Saturday, August 31, 2019

Importance of Electricity

IMPORTANCE OF ELECTRICITY The greatest scientific achievement of the nineteenth century is the discovery of electricity. The twentieth century is making use of electricity so extensively that it has almost changed the face of the earth. â€Å"Electricity—carrier of light and power, devourer of time and space, bearer of human speech over land and sea, is the greatest servant of man, though it is itself unknown. Lenin saw Russia's hydro-electrical potentialities. The application of electricity to industry and agriculture was Lenin's dream. In India, we have staked our whole future on a rapid growth of our hydroelectric power. The modern age is the age of machinery. The true object of substituting human labour by mechanical labour is to find greater leisure for man. Machines must be driven by natural power. And the most pervasive of all sources of natural power is electricity, mechanical, hydro wind followed by electronics now-a-days. Look at life today in a modern city. Electricity regulates the clock that rouses us from bed; boils the water that makes our tea, cooks our food on heat-proof cooking ranges or cookers; works the radio and TV that tell us the news; rings the bell that announces a visitor; carries our telegraphic message to distant places; conveys us to our office in luxurious tram-cars and trains; takes us to our room somewhere in some multi-stroied building on elevators; electricity lifts; refrigerates the food to keep it completely fresh; lights our rooms when the sun goes down; warms it in winter and cools it in summer; in short, does everything for our comfort and convenience with the utmost efficiency at all hours. To generate and harness electricity on a large scale means the development of machinery capable of doing so. The various multipurpose schemes, which we are running at such a heavy cost over the years, are for the production of large-scale electricity. But most of our electricity was based on coal: the total output was lamentably low. Now that such multipurpose schemes as those of Bhakra Nangal, Damodar Valley or Hirakud have made it possible to provide to even remote villages with electric powers, and help change life beyond recognition. India's resources for generating electricity are second to no other country in the world. Even some Atomic plants have generating electricity. Importance of Electricity IMPORTANCE OF ELECTRICITY The greatest scientific achievement of the nineteenth century is the discovery of electricity. The twentieth century is making use of electricity so extensively that it has almost changed the face of the earth. â€Å"Electricity—carrier of light and power, devourer of time and space, bearer of human speech over land and sea, is the greatest servant of man, though it is itself unknown. Lenin saw Russia's hydro-electrical potentialities. The application of electricity to industry and agriculture was Lenin's dream. In India, we have staked our whole future on a rapid growth of our hydroelectric power. The modern age is the age of machinery. The true object of substituting human labour by mechanical labour is to find greater leisure for man. Machines must be driven by natural power. And the most pervasive of all sources of natural power is electricity, mechanical, hydro wind followed by electronics now-a-days. Look at life today in a modern city. Electricity regulates the clock that rouses us from bed; boils the water that makes our tea, cooks our food on heat-proof cooking ranges or cookers; works the radio and TV that tell us the news; rings the bell that announces a visitor; carries our telegraphic message to distant places; conveys us to our office in luxurious tram-cars and trains; takes us to our room somewhere in some multi-stroied building on elevators; electricity lifts; refrigerates the food to keep it completely fresh; lights our rooms when the sun goes down; warms it in winter and cools it in summer; in short, does everything for our comfort and convenience with the utmost efficiency at all hours. To generate and harness electricity on a large scale means the development of machinery capable of doing so. The various multipurpose schemes, which we are running at such a heavy cost over the years, are for the production of large-scale electricity. But most of our electricity was based on coal: the total output was lamentably low. Now that such multipurpose schemes as those of Bhakra Nangal, Damodar Valley or Hirakud have made it possible to provide to even remote villages with electric powers, and help change life beyond recognition. India's resources for generating electricity are second to no other country in the world. Even some Atomic plants have generating electricity.

Friday, August 30, 2019

ICT Specification for a spreadsheet for the Hairdressing business

The specification points are very useful because they are like a shopping list and help us to make sure we follow a list of requirements that are important in order for us to ensure that the system that we will create will be able to do certain things in the list below. To have a list of specification points so that when it comes to planning and creating the spreadsheet it will be much easier for us. The list below is extra support and a helpful list to guiding me when I create the spreadsheet for the Hairdressing business. 1. Allows creating a booking system for example an easy way to organise all the clients in a useful way for example in alphabetical order. The booking system is able to store and organise the clients details in alphabetical order this can be done by left clicking ascending order. 1. The system should be allowed to create queries such as multiple criteria or simple search criteria search. To help find for only certain clients that I need to find for example if I there is a discount on women’s haircuts so then I will need to identify only females in the system. Queries can be made on the system for example multiple or simple searches. This will help to identify the people that are only needed to find. 1. I will have a validation rule to minimise errors in the database. E.g. presence check or a formula checks in the system. Validation rules have been entered to reduce the amount of errors occurring in the database system In order to keep the records correct and up to date. 1. The system must be able to have a print button and save the work quickly and easily I will have a print or save button. The system I have created will have a print button on it. 1. I should be able to edit for example to delete old clients and store details and keep record of the data and keep record up to data and recent. Records on the table are able to be stored deleted and kept up to date on the recent data. 1. Include a menu page for the system to make it easy to navigate from page to page and this should help get us easily from page top page. My system has a menu page in order to help to ease the use of navigation 1. Include a primary key to give clients in the system a unique number so it will be easy to find him or her with reference to that specific unique number that is supplied to them in the system. The primary key has been put on the booking ID field because this is recognised to be the key field. 1. To have a back up strategy in case the system is hacked into or is lost or damaged so the back up program is a USB or a CD containing the program/system on it and their details. The information has been stored on my USB and that there is anti-virus is stored to prevent any data or memory loss. 1. To have tables and then link the tables together by relationships and this should make it easier for the user to navigate from page to page quickly. Relationships have been attached to both the tables the Customer details table and the Appointment booking table. 1. I will create a form that will make it another way of presenting the information to the user or the receptionist. Forms will be created to help make the reading of the details and the information easier for the person using it. The testing that we had previously carried out helped to improve my system and the evaluation has helped to make sure that all the criteria of the specification points have been met. The specification points have helped me to carry out the task as a whole more efficiently and to make sure it has appeared on my database the way I have wanted it to turn out. Testing made sure that all the specification points were all able to be fulfilled and achieved but at the same time realistic in order for me to carry them out efficiently. The new database system can now carry out some new and amazing functions it can now make the spreadsheet function well. For the database I have made macros/ navigation buttons to help make moving from one table to another much more simpler and easier. The Database will help me to store my information and store the data precisely in ascending order. There have not been many problems that have occurred from the database that I have created because the database that’s been created has hardly and errors and is functioning well it seems to be making good progress. The database has been made with the purpose to help to make sure that the new Hair Salon will be able to function properly. The two tables that I have created will help me to quickly find out which appointments have been appointed for which person and which person and the customer details have been sorted to keep them safe and in a more reliable way. This also makes it easier to view the information for each customer.

