick, S.R., 2014. Gaps in Indigenous disadvantage not closing: a census cohort study of social determinants of health in Australia, Canada, and New Zealand from 19812006.BMC Public Health,14(1), p.201. Prime Minster's Report 2017. closingthegap.pmc.gov.au. Retrieved 8 November 2017, from Renzaho, A.M. and Oldroyd, J.C., 2014. Closing the gap in maternal and child health: a qualitative study examining health needs of migrant mothers in Dandenong, Victoria, Australia.Maternal and child health journal,18(6), pp.1391-1402. The Conversation. 2017.The Conversation: In-depth analysis, research, news and ideas from leading academics and researchers.. [online] Available at: https://theconversation.com [Accessed 8 Nov. 2017]. Together, A. 2017. Australians Together. [online] Australians Together. Available at: https://www.australianstogether.org.au/stories/detail/the-gap-indigenous-disadvantage-in-australia [Accessed 8 Nov. 2017]. UNICEF. 2017. Statistics. [online] Available at: https://www.unicef.org/infobycountry/australia_statistics.html [Accessed 8 Nov. 2017].

Monday, December 2, 2019

The World Is Not Enough, and Die Another Day. Essay Example

The World Is Not Enough, and Die Another Day. Essay In this research project I will explore whether the James Bond movie reflects the society and time which it is constructed through its narrative structure, analysing The World Is Not Enough and Die Another Day. I believe most James Bond films do reflect the worldwide society. The narrative structure of each Bond film is quite similar, but each obviously has different story lines. The similarities include the action, the stunts, the sexy women and a traditional high-speed chase. In the words of the new director Lee Tamahori Awesome sets, breathtaking stunts and a well-practised monster machine are what makes a Bond film.(1) The chase is one of the areas that I shall look at to see how action and speed help dictate the narrative pace. The chase being the ice chase from Die Another Day directed by Lee Tamahori. As well as the opening sequence and the scene in Kazakhstan of the World Is Not Enough, directed by Michael Apted. Both produced by MGM which in itself is a big institution which is well known for big budget films, just having MGM as the producing company set high expectations of the audience. These are all vital scenes, which help to dictate the narrative pace and also backup the ideology that Bond, Played by Pierce Brosnan, falls under the action/ Thriller category in terms of genre. The genre category of Bond however is not so straight forward to categorise. An action film is described as having stunts and chases, high energy, possibly with rescues, battles, fights, escapes, non stop motion, spectacular rhythm, pacing and adventurous heroes.(2) Which both The World Is Not Enough and Die Another Die have. But there are so many individual conventions that Bond films alone have, it is arguable that Bond has become a sub-genre of the action thriller genre. The most profitable film series of all time is James Bond(3). Conventions such as the Bond girls, action etc. It is also important to look at the main characters in any movie, here it is James Bond, and see how that character helps carry the narrative. We know so much about Bond already from the previous 18 films, so ther e is no need for character introduction so the storyline can commence from the beginning of the film. We know that he will get into trouble and the question in each film is how will he get out of it? We will write a custom essay sample on The World Is Not Enough, and Die Another Day. specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The World Is Not Enough, and Die Another Day. specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The World Is Not Enough, and Die Another Day. specifically for you FOR ONLY $16.38 $13.9/page Hire Writer The whole Bond characters could easily fit into Propps theory of character construction. He believes there are eight character roles. The villain, in reference to The World Is not Enough an example of this is Renard and Gustav Graves in Die Another Day. The villain in Propps theory is someone who opposes or 1. Lee Tamahori, Sight and Sound magazine November edition. 