Thursday, August 29, 2019

The Return: Shadow Souls Chapter 43

Elena had a feeling she couldn't quite describe. It wasn't letdown. It was†¦let up. For what seemed like most of her life she had been searching for Stefan. But now she had him back again, quite safe and clean (he'd had a long bath while she insisted on scrubbing him gently with all sorts of brushes and pumice stones, and then a shower, and then a rather cramped shower with her). His hair was drying into the silky soft dark shock – a little longer than he usually kept it – that she knew. He hadn't had energy for frivolities like keeping his hair short and clean before. Elena understood that. And now†¦there were no guards or kitsune around to spy on them. There was nothing to keep them from each other. They had been playful in the shower, splashing each other, Elena always making sure to keep her feet on the no-slip guard and ready to try to support Stefan's lanky weight. But they could not be playful now. The shower's spray had been very helpful, too – at concealing the teardrops that kept flowing down Elena's cheeks. She could – oh, dear heaven – count and feel each one of his ribs. He was just bones and skin, her beautiful Stefan, but his green eyes were alive, sparkling and dancing in his pale face. After they were dressed in nightclothes they simply sat on the bed for a little while. Sitting together, both breathing – Stefan had got into the habit from being around humans so much and, recently, from trying to eke out the small amount of nutrition he received – in synchronicity, and both feeling the other's warm body beside them†¦it was almost too much. Then, almost tentatively, Stefan groped for Elena's hand, and catching it, held it in both of his, turning it over wonderingly. Elena was swallowing and swallowing, trying to make a start in a conversation, felt herself practically radiating bliss. Oh, I never want anything more, she thought, although she knew that soon enough she would want to talk, and to hold, and to kiss, and to feed Stefan. But if someone had asked her if she would have accepted just this, sitting together, communicating by touch and love alone, she would have accepted it. Before she knew it, she was talking, words that came like bubbles out of molasses, only these were bubbles from her soul. â€Å"I thought that somehow I might lose this time. That I'd won so many times, and that this time something would teach me a lesson and you†¦wouldn't make it.† Stefan was still wondering over her hand, bending industriously to kiss each separate finger. â€Å"You call ‘winning' dying in pain and sunlight to save my worthless life – and my even more worthless brother's?† â€Å"I call this a better kind of winning,† Elena admitted. â€Å"Any time we get to be together is winning. Any moment – even in that dungeon†¦Ã¢â‚¬  Stefan winced, but Elena had to finish her thought. â€Å"Even there, to look in your eyes, to touch your hand, to know that you were looking at me and touching me – and that you were happy – well, that's winning, in my book.† Stefan lifted his eyes to hers. In the dim light, the green looked suddenly dark and mysterious. â€Å"And one more thing,† he whispered. â€Å"Because I am what I am†¦and because your crowning glory isn't that glorious golden cloud of hair, but an aura that is†¦ineffable. Indescribable. Beyond any words†¦Ã¢â‚¬  Elena had thought they would sit and simply gaze at each other, drowning in each other's eyes, but that wasn't happening. Stefan's expression had slipped and Elena realized how close to bloodlust – and to death – he still really was. Hurriedly, Elena pulled her damp hair to one side of her neck, and then she leaned back, knowing Stefan would catch her. He did this, but although Elena tilted her chin back, he tilted it down in his two hands to look at her. â€Å"Do you know how much I love you?† he asked. His entire face was masked now, enigmatic and strangely thrilling. â€Å"I don't think you do,† he whispered. â€Å"I've watched and watched how you were willing to do anything, anything to save me†¦but I don't think you know how much that love has been building up, Elena†¦.† Delicious shivers were going down Elena's spine. â€Å"Then you'd better show me,† she whispered. â€Å"Or I might not believe that you mean it – â€Å" â€Å"I'll show you what I mean,† Stefan whispered back. But when he bent down it was to kiss her softly. The feelings inside Elena – that this starving creature wanted to kiss her instead of going at once for her throat, reached a peak that she could not explain in thoughts or words, but only by drawing Stefan's head so that his mouth rested on her neck. â€Å"Please,† she said. â€Å"Oh, Stefan, please.† Then she felt the quick sacrificial pains, and then Stefan was drinking her blood, and her mind, which had been fluttering around like a bird in a lighted room, now saw its nest and its mate and swooped up and up and up to at last reach unity with its best-beloved. After that there was no need for clumsy things like words. They communicated in thoughts as pure and clear as shimmering gems, and Elena rejoiced because all of Stefan's mind was open to her, and none of it was walled off or dark and there were no boulders of secrets or chained and weeping children†¦ What! she heard Stefan exclaim voicelessly. A child in chains? A mountain-sized boulder? Who could have that in their mind – ? Stefan broke off, knowing the answer, even before Elena's lightning-swift thought could tell him. Elena felt the clear green wave of his pity, spiced by the natural anger of a young man who has gone through the depths of hell, but untainted by the terrible black poison of hatred of brother for brother. When Elena had finished explaining all she knew about Damon's mental processes, she said, And I don't know what to do! I've done everything I could, Stefan, I've – I've even loved him. I gave him everything that wasn't yours alone. But I don't know if it's made even the slightest difference. He called Matt â€Å"Matt† instead of Mutt, Stefan interrupted. Yes. I†¦noticed that. I'd kept asking him to, but it never seemed to matter. It mattered this way: you managed to change him. Not many people can. Elena wrapped him in a tight embrace, stopped, worried that it was too tight, and glanced at him. He smiled and shook his head. He was already looking like a person rather than a death camp survivor. You should keep using it, Stefan said voicelessly. Your influence over him is strongest. I will – without any artificial Wings, Elena promised. Then she worried that Stefan would think her too presumptuous – or too attached. But one look at Stefan was enough to assure her that she was doing the right thing. They clung to each other. It wasn't as hard as Elena had imagined it would be – handing Stefan over to other humans to be bled. Stefan had a clean pair of pajamas on, and the first thing he said to all three donors was, â€Å"If you get frightened or change your mind, just say so. I can hear perfectly well, and I'm not in bloodlust. And anyway, I'll probably sense it if you're not enjoying it before you do, and I'll stop. And finally – thank you – thank you all. I've decided to break my oath tonight because there's still some little chance that if I slept I wouldn't wake up tomorrow without you.† Bonnie was horrified and indignant and furious. â€Å"You mean you couldn't sleep all that time because you were afraid to – to†¦?† â€Å"I did fall asleep from time to time, but thank fortune – thank God – I always woke up again. There were times when I didn't dare move to conserve energy, but somehow Elena kept finding ways to come to me, and every single time she came, she brought me some kind of sustenance.† He gave Elena a look that sent her heart spinning out of her chest and high into the stratosphere. And then she set up a schedule, with Stefan being fed every hour on the hour, and then she and the others left the first volunteer, Bonnie, alone, so as to be more comfortable. It was the next morning. Damon had already been out to visit Leigh, the antiques-seller's niece, who had seemed very glad to see him. And now he was back, to look with scorn at the slug-a-beds who were distributed all around the boardinghouse. That was when he saw the bouquet. It was heavily sealed down with wards – amulets to help get it through the dimensional gap. There was something powerful in there. Damon cocked his head to one side. Hmm†¦I wonder what? Dear Diary, I don't know what to say. We're home. Last night we each had a long bath†¦and I was half-disappointed, because my favorite long-handled back-scrubbing brush wasn't there, and there was no star ball to make dreamy music for Stefan – and the water was LUKEWARM! And Stefan went to see if the water heater was turned on all the way and met Damon going to do the same thing! Only, they couldn't because we're home again. But I woke up a couple of hours ago for a few minutes to see the most beautiful sight in the world†¦a sunrise. Pale pink and eerie green in the east, with nighttime still full dark in the west. Then deeper rose in the sky, and the trees all wreathed in dew clouds. Then a shiny glory from the edge of the horizon and dark rose, cream, and even a green melon color in the sky, Finally, a line of fire and in an instant all the colors change. The line becomes an arc, the western sky is deepest deepest blue, and then up comes the sun bringing warmth and light and color to the green trees and the sky begins to become celestial blue – celestial just means heavenly, although somehow, I have a delicious shivery feeling when I say it. The sky becomes a gemlike, celestial, cerulean blue and the golden sun begins to pour energy, love, light, and every good thing onto the world. Who could not be happy to watch this while Stefan held her? We who are so lucky as to be born into the light – who see it every day and never think about it, we're blessed. We could have been born shadow souls who live and die in crimson darkness, never even knowing that somewhere there is something better.

Philosophy Essay Example | Topics and Well Written Essays - 750 words

Philosophy - Essay Example Introduction Death Penalty, also referred to as Capital punishment, entails the execution of a convicted wrongdoer by law/judicial process enforcement officers as a punishment for a particular crime(s). It is ever the most severe punishment form. The various lawful means through which death penalty is administered comprise hanging, lethal injection, firing squad, electrocution, gassing and use of the guillotine (Duhaime 1). The offences punishable via capital punishment include but are not limited to rape and other sexual crimes, murder, espionage, treason and repeated crimes. They are referred to as capital crimes. This form of punishment is also performed as part of military justice. The criminal provisions for death penalty deem such individuals (convicted offenders) as a gross menace to the existence of the society (Legal-explanations.com 1). Majority of countries around the world have banned the death penalty. Infoplease.com quotes Amnesty International which records that 137 co untries have abolished this form of punishment. Additionally, a considerable reduction in the number of executions yearly in countries that have not banned it is evident. For instance, in the year 2007, twenty-four countries put 1,252 people to death, (of which eighty-eight percent took place in Saudi Arabia, China, Pakistan, Iran and USA alone), while in the previous year, they had executed 1,591 individuals. In 51 countries that apply death penalty to particular crimes’ offenders, approximately 3,350 people received the death penalty in 2006. In the year 2009, more than twenty thousand prisoners were on death row globally (Infoplease.com 1). In the view of people who support capital punishment, the threat of executions dissuades individuals from committing capital crimes, and thus it is more effective than incarceration. While this claim is credible, numerous studies on the topic of death penalty and deterrence in addition to the rate of capital crimes in countries that app ly the death penalty yields different result – they do not support this idea. In effect, in countries that do not apply the death penalty, the rate of capital crimes is continuously lower as opposed to those countries that apply it.  For instance, of the four regions of the United States, the Southern region has the highest rate of capital crimes despite the region having more than eighty percent of all executions in the United States. Moreover, a recent study revealed that of the surveyed United States’ top criminologists, eighty-eight percent are not for the belief that capital punishment deters capital crimes (Lacock & Radelet 503). There is ample prove that capital crime rates and the death penalty lack correlation. A major study by the United Nations concluded that there lacks substantiation of the view that compared to life incarceration; death penalty has a greater deterrent effect. Findings from the United States of America in addition indicate that death pen alty does not prevent capital crime. Moreover, reports from the American Civil Liberties Union divulge that states that apply death penalty laws do not have lower rates of capital crimes than those states that do not apply it (Peikrishvili 5). What is more is that a US police chiefs’ national survey disqualifies the  claim that death penalty is an essential tool of reducing the number of capital crimes with the police chiefs

Wednesday, August 28, 2019

Summary Essay Example | Topics and Well Written Essays - 500 words - 84

Summary - Essay Example b. The issue is clearly stated and there can be no confusion in regard to its aspects. It should be noted that the issue is made clear in the following two ways: a) direct reference is made to the issue and b) the potential implications of the issue for humans and the planet are mentioned, leading the reader to the identification of the article’s main issue. b. The conclusion is clearly stated. In fact, in the last paragraph the author notes that ‘weve remained too silent for far too long’; this phrase illustrates the view of the author in regard to the strategy followed up today for handling the particular problem. c. The conclusion is related to the question raised in this article but not directly. In fact, the conclusion highlights the fact that no action has been taken up today for addressing global population growth but it does not focus on the key reason for which such action should be taken. a. The reasons that support the evidence are differentiated: a) for Paul Ehrlich, the continuous global population growth could result to a chaos, b) in the context of an article published in Time magazine, global population growth could lead to the increase of instability and c) the magazine Scientific American has promoted the idea that global population growth would threaten the availability of food. b. The first of the above reasons is based on a personal belief of Paul Ehrlich; the relationship between global population growth and instability is based on the personal experience of the General Michael Hayden, the author of the article published in Time magazine. As of the third reason, the relationship between global population growth and increased food needs is based on the personal belief of the American economist, as this belief is probably resulted from the study of demographic trends in countries worldwide. c. The evidence is related to the conclusion but not directly. In fact the evidence helps to understand the reasons for which initiatives

Tuesday, August 27, 2019

Using Social Media in the Middle East Essay Example | Topics and Well Written Essays - 1250 words

Using Social Media in the Middle East - Essay Example However, the main audience was alienated by the youth on the street, in terms of often spilled, North Africa and lifeblood. The rebellion of the youth spread far beyond Egypt and Tunisia in order to enflame the whole region. The combination of offline and online strategies and other additional tactics that the organization used helped in bringing political revolution. Pollock explains that Takriz began as a tiny cyber which proclaimed itself as self-described tank (15 -24). It had thousands of networks that cooperated with journalists and as a result guarded their anonymity. Since Takriz was an elusive word, it came from street slang, which means frustration due to anger or breaking balls. Additionally, Foetus is an MBA consultant of technology who knows many languages and plays off his friend Waterman who is gifted in writing. Ben Ali’s removal made the group believe that Tunisia’s government is cut from the same cloth as the predecessor who was corrupt. It also talks about the situation being similar in Egypt, whereby the Egypt activists are cautious of the supreme council where the Armed Forces replaced Mubarak Hosni. North Africa and Middle East are elderly regimes who are unwilling to leave power as well as unable to satisfy the economic and political demands of the bulge demographic youth. The region’s population is under 30, and the unemployment of the youth stands at 20 percentage. The media technology also brought about the political revolution in the region because of the extreme use of Face book, you tube, cell phones, and satellite TV among others. Pollock notes out that Takriz also made internet access affordable as well as freedom of speech to the organizers (25-32). Internet was the only option for them in 1998, because Ben Ali is said to have taken control of the other media. However, Takriz technology officer was a skilled hacker, and since he could not afford Tunisia’s phone and internet cost, turned to internet as well as for safety, since he would meet the other organizers online without any identification. The government blocked Takriz website and many others. TuneZine was arrested and tortured. He was sent to the worst prison in the region, 120 people in one room with only one bathroom and no water. When he got sick, instead of calling a doctor they beat him and gave him no food. In 2003, he was released but died because of a heart attack at the age of 37 and Ben Ali imposed a curfew, in which journalists and activists were arrested, speeches and documents censored as well as blocked websites. The Tunisian’s protests turned to a political revolution because the videos captured events that were extremely depressing as well as highly influential. One such video was about Kasserine’s hospital that was in chaos, and desperate to treat the wounded and an image of a dead young man who had his brains spilt out. This was critical and use of this video made the second political revolu tion. It was posted on face book, YouTube and any other influential sites (Pollock, 32-44). Such acts are against the human right law. The use social media is significant in bringing out political revolution in any country. This is because social media reaches a good number of people both regionally and internationally. For example, when Takriz sent the video to Aljazeera, it reached people globally, a population face book cannot reach; the rich,

Monday, August 26, 2019

Corporate risk management Essay Example | Topics and Well Written Essays - 2000 words - 2

Corporate risk management - Essay Example If the quantum of investment is significant and depending on the size of the firm, sizeable enough to affect future earnings in a way that negatively affects the firm, then it is more preferable to go for risk transfer. Conversely, if the investment is not of a quantum that can affect the firm negatively it is better to go for risk retention. 2) Risk Transfer: Risk transfer, also known as Risk sharing is in many ways the complete opposite strategy of Risk retention. The principle of Risk transfer is the underlying tenet behind most insurance transactions. Risk transfer generally involves the shifting of risk to another party, most usually by means of insurance or through warranty. This method assumes the longevity of the third party and the ability of the insurer to maintain business continuity. Cash Flow Regularity: One of the biggest risks associated with investment decisions, particularly in light of whether or not to transfer risk or not, or to whether just bear with the uncertainty is how regular or irregular the earnings of that particular investment decision are. It follows then that the more irregular or uncertain the earnings of a particular investment decision are, the more likely a firm is to increase its security or safety in regards to that investment or that line of cash flows. Hence, the greater irregularity is seen in cash flows, or the higher risk factor involved, the more likely a firm is to transfer risk either via Insurance or Warranty. 3) Risk Avoidance: Risk avoidance, on the spectrum of Risk management activities is on one end of the spectrum, wherein the company decides to altogether excuse itself from all possibility of risk. Although this strategy is often considered the safest form of risk management it also entails the loss of any potential revenue that could have been gained from the investment, therefore while it is the safest strategy it

Sunday, August 25, 2019

A portfolio about Karl Benjamin(an artist), and discussing the meaning Essay

A portfolio about Karl Benjamin(an artist), and discussing the meaning of the work, its form, its context, its qualities - Essay Example He experimented with oil paints and found their translucence intriguing and began to use them in a flat mode, in interlocking geometric patterns with well-defined clean edges, which later came to be known as hard-edged painting. Benjamin eliminates any trace of brushwork using big, flat brushes to spread the paint in the designated area, and creates the hard-edges by using masking tape around the area to be painted. The patterns cover the entire picture, leaving no empty spaces, and rarely convey an impression of depth. They seem to flicker and move due to a well-planned use of color, which comes as much from Benjamin’s use of intellect as his intuition. The shapes used are often triangles, lozenges, squares, pyramids and vertical stripes, and their existence in the paintings is defined by the colors used to create them. Benjamin sometimes uses mathematical formulas and progressions to choose the color types, tones, shades and hues for one particular painting. He also paints his work in series in such a way that sometimes the only difference between two paintings lies in the colors used, shapes remaining identical. Benjamin has definite political opinions, but they have never been expressed in his work, which remains resolutely abstract. His works emerge out of a pure fascination with color, and seek to intensively examine the relationships between various shades and types to create moods: most of his chosen colors are sunny, brilliant, and are often used in blinding contrasts. His first groundbreaking exhibition was in 1954, and since then his collections have been exhibited numerous times in various galleries and museums, where his work has been noted for its wit and inventiveness. An example is the painting simply called "#4," dated 1972, which is a rectangle 128 cms* 170cms. This proportion has been adapted as the ratio of height and width for all the 576 colored rectangles Benjamin has painted in this picture. The color distribution covers the

Saturday, August 24, 2019

Scholarship on Dickens Essay Example | Topics and Well Written Essays - 1000 words

Scholarship on Dickens - Essay Example In those days, London was described as the doomed city with unsanitary living conditions and was a galore of diseases. â€Å"There were four epidemics of cholera within Dickens’s own lifetime and, beside these mortal visitations, there were periodic and regular outbreaks of typhus, typhoid fever, epidemic diarrhoea, dysentery, smallpox and a variety of ailments which were classified only as â€Å"fevers†.2† To improve the health condition of the people of London and other cities that were the main breeding ground for all diseases that would spread later to the rural areas of England, Dickens knew that sanitary conditions of the cities should improve. We see him attending many meetings to talk on behalf of sanitary improvement. Passionately arguing the case of sanitary reform in London on May 10th 1851, Charles Dickens said: â€Å"I can honestly declare that the use I have since that time made of my eyes and nose have only strengthened the conviction that certain sanitary reforms must precede all other social remedies, and that neither education nor religion can do anything useful until the way has been paved for their ministrations by cleanliness and decency.3† Sanitary work in London and other cities started only in his latter life. He was an influential social reformer of his time in many fields and being so very well-known, his views were respected. His characters of imagination provided him ample platform to argue the social reforms that he craved to see in the difficult times of Victorian England. His magazines and speeches on social injustice show him as one of the main propagandists of the time. He advocated the reforms without being specific about them. His desire was to see any kind of relief to the sufferers. For example; the Hard Times was based on a labour dispute in the weaving industry which was referred as â€Å"The Preston Lockout 1853-54†. According to George Bernard Shaw, ‘he was a revolutionary without knowing it4’. In a

Friday, August 23, 2019

Stating And Justifying A Position Statement Research Paper

Stating And Justifying A Position Statement - Research Paper Example The research paper "Stating And Justifying A Position Statement" analyzes several statements by presenting the reasons for holding the position regarding them. "It’s human nature to be greedy". Everyone has an aspect of greed in their personality which can be either for money, things, fame or people but it has to be kept under control so that it does not dominate one’s character. As the competition among people intensifies regarding wealth and materialistic things, greed will become an important part of human nature. "Capital punishment is a deterrent to crime." The author disagrees with the statement because although many countries claim that capital punishment deters the number of crimes but the statistics show that the criminals are encouraged to carry out their activities. It has been found that the capital punishment is not given on the basis of actual crime committed and it is considered to be unfair and unjust by the citizens. "Everyone has a value system of some kind" The author agrees with the statement because each human being is nurtured within a set of beliefs and values which shape the individual’s personality and more importantly the perception of the world. During the interaction with others in the surroundings, people carry their values with them and this becomes one of their vital aspects of life. "We know ourselves better than others know us" There are many unobservable traits of the personality which are evident to ourselves and that is why we know ourselves better than others do.