2. www.filmsite.org 3.Guinness world records Adam Irvine .2 actively blocks the heros quest that is shown in quantity in both Bond films. The hero who seeks something which in all Bond films is filled by the man himself, Bond. The Donor who provides an object with magical properties, in this case of Bond these are gadgets that Q offers Bond in all the Bond films. The helper who aids the hero that is Dr Jones in The World Is Not Enough and Jinx in Die Another Day. The princess which acts as the reward for the hero and the object of the villains plot in The World Is Not Enough, Electra King fills this role and Miranda Frost in Die Another Day. The princesses father whom acts to reward the hero for his effort (father figure e.g. M). The dispatcher who sends the hero on his/her quest via a message which in both cases is M. The false hero who disrupts the heros success by making false claims. Pierce Brosnan is James Bond this is because Pierce himself is British and has the aura of being a spy. As he has been Bond for several films he has been connected and established as James Bond, his clean cut looks give the sense that all spies look like this and are all well looked after. Every man wants to be him and every woman wants to be with him. Bond always wears suits this may be because of the stereotypical British man from the views of Americans and worldwide it gives a distinct connection to being British. Bond is described as an anomic hero, as Geoffrey Hurd named the category. Anomic hero meaning he works alone, foregoing typical pleasures in order to focus on his work, and instead receiving metaphorical rewards. Which are the woman he has sex with, which does represent women in a negative light, appearing weak and under a male dominant world, but they often have their own contribution later on in the film. For example in The World Is Not Enough Electra King played by So phie Marceau, appears to be weak and in need of protection by Bond however we later discover that she is the main villain and Renard is working for her. And in Die Another Day Jinx played by Halle Berry, appears initially to be independent, which indeed she is, but still needs Bond to rescue her later in the film. My point being the position of Bond woman is also important to the theme and the narrative. They have important roles but are not heroes of any description, just an aider to Bond. Within The World is Not Enough iconography is used by showing the Dome this shows that Bond is moving into the 21st century with the rest of the world it also gives the audience the thought that they have been places that Bond has Been to. In James Bond London is the only place in the UK that is used although it is only a small part of the UK it is well known and helps audience world wide establish that its being set in the UK. Toderov has discussed an equilibrium Theory- which discusses the concept of narrative being initially balanced then disrupted by conflict and then finally resolved at the end. This technique is used to capture and sustain an audience this is quite clearly illustrated in The World Is Not Enough. As I shall explain when I de-construct the opening sequence. In looking at narrative structure today compared to how it was when the first film was made in 1962 Philip C Congleton Adam Irvine .3 has much to say on the filmeras and sub- genres, all of which are relevant to narrative. The first Bond, which was made in the 1960s which Congleton called the transition era..(1) When colour and television were developing and most importantly film was mature (2) the action move was new and was very exciting to an audience, still with large budgets, with cold war threatening, there was much emphasis on making enemys Russian or Communist in decent. But today in the modern era there is a more technological focus and special effects play a huge part. There is still however things that never change included in the Bond film. Current political affairs appear to be the focal point The World Is Not Enough having important scenes and many references to the Middle East. The Bond films also deal mildly with social values and cultures, With a lot of involvement of Chinese and Japanese cultures. Particularly in Tomorrow never Dies and Die Another Day starts with Bond after an action sequence caught and being tortured during a 14-month period, before he is exchanged for the main villains henchman, Zoa. This is not the sort of narrative we expect from a Bond movie. But it is enlightening, showing poor conditions and treatment associated with various armys during recent years. But despite this setback with the opening sequence, he still manages to beat the bad guys, save the world and get the girl, which in this case is Halle Berry. She play s Jinx and after they meet in an exotic location and exchange a few sexual innuendoes, they sleep together. It isnt until he catches he catches up with her later the next morning that he realises she is a secret agent for an American government agency. This is an important factor to the narrative structure of the film because so many times before in the bond films, a woman that bond encounters