Thursday, August 22, 2019

Power and control comparrison Essay Example for Free

Power and control comparrison Essay Examine the way Shakespeare presents power in the character and actions of Lady Macbeth. In this Controlled assessment I will be trying my hardest to examine the power, actions and emotions of Lady Macbeth throughout the entire play. ‘Macbeth’ by William Shakespeare is a very unusual play, the characters aren’t part of your expectations especially Lady Macbeth. Shakespeare made a clear opposite feature between Lady Macbeth and Macbeth, which is a very challenging yet effective technique. Shakespeare’s character Lady Macbeth is a very different character, her personality shines throughout the play, Lady Macbeth wasn’t your usual woman in that time period, most of the women then were very obedient, shy and quiet. Most of the women of that time were very obedient towards their fathers and husbands†¦ Well, Lady Macbeth was the complete opposite; she was the dominant person in hers and Mac Beth’s relationship. Lady Macbeth was very controlling of Macbeth, we know this because- â€Å"Infirm of purpose. † This quote suggests that Lady Mac Beth was trying to control Macbeth and show that she has power over him. Lady Macbeth was aiming to be the most encouraging, yet powerful partner, although she ended up acting malicious and self-centred. There is a clear transition between the characters Lady Macbeth and Macbeth; it makes you think about why she was so powerful and why Macbeth was allowing her to overrule his life. Macbeth seems to be very conscious of Lady Macbeth, and her behaviour towards him and others. Macbeth comes across to the audience as quite weak and unstable, we don’t know if it’s because of the way he is treated by Lady Macbeth, or if that’s just his nature. Although, Shakespeare may have written the play to insinuate that Lady Macbeth treats Macbeth the way she does, because he allows it, and he is generally just an easy going character. On the other hand Lady Macbeth gets tired of Macbeth being too easy going towards her and their surroundings; we know this because â€Å"Screw your courage to the sticking place† basically Lady Macbeth said man up, start acting braver courageous like a ‘real’ man. The audience in the gallery must have all had a different experience watching Shakespeare’s plays, as there were different sections of the Gallery. Although, the audience were probably quite shocked because of how different the story line was. Also because back then all of the characters would have been played by males, which must have made it harder for the audience to feel the emotions of Lady Macbeth and understand how Macbeth really felt when his own wife treated him like her slave. We don’t know if ‘Macbeth’ was influenced on a true story, but Shakespeare wrote it very well, as if sounded and was based out very real, we could easily tell what type of person Lady Macbeth was and how she was treating Macbeth. Lady Macbeth is a very stubborn character, she likes to have everything her way, with no one telling her different. Lady Macbeth was a very foolish selfish woman, she wanted everything for her own wealth and fortune, but she would never do it with her own hands, so she wanted Macbeth to kill the king (King Duncan) so that she could be queen and Macbeth would be king; Lady Macbeth didn’t care that she was killing someone, she just wanted to kill the king, and thought no one would notice or find out it was Macbeth. Macbeth was very hesitant to kill Duncan, as much as he would love to be king, and he was next in throne, he just wasn’t sure if he was the right person for the job. Lady Macbeth wasn’t pleased with Macbeth trying to back out of the situation, we know this because- â€Å"when you durst do it, then you were a man† Lady Macbeth is basically saying to Macbeth, stop worrying and waiting around. just hurry up, just kill the king!! Lady Macbeth was very blunt and truthful to Macbeth, which was sometimes deceived as being nasty and hurtful. How does the poem present power and control. In this essay I will be examining how Sassoon presents power and control in comparison to ‘My last duchess’ and ‘Base details’. Robert browning shows power and control in his poem, ‘my last duchess’. We know this because of this quote in the poem, ‘That’s my last duchess painted on the wall’. This quotation represents power and control, by the way it has been written, ‘that’s my’ implying that he owned the duchess, and that she was his property, but more of an object to show off his power towards women. ‘My last duchess’ seems as if there has been more than one duchess. He seems to have a lot of pride to be more of less a lady’s man. As he is a duke, and a very wealthy man, he’s wary of others and wants people to know his authority. Being a duke he feels as though he can control others, mainly his wife/duchess. Browning shows another side of the duke, which was quite unexpected, especially to the readers; as the duke seems very strong and powerful, although a strike of jealousy shines though, in this quotation, ‘she thanks men’ this to me implies jealousy, as the duke is pointing out that she is talking to other men, which clearly he isn’t impressed with. This shows mainly control, the duke treats his wife like an object, she can’t talk to other men, other than her husband she father. Because of the duke’s controlling outlook on life, he can’t see his wife talking to other men, because I think he fears he could lose her his pride. In this quotation, browning portrayed the Duke living up to his high authority, ‘I gave commands’ this quotation sums up the dukes attitude towards others, and is probably the best example of power and control in this poem. Back In the 16th century, men had most of the control, so it wasn’t as shocking then as it is now. The duke looks down at others and expects people to bow down to him. Browning has portrayed power in the duke well, as we can clearly see that the duke doesn’t agree with others getting attention or ignoring his authority, so he makes his importance head and clear. Browning makes the readers feel sympathetic towards the duchess in this quotation, ‘She had a heart-how shall I say- too soon made glad, too easily impressed’. In this quotation is tells us more about the duchess, that she is a woman with a heart of gold and wouldn’t want to hurt anyone or get on the wrong side of anyone. By us knowing this about the duchess, it makes us think more about the way she is being treated by the duke, as she doesn’t un-impress anyone, so the duke must get away with murder. The duchess obviously loves the duke, and gets impressed with the smallest of compliments. In this case their relationship clearly shows that Love is blind. ‘My last duchess’ and ‘Macbeth’ are very similar, in that they both examine the different structures of power and control. Browning shows power between a couple, and that the duke has all of the power and control in the relationship, we know this because of the past quotation ‘I gave commands’; which is a very powerful quotation, it makes the readers feel sympathetic towards the duchess and others surrounding the Duke. This quotation also shows that the relationship is built on power and control, the duchess won’t do anything to aggravate the duke, as she is probably scared of the outcome. Shakespeare’s Sassoon examines the theme of power and control in his poem ‘Base Details’. This quotation, ‘And speed glum heroes up the line to death’ represents power and control in that the majors couldn’t care less about the difficult conditions the soldiers have to face up to. It’s clear to me, that although the soldiers should earn full authority, the majors think they are one better than the soldiers to take full authority of them and treat them like dirt. By Sassoon using the specific word ‘death’ it makes us worry that the soldiers, too young or old will eventually be left behind to die. This is the harsh reality of WW1, as there would have been too many weak soldiers who would have been left in harsh conditions to die painfully; as there weren’t as many doctors and nurses on the scene as there are today. Sassoon compares the similar themes between ‘base details’ and ‘Macbeth’. From the quote ‘poor young chap-I’d say I used to know his father well. This shows that the majors don’t care about the man, as they can easily say poor young chap but didn’t seem to help him in any way shape or form, also by saying ‘I used to know his father well’, this shows that the majors are so inconsiderate of others. It’s very selfish that the youngest men are put on the front line, by the majors, it seems as though the majors think that the young men aren’t as experienced to do anything else, so they are put on the most life threatening position.

Compare the pre twentieth century Essay Example for Free

Compare the pre twentieth century Essay Compare the pre twentieth century A Christmas Carol by Charles Dickens with the twentieth century play An inspector Calls by J. B. Priestly focusing particularly attention on plots, character and authorial intent; why do you think the two pieces of literature written at such different times are so similar? Both of these stories were written over a hundred years apart from each other but the message that comes across is a story about morals. A lot of people think that the stories are about stating the rich verses the poor. I dont see this, as there is a lot more to the stories than this in both IC and CC. In these stories the message that is brought to our attention is that what ever people do or what they have done they always deserve a second chance. There are a lot of similar features that appear in the two stories. One of these the similarities is between Scrooge and Mr Birling. Both of these men dont seem to care about other people and just think about them selves. Birlings shows this when he says Community and all that nonsense. This also shows how narrow minded he really is. In Scrooges case things are even worse as he does not even care for his own nephew Its enough for a man to understand his own business and not to interfere with other peoples. These two both think that people who are poor have to work all around the clock and dont understand that everyone is equal and some people (the rich) are more fortunate than others. Another example of their similarities as they look for any that could lead to a business opportunity. In IC Birling shows that he looks at Sheila and Geralds marriage is not a moment of joy but a huge business opportunity. This would greatly benefit him in the long run. We look forward for the day when Crofts and Birlings are no longer competing but working together. This compares well with when Scrooge in CC says He was an excellent man of business, on the very day of the funeral on the funeral of a long life partner, which would usually be very upsetting but instead jumps at the chance to keep his business going on his funeral. It is also shocking that he doesnt even show any sympathy towards him. One main reasons that these two men are so narrow minded is their generalisation. They resort to picking on people who ever they but they only see them as they do in their heads not who they truly are. Scrooge announces strictly I cant afford to make people to make idle people merry to one of young man who is trying to collect money for charity. He thinks that as some people are poor they cannot be happy. We assume that he thinks that people have to be rich to be happy. A good example of this is when Scrooge says to his nephew What have you to be merry? Scrooges nephew replying, What right do you have be dismal? sharply. This shows that just having family and friends with you at Christmas should be enough to make you happy. In IC Birling announces, If you dont come down sharply on these people then theyd soon be asking for the earth. Here he generalises his factory workers as greedy. This brings through his experience that he actually has of normal people.

Wednesday, August 21, 2019

Germany Competitiveness The Porters Diamond Context Economics Essay

Germany Competitiveness The Porters Diamond Context Economics Essay Context for firm strategy and rivalry: Germany can be considered center of Europe both for its geographic and political position. This gives to Germany the possibility to lead the European market and to manage a relevant diversification of its internal economy; it means to create a hugely competitive business environment for German companies. The efficiency rate in German large and small companies is higher than international standards due to the great amount of off shoring and outsourcing practices so that it makes this economy the most competitive in Europe. Throughout last years, German small and medium enterprisers performed better than the large ones, overtaking even the US competitive standards, as shown by the Work Competitiveness Yearbook 2010. Those small enterprisers are the so called hidden champions because they are little known to the public even if they are world market leaders. In contrast to the practice of the other European countries to develop economies related on large state-owned industrial champions, Germany could be considered such as a private driven economy in which the small and medium enterprises are playing the most important role in boosting investments and employment rate. They also make the success of German export with the 80% of the production sold abroad; the Machinery and Equipment Cluster, for instance, holds almost 20% of world export market share. These companies successfully compete on innovation processes and on improving efficiency, getting a great benefit from both the excellent European and German intellectual property protection. According to the World Economic Forum (WEF), Germany represents one of the worlds best location in planning and operating security and it is one of the leading Nations in the field of propriety rights protection and contracts protection. This excellence let Germany to grant over 12,500 patents at the EU Patent Office only in 2010 and to be the European leader in triadic patents, registered in the three most important worlds patent offices: the European Patent Office, the United States Patent and Trademark Office, and the Japan Patent Office. The German legal system itself can be considered one of the most efficient and independent of the entire world. Moreover, the social and political stability of the country and the Germans culture based on the total respect of the laws principles make this country a greatly attractive places for corporate investments projects even for foreign firms in almost all the industries. In addition to the high quality of the legal organization, Germany has developed a very internationally competitive taxation system: in 2008 an ambitious reform was made in order to decrease the corporate tax burden by around the 25% and the corporate income tax down to 15% on all corporate taxable earnings. Eventually, Germany has developed a unique corporate governance system that makes possible a virtuous match between workers and employers in order to avoid time-consuming and value-destroying disputes: it becomes a key success factor to rise up during recession periods. As a matter of fact, core decisions are taken through Job Alliances that enable flex-security on job market in order to keep companies competitive while maintaining job positions. Great importance is given to the role of federal government which gives big support to this system promoting grants and self-regulation policies. Factor conditions: Germany benefits from a huge number of natural resources such as building materials, natural gas, wood and other strategic natural elements. Its wide land gives to the country a lot of space that can be exploited focusing on clean energy production. Moreover, the climate represents an important factor in producing energy with the key role played by the wind that constantly flows in the northern part of the country. The prevalence of lowlands in northern regions makes Germans able to take the most possible advantage of the wind, becoming part of the Northern Power Cluster for wind energy production. The pretty big population of Germany can be considered little diversified in culture and tradition with a big prevalence of German native speakers over the other cultures ( almost 91% of the entire population, as the CIA World Factbook points out ). The German position on human capital point of view is strongly influenced by the unique education system that represent a best practice in all over the world. This is focused on the importance given to the professional training in order to provide people, since earlier age, with a set of skills useful to join the job market. Parallel to the professional-oriented approach there is also a very good and selective university system for the large number of young people that decide to longer dedicate themselves to study activities: mechanical engineering, with more than 400,000 matriculate students, ranks second in the top 20 of the most in-demand study programs and provides the highest skilled workers for the main sectors of the country such as automotive, machinery, electrical and electronic. This dual track allows enterprises to reduce dramatically the labor costs in term of training programs and young people to enter in the job market already with a high productivity rate. Germany can be considered extremely attractive as a location for investments due to high productivity rates and stable wages. In addition, in recent years the overall labor cost has been the lowest in Europe with an annual increase rate of less than 2%; this job market context contributes to enhance strong competitive business relations. Unskilled workers represent almost the 20% on the total workforce; this evidence reflects the attention paid to education and emphasizes the companies ability to attract skilled workforce from other countries. Germany Important concerns from governments point of view remain the unemployment rate (at the 6% in 2011, as said in CIA World Factbook) and the pretty low participation in work force, compared with countries such as US, UK or Japan. In addition, Germany is one of the worlds leaders in RD investments, both in terms of budget and percentage of GDP, reaching the 2.8% and overlapping the EU average of 2.1%. The high regard to investments is coming both from the public and the private sector and the great number of PPPs (Private and Public Partnership) is playing a key role in German competitiveness and in planned development. The high level of RD investments impacts positively on the dynamicity of German economy: over 27% of the manufacturing turnover is generated from innovative products. Eventually, Germany derives its economic power also from its important and well organized grid of transportation infrastructures: the 2009-2010 Global Competitiveness Report of the WEF ranked Germany at the first position in terms of infrastructures. The rail system, which connects the country with all the neighbors by high speed rail, is gaining more efficiency thanks to the open access to the market given to privates that make the sector much more competitive than the state monopoly. This makes Germany the 6th position for railways infrastructure in comparison with the other states of the world (CIA World Factbook ). Water ways and harbors are extremely well developed too and the airports system is ranked 13th in the CIAs comparison between countries as stated in the CIA World Factbook. By the way, governments biggest challenge is to continue to increase the already large flow of foreign direct investments and to improve, as much as possible, the venture capital system by the adoption of specific policies. Today, German legal framework makes no distinction between national and foreign investments promoting principles such as freedom in trade and payments and the reduction of barriers. Moreover, there are special treatments and opportunities for young entrepreneurs and start-ups: on one hand, special conferences and events like the German Equity Forum, and, on the other one, proposals of venture capital partnerships through development banks and the German Private Equity and Venture Capital Association. Further financial assistance is given at regional, national and European level through a wide number of instruments: cash incentives, interest reduced loans, public guarantees, labor-related incentives and RD grants. Demand conditions: Domestic demand is therefore becoming a more significant driver of Germanys economic expansion (from   CIA World Factbook). Due to the Euro financial crisis the export rate to EU cover the loss in term of exports. In this perspective, a key role is played by the government in boosting investments and supporting internal demand: there are available some governments loans made up for enterprises in order to enable them to borrow new capital at a lower interest rates and, in turn, be able to offer lower prices to the consumers market. A great influence on the demand is played by the high level of quality and environmental standards that characterize German regulation. Germany has a virtuous regulation history, starting with the Deutsches Institut fà ¼r Normung (DIN) during the 20s until today: a huge number of innovations has been introduced in this field such as self-regulation processes related to the new public governance system. German standards and their regulation are also much influenced by EU, which is trying to homogenize the regulation of the Common Market and to stimulate cleaner manufacture and energy production (EU 20/20/20 Program): this affects Germans big industrial sectors such as machinery, chemical and power clusters. This context originates a more complex supply and demand structure which express the need to assess the high level of constraints due to the global environmental challenges. Related and supporting industries: the important number of local suppliers are strongly supported by the efficient system of German scientific infrastructures set up both at the federal and local level . Germany has various types of research locations such as universities, laboratories, non-university institutes, companies and Federal as well as Là ¤nder institutions. Moreover, the German Federation of Industrial Research Associations (AiF) is a great example of how German companies themselves cooperate to research and innovation activity contributing directly to the country competitiveness. The AIF mostly contributes to the technology transfer process and research activity in the growing market of renewable energies such as solar and wind power. Germany is home to several research infrastructures with global significance in physics, earth science, climate research or the humanities. Examples of research infrastructures are: Deutsches Elektronen-Synchrotron (DESY) and the German Cli mate Computing Centre (DKRZ). In addition, Germany has a greatly developed Machinery and Equipment industry which provides the supply of power transmission engineering, material and air-handling technology and machine tools. This is the most innovative sector within the country and heavily influence German economy supporting all the other strategic sectors such as chemical, electronic, automotive and renewable energy, providing the sub-components needed for production processes. Da inserire nel diamante sul cluster: GREEN ECONOMY, INVESTMENTSà ¢Ã¢â€š ¬Ã‚ ¦(clean power) Germany is the world leader in green technologies Æ’Â   leader in sustainable industries (wind energy, photovoltaic, bioenergy industry, Electricity (demand, import, exports, quanto produce il solare, il vento..) WIND ENERGY: p.6 PORTERS FORCES (Porters book) Role of Government: Public demand, self-regulation, promoting networks and clusters. Public RD support and PPP P.11 and others (ig. Website) Role of Federal Government in green energy P.5

Tuesday, August 20, 2019

Andrew Carnegie Essay -- Biography Biographies

Andrew Carnegie Andrew Carnegie always thought reading was one of the best ways to learn. He was also a very generous person in the industrial revolution. To be very generous in donations you do need money, and he definitely had a lot of money to be generous. This generosity completed the industrial revolution. He made most of his money with his steel company called the Carnegie Steel Company. The Carnegie steel company then changed to the United States Steel Corporation. In one year,1900, his company made forty million dollars, in which twenty-five million went to him alone. He capped off all of his money making by selling his huge Steel Corporation to J. P. Morgan. For selling this company Carnegie made over two hundred fifty million dollars. He was very generous with all of his money, mostly by funding free libraries. One of the first things he gave was free public baths in Dunfermline, Scotland, where he was born. He funded free public baths as early as 1869. The first library he funded was built in Scotland in 1881. He funded libraries mostly because he was a big reader himself. He self-taught himself by reading books, and he knew that books brought him all the way to the top. He wanted other people to have the same opportunity as he had by reading books themselves. One of Carnegie’s legendary saying was "Free to the People," which is carved in stone over the doors of The Carnegie Library of Pittsburgh. Andrew Carnegie would not live for...

Monday, August 19, 2019

Essay --

Abortion. Don’t Do It Women get abortions all over the world, and there are several reason why they get them. What they don’t know is that they’re hurting themselves. They’re hurting another human being. Scientist did a study and it shows that the fetus can feel pain while being aborted. A women should not get an abortion, because they are killing a being that didn’t ask to be here,the fetus can feel pain , it can cause post traumatic stress disorder, and other bodily issues. The fetus that is being aborted had no choice on whether or not it wanted to be here or not. Since it’s not right to murder someone outside of the womb, how is murdering an infant, a person inside the womb any different? The fact of the matter is it’s not. Abortion is murder that goes unnoticed by the law. It takes away a defenseless life that probably could’ve been a great asset to the world. Alot of people don’t know that the fetus can feel pain. Some doctors tell the patient that the fetus can’t feel anything.Truth is the fetus can feel every bit of it, and getting an abortion causes a violent a...