seems to have an individual project connecting to the villain that makes a sort of side narrative that keeps us the audience intrigued. But Jinx isnt the only girl that Bond sleeps with, He also has sex with Miranda Frost, an MI6 agent just like Bond, that we first suspect, begin to trust and then discover that our first thoughts were correct and that she is in fact working along side the bad guy, Gustav Graves, these characters are all important to the narrative but the one main scene that I shall examine is the ice chase. I think this is the most important because it gives a sense of pace an d represents a typical Bond movie. But first though The World Is Not Enough analysis. The opening sequence begins with Bond walking down a Spanish street, looking smart and composed. This is where Toderovs theory is able to be implemented, with equilibrium being in place for about 60 seconds whilst we see Bond walking down the street then see the panning shot of the majestic Swiss bank, just to give the audience a sense of location. The next shot we see is a close up of Bonds gun having been placed on the table. This almost tells us there will be 1. Philip C Congletion, www.jamesbond.com 2. Philip C Congletion, www.jamesbond.com Adam Irvine .4 trouble and the fact that Bond carries a gun, is a connotation that he also carries disequilibrium with him. Bond then has a rather tense conversation with the arrogant Swiss banker before he uses his rigged glasses to set of a small explosion that disorientates the two henchman watching Bond, allowing him to kill one and knock out the other. The quick editing and mise-en-scene techniques such as close ups on Bond sets the pace of the movie once again. All of the action in the bank office happens in a few short seconds and dictates the narrative pace. Bond then escapes, as we know he will, rather fantastically, by jumping out of the window, attached to nothing except a blind cord. Also carrying the merchandise he was apparently sent to retrieve, none other than money. So far already many conventions of Bond have occurred and Bond is doing just what we the audience wants him to do, announcing danger. The next main scene is the one set in Kazakhstan, where Bond infiltrates a Russian sc ientists layer named Dr Arkov. As Bond is being driven down the dusty track, the explosion on the side of the road almost warns the audience that this will be a dangerous situation for Bond. He then assumes the role of a Russian scientist and cleverly fools the people around. But doesnt convincingly fool the beautiful woman that Bond encounters, Dr Christmas Jones. During their brief and cagey conversation the Doctor appears to be dominant, with her angry opinions about having to fix the problems Dr Arkov caused. Dr Arkov being the man that Bond is impersonating. Dr Jones then tries to catch Bond out by talking Russian but Bond calmly and smoothly replies in Russian also. This mild flirting between the two gives us an idea that something more serious will happen between them. The general sight of Dr Jones in her minimal clothing is one thing to keep the male audience interested at this point, and also reinforces the tradition that the Bond films have had since the beginning. The scene after a delayed shot on Dr Jones face cuts to a high angle, birds eye view of Bond descending well below ground level in a dark elevator. The tense non-diagetic sound sets the mood that this is a dangerous place, and the subdued lighting signalled once again that dark times maybe ahead for Bond. When he reaches the bottom of the lift he is confronted by a dark tunnel, with oil drums with DANGER signs virtually tell the audience that Bond will again encounter danger. Also a flashing bright neon light, which could represent the long tunnel of death on the way to heaven, but being an anomic hero that he is, he struts confidently and unfazed down the tunnel only to encounter his nemesis Renard. It is at this point that we see how Bond is represented. He is represented as the really good guy, being lit and full face in the picture and the bad guys face in darkness and shadow. He is also shown to be humane, by not shooting Renard straight away. Between them, Bonds other side to his character is shown when when Renard torments Bond. Bond then becomes agitated and starts moving and re-positioning his gun. A few minutes on when the position of dominance has shifted to Renard. Bond first instinct is to protect Dr Jones. He then exhibits the sort of charm that female audiences are looking for. After re-loading his gun he stands and gets his legendary gadget watch out and just before he fires the grappling hook he says to Dr Jones stay calm assuming she is a typical weak woman, however as we subsequently see Adam Irvine .5 she isnt. She plays a pivotal role in their escape being able to unlock the damaged electrical doors, just in time to save Bond as he Is swinging down the tunnel followed by a ball of fire from an exploding bomb. He then escapes with another spectacular stunt following Bonds unsuccessful pursuit of Renard. These mise-en-scene techniques such as the camera angles like point of view shots of the enemys plus all of the action, fast editing, gun fire, and gorgeous women keep the narrative flowing and are exactly what we the audience want to see. The scene is excellently constructed to continue the good flowing narrative structure. Particularly the fast editing. The chase is what I believe to be one of them most exciting parts to a Bond movie and in Die Another Day they dont let the audience down. It dictates narrative pace and reinforces values that we all like to believe that it would be great to have a fast car, and the fact that Bond always has, makes the audience more envious of wanting to be Bond. The ice chase begins when Bond who has secretly crept into his invisible stealth car unnoticed, but the gets discovered and shot at by Zao in his Jaguar. The product placement of these two cars signalling that they are the best and can do anything. The pursuit begins and after a few minutes they find themselves chasing each other on the frozen lake. There are a lot of close up shots on Bonds face whilst he is in the car, with a determined but concentrated look upon his face. Zao is piling the attack on Bond, firing as many weapons as he can at one time but Bonds car gadgets seem more than a match for the oncoming shelling. There is at this time lots of cuts and quick editing, with the longest shot being at the most 5 seconds. The best part of this scene is when one of the missiles fired at Bond hits quite close and turns Bond onto his roof and he is left sliding along the ice on his roof. So the legendary 007 makes his escape from this situation look quite simple he opens the sun roof and releases the passenger ejector seat and subsequently turns the car back onto its wheels, just as another missile flies under the car while it is in the process of turning. Of course these techniques of camera angles give the best view. The lighting is carefully constructed to look like one place when the scene was actually filmed in two locations. The main stunts were filmed in England because there was a danger that the ice could break if they toppled a moving car on it. The camera techniques used create great tension and grad the audiences attention. This whole high-speed chase was actually filmed with the cars moving at about 15 miles per hour and the camera recording speed slowed down. So when they resumed the film speed to normal it appeared that they travelling at around 60 miles an hour. The end of that particular scene then finishes with Bond bumping the back of Zaos car with his own and knocking Zao of coarse. He does regain control and they disappear into the distance towards the ice palace. This was perhaps the best chase in the history of Bond when it comes to mise-en-scene projection and cunning techniques. At this point I was gripped to the film and pulled into the narrative further. Adam Irvine .6 The best filming techniques that I have ever seen on screen! (Peter Francis.) It is clear that one of the main things that dictate narrative structure is narrative pace, particularly in Bond films. They are as we have discussed almost their own genre so the conventions of Bond films are unique to Bond films as they are only to be seen together in a Bond film. In analysis I can conclude that James Bond films do reflect both the society and time in which they are set. This can be dominantly found in their representation of women, reflecting the change of womens roles in society over the years that Bond has been around. When it first started women were looked at to just stay home and cook for their man, but now are seen as equal in society. Although The World is not Enough and Die Another day are set in various countries they offer a central representation of the middle east. This is because of the change in the travel industry. Now people can travel easier so James Bond producers no longer use luxurious places so people wish to visit them as they already can. Particularly using the Middle East however gives the whole audience a political look at that area, distinctly where there is conflict. This offers an audience an inside look and a view on real life conflict areas. The narrative is very important to every genre, particularly to an actio n thriller.