Sunday, August 18, 2019

Alice Walkers Color Purple - Historical and Political Insight Essay

The Color Purple : Historical and Political Insight Alice Walker’s writings were greatly influenced by the political and societal happenings around her during the 1960s and 1970s. She not only wrote about events that were taking place, she participated in them as well. Her devoted time and energy into society is very evident in her works. The Color Purple, one of Walker’s most prized novels, sends out a social message that concerns women’s struggle for freedom in a society where they are viewed as inferior to men. The events that happened during and previous to her writing of The Color Purple had a tremendous impact on the standpoint of the novel. The Civil Rights Movement was the largest influence on Walker’s writings. In a decision handed down by the Supreme Court in 1954, the beginning of civil rights occurred. In the decision of Brown vs. The Board of Education, the court ruled that separate educational facilities were inherently unequal because they gave AfricanAmerican children a sense of inferiority and retarded their educational and mental development. That case began the civil rights uprising in the United States. The Civil Rights Act of 1964 forbid businesses connected with interstate commerce to discriminate when choosing its employees. If these businesses did not conform to the act, they would lose funds that were granted to them from the government. Another act that was passed to secure the equality of blacks was the Voting Rights Act of 1965. This act, which was readopted and modified in 1970, 1975, and 1982, contained a plan to eliminate devices for voting discrimination and gave the Department of Justice more power in enforcing equal rights. In another attempt for equal rights, the Equal Employment ... ...ally signed in 1973 and the Americans returned home following the signage. However, all was not well in the US. Overall, the war was very unpopular to the public and it led to radicalism and polarization of the country’s youth. Many universities had demonstrations and a resistance against institutions was prevalent on college campuses. By 1974, the country’s economy was in recession, a direct response to the Vietnam War. The Civil Rights Movement and the Vietnam War were the two primary influences on the life and writings of Alice Walker. Walker is still alive today and continues to write about society issues that have affected her life. "Civil Rights and Liberties-Civil Rights Movement." Encyclopedia Americana. 1996 ed. Jackson, Melinda L. "Alice Walker-Womanist Writer." Online. Internet. 14 April 1998. Available http://wwwvms.utexas.edu/~melindaj/alice.html

Saturday, August 17, 2019

Chopra & Meindl

1. Consider a supermarket deciding on the size of its replenishment order from Proctor & Gamble. What costs should it take into account when making this decision? The main cost categories for the supermarket’s inventory policy are material costs, ordering costs, and holding costs. Material cost is the money paid to Proctor and Gamble for the goods themselves. Ordering costs, also called procurement costs, are incurred by requesting the goods from the supplier and are fixed in the sense that they do not vary with the size of the order. Examples of such fixed costs are the labor required to place the order, handle the resultant paperwork and the transportation fee to ship the order. The holding cost is the cost to carry one unit in inventory for a specified period of time, usually one year. This cost is variable and includes the cost of capital and all of the costs associated with physically storing inventory – shrinkage, spoilage or obsolescence, insurance, the cost of capital, the cost of the warehouse space, etc. 2. Discuss how various costs for the supermarket change as it decreases the lot size ordered from Proctor & Gamble. As the lot size ordered from the supplier decreases, the holding cost (variable with respect to lot size) decreases. As the lot size decreases, the ordering cost remains the same, but the annual ordering cost will rise since the total number of orders each year must increase. As the lot size decreases, the cost of the materials will drop on a per-order basis but will stay the same on an annual basis since total annual demand hasn’t changed. The exception to this occurs if the supplier has a price break for an order size above a certain threshold; in this case the cost of the goods might increase if the reduced order size is not sufficient to trigger a substantial per unit discount. 3. As demand at the supermarket chain grows, how would you expect the cycle inventory measured in days of inventory to change? Explain. As the demand at the supermarket chain grows, we would expect the cycle inventory as measured in days of inventory to also increase, although the increase in cycle inventory is only 40% of the increase in demand. This is because the relationship between the optimal lot size Q* and the annual demand D is [pic]. Since D is under the radical, its doubling to 2D does not translate to a jump from a Q* to a 2Q* order; it translates to a jump from a Q* to a 1. 4Q* order. 4. The manager at the supermarket wants to decrease the lot size without increasing the costs he incurs. What actions can he take to achieve his objective? One action would be to simply decrease the lot size and let the robust nature of the EOQ model work its magic. The total cost curve on either side of the optimal order quantity, the Q*, is relatively flat, so movements in either direction have little impact on total annual procurement and carrying costs. If greater cuts in lot size are desired, the manager can aggregate multiple products in a single order. Recall that the EOQ model is based on a one-product-at-a-time assumption; if multiple products are aggregated, then the fixed procurement cost is spread over all of the items and dramatic lot size reductions are possible. If the same products are being ordered by another supermarket in the same chain (or at least by stores that are willing to cooperate) the combined orders can be delivered by a single truck making multiple stops, thereby reducing transportation expense. Other techniques that should be deployed when aggregating across product lines include advanced shipping notices and RFID tags that will make inventory tracking and warehouse management simpler. 5. When are quantity discounts justified in a supply chain? Quantity discounts are justified in a supply chain as long as they are the fruits of a coordinated supply chain and maximize total supply chain profits. For commodity products for which price is set by the market, manufacturers with large fixed costs per lot can use lot size-based quantity discounts to maximize total supply chain profits. 6. What is the difference between lot size-based and volume-based quantity discounts? Lot size discounts are based on the quantity purchased per lot, not the rate of purchase. Lot size-based discounts tend to raise cycle inventory in the supply chain by encouraging retailers to increase the size of each lot. Lot size-based discounts make sense only when the manufacturer incurs a very high fixed cost per order. For commodity products for which price is set by the market, manufacturers with large fixed costs per lot can use lot size-based quantity discounts to maximize total supply chain profits. Volume discounts are based on the rate of purchase or volume purchased per specified time period. Volume-based discounts are compatible with small lots that reduce the cycle inventory. If the manufacturer does not incur a very high fixed cost per order, it is better for the supply chain to have volume-based discounts. For products for which a firm has market power, volume-based discounts can be used to achieve coordination in the supply chain and maximize supply chain profits. 7. Why do manufacturers such as Kraft and Sara Lee offer trade promotions? What impact do trade promotions have on the supply chain? How should trade promotions be structured to maximize their impact while minimizing the additional cost they impose on the supply chain? Manufacturers use trade promotions to offer a discounted price and a time period over which the discount is effective. The goal of manufacturers such as Kraft and Sara Lee is to influence retailers to act in a way that helps the manufacturer achieve its objectives. These objectives may include increased sales, a shifting of inventory from manufacturer to retailer, and defense against the competition. Trade promotions may cause a retailer to pass through some or all of the promotion to customers to spur sales, which increases sales for the entire supply chain. What happens more frequently in practice is that retailers may choose to pass through very little of the promotion to customers, purchase in greater quantities, and hold this cheaper inventory in greater quantities. This action increases both cycle inventory and flow times within the supply chain. Trade promotions should be structured such that a retailer’s optimal response benefits the entire supply chain, i. e. , retailers limit their forward buying and pass along more of the discount to end customers. If the manufacturer has accumulated excessive inventory, then a trade promotion may provide sufficient incentive to the buyer to forward buy, thus drawing inventories down to an appropriate level. The manufacturer may be able to smooth demand by shifting it to a period of anticipated low demand with a trade promotion. Research has shown that trade promotions by the manufacturer are effective for products with high deal elasticity that ensures high pass-through (passing the discount on to the consumer) and high holding costs that ensure low forward buying, paper goods being the poster child for this combination. Trade promotions are also more effective with strong brands relative to weak brands and may make sense as a competitive response. 8. Why is it appropriate to include only the incremental cost when estimating the holding and order cost for a firm? The cycle inventory models discussed in the chapter are robust; thus incremental (variable) costs per lot size are more important than costs that are fixed with respect to lot size. The labor component of procurement or setup costs may be salaried; therefore changes in lot size do not impact this component.