Wednesday, November 27, 2019

The eNotes Blog 7 Women Writers You Should Read for Women’s HistoryMonth

7 Women Writers You Should Read for Women’s HistoryMonth You may have heard of them, or perhaps you’ve been assigned one of their novels or short stories in English class. Required reading aside, these seven women writers all wrote during the last half of the 20th century and offer unique perspectives on topics and issues that are still top of mind for contemporary audiences. Lets look at the women who should be a the top of your reading-for-pleasure list right now. 1. Octavia Butler Though her work is well-known and respected among avid science fiction readers, Octavia Butler has never been mainstream. She wrote about a black woman transported back in time (and against her will) to save a white ancestor in pre-Civil War North America; a race of aliens who are a third gender; and vampire-like people who are polyamorous and discriminated against. Her work is eye-opening and even more relevant today than it was when she wrote it, mostly in the 70s through the early 2000s. Works to read: Dawn and other novels in the Xenogenesis series, 248 pages Kindred†¨, 287 pages Bloodchild and Other Stories†¨,  214 pages 2. Leonora Carrington Carrington has mostly fallen out of modern-day consciousness, but during her life she was recognized as one of the few female surrealist artists and writers during the male-dominated surrealist movement of the 20s and 30s. Her stories are sharp-minded and darkly humorous, especially â€Å"The Debutante,† which turns a critical eye on upper-class society by having a wealthy young woman switch places with a talking hyena. Carrington published several short story collections from the 30s through the 80s and exhibited her artwork throughout the world. Works to read: The Complete Stories of Leonora Carrington†¨, 215 pages 3. Angela Carter Carter is perhaps most known for her short story collection â€Å"The Bloody Chamber† where she reinterpreted classic fairy tales like Beauty and the Beast and Bluebeard through a feminist lens- one of the first female writers to do so. She wrote prolifically throughout the 60s, 70s, and 80s, publishing many novels, short story collections, books of poetry, and works of nonfiction. Works to read: The Bloody Chamber†¨, 128 pages â€Å"Flesh and the Mirror†,  7 pages Nights at the Circus, 295 pages 4. Patricia Highsmith With the 2015 film Carol, based on her novel The Price of Salt, Patricia Highsmith reentered contemporary culture. A novelist and short story writer who published from the 50s to the 90s, Highsmith is perhaps most known as a masterful writer of thrillers, such as Strangers on a Train, which was adapted into a movie by Alfred Hitchcock. Worth reading, even more, is The Price of Salt: its intimate portrayal of the romance between two women, and thoughtful exploration of the nature of love and attraction regardless of gender, was a rarity for the era it was published in. Works to read: The Price of Salt†¨,  276 pages The Talented Mr. Ripley†¨, 320 pages Strangers on a Train†¨, 256 pages 5. Shirley Jackson Many readers may have encountered Jackson’s shocking short story â€Å"The Lottery† in English class or watched the recent Netflix adaptation of her novel The Haunting of Hill House, but her other short stories and novels are also worth exploring. Jackson was masterful at crafting stories that depict the subtle horrors of everyday life, particularly the sometimes oppressive nature of living as a housewife in the 50s and 60s, which is perhaps best portrayed in her short story â€Å"The Good Wife.† Works to read: The Lottery and Other Stories†¨, 302 pages The Haunting of Hill House†¨, 182 pages We Have Always Lived in the Castle†¨, 146 pages 6. Flannery O’Connor While some of O’Connor’s short stories are staples of English classes focused on postmodern work, she isn’t a household name. Yet, her writing, which is preoccupied with the grotesqueness of everyday life, is well worth reading. She often incorporated disability into her work, such as in her story â€Å"Good Country People,† where the main character, Joy, has a prosthetic leg. O’Connor herself had lupus, which led to her early death. Works to read: The Complete Stories†¨, 555 pages The Violent Bear It Away†¨, 256 pages Wise Blood†¨, 256 pages 7. Jean Rhys Anyone who is left unsatisfied with Bertha Mason’s story after reading Jane Eyre should turn to Rhys’s novella Wide Sargasso Sea, which is a prequel of sorts to its Victorian predecessor. From the British West Indies herself, Rhys wrote Wide Sargasso Sea from Bertha’s perspective, giving a voice to a woman silenced by her husband, her family, and her society. From the 20s through the 70s, Rhys published many novels and short story collections, some also inspired by her upbringing in the Caribbean. Works to read: Wide Sargasso Sea†¨, 171 pages Good Morning, Midnight, 159 pages Sleep It off, Lady†¨, 176 pages