Friday, August 16, 2019

Dtmf Remote Appliance Control System Using Mobile Phone

CHAPTER 1 INTRODUCTION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† is used to control appliances which are far away from the user using mobile phone. The aim of the proposed system is to develop a cost effective solution that will provide controlling of home appliances remotely and enable home security against intrusion in the absence of homeowner. The devices connected as home and office appliances consume electrical power and they should be controlled as well as turn on /off if required. Most of the time, it was done manually. Now it is a necessity to control devices more effectively and efficiently at anytime from anywhere. Take an instant when we are going to office and suddenly remembered that to switch off the microwave oven we fell convenient if we could switch off without going back to home, in such situations this project comes to our rescue. In this system, we are going to develop a cellular phone based home/office appliance controller for controlling arbitrary devices. This includes a mobile phone which is connected to the system via head set. To activate the mobile phone unit on the system, a call is to be made and as the call is answered (auto answer mode), in response the user would enter a password to access the system to control devices. As the caller presses the specific button on the keypad, it results in turning ON or OFF specific device and the device switching is achieved by relays. In this project, we designed a basic model and it is used to control 4 lights using a mobile phone, micro-controller and transceiver. The maximum number of devices that can be operated will be the number of buttons present on the keypad of mobile phone. . 1 Block diagram: Figure 1. 1: Block Diagram Fig 1. 1 represents the block diagram of DTMF Remote Appliance Control System using Mobile phone, used to control the appliances present at a distance. Brief Description of Hardware Modules: The DTMF Remote Appliance Control System consists of 1. Mobile Phone 2. MT8888 DTMF Transceiver 3. Philips 89C51 Micro-controller 4. Liquid Crystal Dis play 5. Power Supply Unit 6. Relay Driver 7. Relays 8. Devices 1. 2. 1 Mobile Phone: Mobile Phone is used as a media to instruct the micro controller to power ON/OFF the appliances. The mobile phone used here is Nokia 6030 as it has the required features and is interfaced with the transceiver through ear phones. 1. 2. 2 MT8888 DTMF Transceiver: The MT8888C is a monolithic DTMF transceiver with call progress filter. The transceiver consists of transmitter and receiver. The DTMF signals are transmitted through transmitter and they are received by the mobile phone and decoded using a DTMF receiver/decoder IC’s. 1. 2. 3 PHILIPS 89C51 Micro Controller: The PHILIPS 89C51 is a low cost micro-controller. It has a 40 pin configuration and contains non volatile Flash memory of 64KB which is both parallel programmable and serial in system programmable memory. 1. 2. 4 LCD display: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80 byte DD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. 1. 2. 5 Power Supply Unit: The power supply unit is used to provide a constant 5V supply to different IC’s. This is a standard circuit using external 12V DC adapter and fixed 3-pin voltage regulator. Diode is added in series to avoid reverse voltage. 1. 2. 6 Relay Driver: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance, we may use two transistors to form a darling ton pair and this pair in CC configuration provides input impedance as high as 2Mohms. 1. 2. 7 Relays: Relays are remote control electrical switches that are controlled by another switch, such as a horn switch or a computer as in a power train control module. Relays allow a small current flow circuit to control a high current circuit. 1. 2. 8 Devices: The devices can be micro-wave oven, bulbs, fans, air cooler, etc which are far away from the user. The micro-controller plays the intelligent part in controlling these devices. 1. 3 Working: This project is used to control the appliances present at a distance using a mobile phone. The first step is the user should make a call to the mobile phone, which is in auto answer mode and thus call gets connected. The user presses the digits present over the keypad of his phone for controlling the appliances present at home or office. Whenever a button is pressed a tone is generated and it is transferred to the mobile phone present in the home or office, which is interfaced with the DTMF transceiver. The DTMF receiver decodes the tone generated and it activates the controller accordingly. The controller operates the devices according to the coding set by the user. The status of the devices whether they are ON/OFF is indicated in the LCD. CHAPTER 2 MT8888 DTMF TRANSCEIVER Introduction: The MT8888C is a monolithic DTMF transceiver with call progress filter. It is fabricated using CMOS technology and it offers low power consumption and high reliability. The receiver section is based upon the industry standard MT8870 DTMF receiver, while the transmitter utilizes a switched capacitor D/A converter for low distortion, high accuracy DTMF signaling. Internal counters provide a burst mode such that tone bursts can be transmitted with precise timing. A call progress filter can be selected allowing a microprocessor to analyze call progress tones. The MT8888C utilizes an Intel micro interface, which allows the device to be connected to a number of popular microcontrollers with minimal external logic. The applications of DTMF transceiver include credit card systems, paging systems, repeater systems, interconnector dialers, mobile radio and personal computers. In our project, it is used for decoding the tone generated by the user when he presses a button of the keypad. After decoding the tone, it is given to the microcontroller for controlling the appliances. Features: The features of MT8888 DTMF transceiver include: 20 pin DIP package Central office quality DTMF transmitter/receiver Low power consumption High speed Intel micro interface Compatible with 6800 microprocessors Adjustable guard time Automatic tone burst mode Call progress tone detection up to -30dbm Microprocessor port Pin Diagram & Description: Figure 2. 1: DTMF Pin Diagram Figure 2. 1 shows the pin diagram of MT8888 and the description of the monolithic IC is as shown in the following table 2. 1. Table 2. 1: Description of Pins of DTMF Transceiver Pin NoNameDescription 1IN+Non-inverting op-amp input 2IN-Inverting op-amp input. 3GSGain Select. Gives access to output of front end differential amplifier for connection of feedback resistor. 4VrefReference Voltage output (VDD/2). VSSGround (0V). 6OSC1DTMF clock/oscillator input. Connect a 4. 7M? resistor to VSS if crystal oscillator is used. 7OSC2Oscillator output. A 3. 579545 MHz crystal connected between OSC1 and OSC2 completes the internal oscillator circuit. Leave open circuit when OSC1 is driven externally. 8TONEOutput from internal DTMF transmitter. 9WRWrite microprocessor input. TTL compatible. 10CSChip Select input. Active Low. This si gnal must be qualified externally by address latch enable (ALE) signal. 11RS0Register Select input. TTL compatible. 12RDRead microprocessor input. TTL compatible. 3IRQ/CPInterrupt Request/Call Progress (open drain) output. In interrupt mode, this output goes low when a valid DTMF tone burst has been transmitted or received. In call progress mode, this pin will output a rectangular signal representative of the input signal applied at the input op-amp. The input signal must be within the bandwidth limits of the call progress filter. 14-17D0-D3Microprocessor Data Bus. High impedance when CS=1or RD=1. TTL compatible. 18EStEarly Steering output. Presents logic high once the digital algorithm has detected a valid tone pair (signal condition). Any momentary loss of signal condition will cause ESt to return to a logic low. 19St/GTSteering Input/Guard Time output (bidirectional). A voltage greater than V ts detected at St causes the device to register the detected tone pair and updated output latch. A voltage less than V tst frees the device to accept a new tone pair. The GT output acts to reset the external steering time-constant; its state is a function of ESt and the voltage on St. 20VDDPositive power supply (5V typical). 2. 4 Functional Description: The MT8888C Integrated DTMF Transceiver consists of a high performance DTMF receiver with an internal gain setting amplifier and a DTMF generator which employs a burst counter to synthesize precise tone bursts and pauses. A call progress mode can be selected so that frequencies within the specified pass band can be detected. The Intel micro interface allows microcontrollers, such as the 8080, 80C31/51 and 8085, to access the MT8888C internal registers. The block diagram of DTMF transceiver is as shown in figure 2. 2. Figure 2. 2: Block Diagram of DTMF Transceiver 2. 5 Call Progress Filter: A call progress mode using the MT8888C can be selected allowing the detection of various tones, which identify the progress of a telephone call on the network. The call progress tone input and DTMF input are common; however call progress tones can only be detected when CP mode has been selected. DTMF signals cannot be detected if CP mode has been selected. Figure 2. 3 indicates the useful detect bandwidth of the call progress filter. Frequencies presented to the input, which are within the ‘accept’ bandwidth limits of the filter are hard limited by a high gain comparator with the IRQ/CP pin serving as the output. The square wave output obtained from the Schmitt trigger can be analyzed by a microprocessor or counter arrangement to determine the nature of the call progress tone being detected. Frequencies which are in the ‘reject’ area will not be detected and consequently the IRQ/CP pin will remain low. Figure 2. 3: Call Progress Response 2. 6 DTMF generator: The DTMF transmitter employed in the MT8888C is capable of generating all sixteen standard DTMF tone pairs with low distortion and high accuracy. All frequencies are derived from an external 3. 579545 MHz crystal. The sinusoidal waveforms for the individual tones are digitally synthesized using row and column programmable dividers and switched capacitor D/A converters. The row and column tones are mixed and filtered providing a DTMF signal with low total harmonic distortion and high accuracy. To specify a DTMF signal, data conforming to the encoding format shown in Table 2. 2 must be written to the transmit Data Register. Note that this is the same as the receiver output code. The individual tones which are generated (f LOW and f HIGH) are referred to as Low Group and High Group tones. As seen from the table, the low group frequencies are 697, 770, 852 and 941 Hz. The high group frequencies are 1209, 1336, 1477 and 1633 Hz. Typically; the high group to low group amplitude ratio (twist) is 2 dB to compensate for high group attenuation on long loops. The period of each tone consists of 32 equal time segments. The period of a tone is controlled by varying the length of these time segments. During write operations to the Transmit Data Register the 4 bit data on the bus is latched and converted to 2 of 8 coding for use by the programmable divider circuitry. This code is used to specify a time segment length, which will ultimately determine the frequency of the tone. When the divider reaches the appropriate count, as determined by the input code, a reset pulse is issued and the counter starts again. The number of time segments is fixed at 32; however, by varying the segment length as described above the frequency can also be varied. The divider output clocks another counter, which addresses the sine wave lookup ROM. Table 2. 