Saturday, November 23, 2019

Free Essays on Constitution

The Constitutional Convention began on May 25, 1787, when 55 delegates arrived at Philadelphia’s Independence Hall, then known as the Pennsylvania State House. There the delegates amended the Articles of Confederation. Four questions proved far more difficult to resolve: conflicts over how the people were to be represented in Congress; what to do about slavery; the powers of the president and the procedures for election to the office; and the powers and functions of the federal courts. The delegates settled most of the scores of issues quickly. They then created a new Constitution, a plan of government designed to solve the governmental problems caused under the Articles of Confederation. Since they made such a flexible document it still continues to guide this nation today. The Constitution spells out in six sections the powers of the federal government and the states. Later amendments expanded some of these powers and limited others. For example in document #2 many years later the voting laws were able to be changed so that no matter your race, sex, color, or age as long as your 18 years of age or older, you cant be denied the right to vote. The Constitution prevents cruel or unjust use of power through the separation of powers. In document #4 it talks about the system of checks and balances and how each branch of government has its own responsibilities and cannot take action in areas assigned to the other branches. Otherwise one person or group being in control with all that power would not be good for the nation as a whole. Congress enacts laws, leaving enforcement of the laws to the executive branch and interpretation of them to the judicial branch. As stated in document #5 in the Marbury v. Madison case the judicial branch with the power and authority to interpret the constitution, was provided with a veto over federal laws. The Constitution divides governmental powers in other ways, both w... Free Essays on Constitution Free Essays on Constitution The Constitutional Convention began on May 25, 1787, when 55 delegates arrived at Philadelphia’s Independence Hall, then known as the Pennsylvania State House. There the delegates amended the Articles of Confederation. Four questions proved far more difficult to resolve: conflicts over how the people were to be represented in Congress; what to do about slavery; the powers of the president and the procedures for election to the office; and the powers and functions of the federal courts. The delegates settled most of the scores of issues quickly. They then created a new Constitution, a plan of government designed to solve the governmental problems caused under the Articles of Confederation. Since they made such a flexible document it still continues to guide this nation today. The Constitution spells out in six sections the powers of the federal government and the states. Later amendments expanded some of these powers and limited others. For example in document #2 many years later the voting laws were able to be changed so that no matter your race, sex, color, or age as long as your 18 years of age or older, you cant be denied the right to vote. The Constitution prevents cruel or unjust use of power through the separation of powers. In document #4 it talks about the system of checks and balances and how each branch of government has its own responsibilities and cannot take action in areas assigned to the other branches. Otherwise one person or group being in control with all that power would not be good for the nation as a whole. Congress enacts laws, leaving enforcement of the laws to the executive branch and interpretation of them to the judicial branch. As stated in document #5 in the Marbury v. Madison case the judicial branch with the power and authority to interpret the constitution, was provided with a veto over federal laws. The Constitution divides governmental powers in other ways, both w...

Thursday, November 21, 2019

Learning from Mentors Research Paper Example | Topics and Well Written Essays - 250 words

Learning from Mentors - Research Paper Example ed as â€Å"the intellectual and moral empowerment of human beings to achieve personal goals that matter, not only for oneself, but for a pluralistic and just future.† (Wlodkowski, 2008) Mentoring is a learning process between a mentor who is usually a senior or someone more experienced in the job, and a mentee who is usually a junior or someone in need of training. Recent studies tackle this process as something that is not limited between just two people. There are three types of which is discussed in a recent study namely one- on- one mentoring, group mentoring and training and encouragement toward mentoring. It is a process which improves members to be more proficient for the organization. (Goodyear, 2006) As aforementioned, mentoring has long been known as a one- on- one process between to people but it no longer stands only as such. A recent breakthrough by Kathleen Kram conceptualized â€Å"development network† in mentoring. In this process mentees can seek guidance not only from one specific mentor, but from a number of mentors. It also allows a mutual learning process for both mentor and mentee, in such a way that even seniors (mentors) can consult mentees (juniors) on topics and areas that they need to gain more knowledge from. In addition to this, learning is not limited in knowledge and skills training for work but also role modeling and psychosocial support. This â€Å"development network† is indeed a social adult learning venue in nurturance to individuals in the company. (Goodyear, 2006) Mentoring has become more positively susceptible to adult learning because of the recent advancements in its structure. It has become a continuous absorption of knowledge, skills and values in a setting conducive for the social health of any company’s work force. The new structure also debunks problems that were observed in the past such as complications with mentor responsibilities over assigned mentee. Focus on mentor to mentee and mutual learning is especially