2: DTMF Tones FLOWFHIGHDIGITD3D2D1D0 697120910001 697133620010 697147730011 770120940100 770133650101 770147760110 852120970111 52133681000 852147791001 941133601010 9411209*1011 9411477#1100 6971633A1101 7701633B1110 8521633C1111 9411633D0000 Note: 0= LOGIC LOW, 1= LOGIC HIGH The lookup table contains codes which are used by the switched capacitor D/A converter to obtain discrete and highly accurate DC voltage levels. Two identical circuits are employed to produce row and column tones, which are then mixed using a l ow noise summing amplifier. The oscillator described needs no â€Å"start-up† time as in other DTMF generators since the crystal oscillator is running continuously thus providing a high degree of tone burst accuracy. A bandwidth limiting filter is incorporated and serves to attenuate distortion products above 8 kHz. It can be seen from Figure 2. 4 that the distortion products are very low in amplitude. Figure 2. 4: Spectrum Plot 2. 7 Receiver Section: Separation of the low and high group tones is achieved by applying the DTMF signal to the inputs of two sixth-order switched capacitor band pass filters, the bandwidths of which correspond to the low and high group frequencies. These filters incorporate notches at 350 Hz and 440 Hz for exceptional dial tone rejection. Each filter output is followed by a single order switched capacitor filter section, which smoothes the signals prior to limiting. Limiting is performed by high-gain comparators which are provided with hysterics to prevent detection of unwanted low-level signals. The outputs of the comparators provide full rail logic swings at the frequencies of the incoming DTMF signals. Following the filter section is a decoder employing digital counting techniques to determine the frequencies of the incoming tones and to verify that they correspond to standard DTMF frequencies. A complex averaging algorithm protects against tone simulation by extraneous signals such as voice while providing tolerance to small frequency deviations and variations. This averaging algorithm has been developed to ensure an optimum combination of immunity to talk-off and tolerance to the presence of interfering frequencies (third tones) and noise. When the detector recognizes the presence of two valid tones (this is referred to as the â€Å"signal condition† in some industry specifications) the â€Å"Early Steering† (ESt) output will go to an active state. Any subsequent loss of signal condition will cause ESt to assume an inactive state. The DTMF keypad is as shown in figure 2. 5 Figure 2. 5: Typical DTMF Keypad 123A697 Hz 456B770 Hz 789C852 Hz *0#D941 Hz 1209 Hz1336 Hz1477 Hz1633 Hz 2. 8 Burst Mode: In certain telephony applications it is required that DTMF signals being generated are of a specific duration determined either by the particular application or by any one of the exchange transmitter specifications currently existing. Standard DTMF signal timing can be accomplished by making use of the Burst Mode. The transmitter is capable of issuing symmetric bursts/pauses of predetermined duration. This burst/pause duration is 51 ms ± 1 ms, which is a standard interval for auto dialer and central office applications. After the burst/pause has been issued, the appropriate bit is set in the Status Register indicating that the transmitter is ready for more data. The timing described above is available when DTMF mode has been selected. However, when CP mode (Call Progress mode)is selected, the burst/pause duration is doubled to 102 ms  ±2 ms. Note that when CP mode and Burst mode have been selected, DTMF tones may be transmitted only and not received. In applications where a non-standard burst/pause time is desirable, a software timing loop or external timer can be used to provide the timing pulses when the burst mode is disabled by enabling and disabling the transmitter. Microprocessor interface: The MT8888C incorporates an Intel microprocessor interface which is compatible with fast versions (16 MHz) of the 80C51. No wait cycles need to be inserted. Figure 2. 6 and Figure 2. are the timing diagrams for the Intel 8031, 8051 and 8085 (5 MHz) microcontrollers. By NANDing the address latch enable (ALE) output with the high-byte address (P2) decode output, CS is generated. Figure 2. 8 summarizes the connection of these Intel processors to the MT8888C transceiver. Figure 2. 6: 8031/8051/8085 Read Timing Diagram Figure 2. 7: 8031/8051/8085 Write Timing Diagram Figure 2. 8: MT8888C Interface Connections for Various Intel Micros The microprocessor interface provides access to five internal registers. The read-only Receive Data Register contains the decoded output of the last valid DTMF digit received. Data entered into the write-only Transmit Data Register will determine which tone pair is to be generated. Transceiver control is accomplished with two control registers (see Table 2. 3 and Table 2. 4), CRA and CRB, which have the same address. A write operation to CRB is executed by first setting the most significant bit (b3) in CRA. The following write operation to the same address will then be directed to CRB, and subsequent write cycles will be directed back to CRA. The read-only status register indicates the current transceiver state (see Table 2. 5). Table 2. 3: Control Register A Description BITNAME DESCRIPTION b0TOUTTone Output Control. Logic high enables the tone output; a logic low turns the tone output off. This bit controls all transmit tone functions. b1CP/DTMFCall Progress or DTMF Mode Select. A logic high enables the receive call progress mode; a logic low enables DTMF mode. In CP mode a rectangular wave representation of the received tone signal will be present on the IRQ/CP output pin if IRQ has been enabled (Control Register A,b2=1). In order to be detected, CP signals must be within the bandwidth specified in the AC Electrical Characteristics for Call Progress. Note: DTMF signals cannot be detected when CP mode is selected. b2IRQInterrupt Enable. A logic high enables the interrupt function; a logic low when either 1) a valid DTMF signal has been received for a valid guard time duration, or 2) the transmitter is ready for more data (burst mode only). b3RSELRegister Select. A logic high selects control register B for the next write cycle to the control register address. After writing to control register B, the following control register write cycle will be directed to control register A. Table 2. 4: Control Register B Description BITNAME DESCRIPTION b0 BURSTBurst Mode Select. Logic high de-activates burst mode; a logic low enables burst mode. When activated, the digital code representing a DTMF signal can be written to the transmit register, which will result in a transmit DTMF tone burst and pause of equal durations (typically 51msec). Following the pause, the status register will be updated (b1-Transmit Data Register Empty) and an interrupt will occur if the interrupt mode has been enabled. When CP mode (control register A, b1) is enabled the normal tone burst and pause durations are extended from a typical duration of 51msec to 102 msec. When BURST is high (de-activated) the transmit tone burst duration is determined by the TOUT bit (control register A, b0). b1TESTTest Mode Control. Logic high enables the test mode; a logic low de-activates the test mode. When TEST is enabled and DTMF mode is selected (control register A, b1=0), the signal present on the IRQ/CP pin will be analogous to the state of the delayed steering bit of the status register. 2 S/DSingle or Dual Tone Generation. Logic high selects the single tone output; a logic low selects the dual tone output. The single tone generation function registers further selection of either the row or column tones (Low or high group) through the C/R bit (control register B,b3). b3 C/RColumn or Row tone select. Logic high selects a column tone output, a logic low selects a row tone output. This function is used in conjunc tion with the S/D bit (control register B, b2). Table 2. 5: Status Register Description BITNAMESTATUS OF FLAGSTATUS FLAG CLEARED 0IRQInterrupt has occurred. Bit one (b1) or bit two (b2) is set. Interrupt is inactive. Cleared after status register is read. b1Transmit data register empty(Burst Mode only)Pause duration has terminated and transmitter is ready for new data. Cleared after Status Register is read or when in non-burst mode. b2Receive Data Register FullValid data is in the Receive Data Register. Cleared after Status Register is read. b3 Delayed SteeringSet upon the valid detection in the absence of a DTMF signal. Cleared upon the detection of a valid DTMF signal. A software reset must be included at the beginning of all programs to initialize the control registers upon power-up or power reset (see Figure 19). Refer to Tables 4-7 for bit descriptions of the two control registers. The multiplexed IRQ/CP pin can be programmed to generate an interrupt upon validation of DTMF signals or when the transmitter is ready for more data (burst mode only). Alternatively, this pin can be configured to provide a square wave output of the call progress signal. The IRQ/CP pin is an open drain output and requires an external pull-up resistor. 2. DTMF Registers and initialization: The DTMF has two control registers, one transmits register, one receives register, and one status register. Along with this there is a data buffer which is the entry point for the data for the DTMF to communicate with the microcontroller depending upon the give control signals on the DTMF control pins like rs0,r/w, and the data from the data buffer is communicated with the DTMF. The c ombination of rs0 and r/w pins will give the following result as shown in table 2. 6. Table 2. 6: DTMF Internal Registers RS0R/WFUNCTION 00Write to Transmit Data Register 1Read from Receive Data Register 10Write to Control Register 11Read from Status Register Initialization of DTMF: A software reset must be included at the beginning of all programs to initialize the control registers after power up. The initialization procedure should be implemented 100ms after power up. Description Control Data CS RS0 R/W b3 b2 b1 b0 Read status register 0 1 1 x x x Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 1 0 0 0 Write to control register 0 1 0 0 0 0 0 Read status register 0 1 1 x x x x Transmission using DTMF: The DTMF has to receive a command to transmit and then the data to send. Consider an example of sending a 50 ms tone- 50 ms pause burst. The procedure is as follows. CS RS0 R/W b3 b2 b1 b0 1. Write to Control Register A 0 1 0 1 0 0 1 (Tone out, DTMF, IRQ, Select Control Register B) 2) Write to Control Register B 0 1 0 0 0 0 0 (Burst mode) 3) Write to Transmit Data Register 0 0 0 0 1 1 1 (Send a digit 7) Reception using DTMF: Reception is carried out by checking the status of DTMF for a valid data in receive register and then receive it by a command. The procedure is as follows. 1) Read the Status Register 0 1 1 x x x x -if bit 1 is set, the Tx is ready for the next tone, in which case†¦ Write to Transmit Register 0 0 0 0 1 0 1 (Send a digit 5) -if bit 2 is set, a DTMF tone has been received, in which case†¦. Read the Receive Data Register 0 0 1 x x x -if both bits are set†¦ Read the Receive Data Register 0 0 1 x x x x Write to Transmit Data Register 0 0 0 0 1 0 1 Thus the initialization of DTMF Transceiver is done using the internal registers according to ur requirements and then it is used for decoding the tones generated by the user. CHAPTER 3 THE MICROCONTROLLER 3. 1 Introduction: Phillips 89C51 contains a non-volatile FLASH program memory that is both parallel programmable and serial in system and in application programmable. It is an 8-bit micro controller from MHS-51 Intel family with 4K bytes of flash and 128 bytes of internal RAM. It has 40-pin configuration and it takes input from the external sources and routes them to the appropriate devices as programmed in it. Features: The features of PHILIPS 89C51 include: 80C51 Central Processing Unit On-chip FLASH Program Memory Speed up to 33 MHz Fully Static Operation RAM expandable externally up to 64 Kbytes Four interrupt priority levels Six interrupt sources Four 8-bit I/O ports Full-duplex enhanced UART Framing error detection Automatic address recognition Power Control Modes Clock can be stopped and resumed Idle Mode Power down Mode Programmable clock out Second DPTR register Asynchronous Port Reset Watchdog Timer Pin Diagram & Description: VCC: Supply voltage. GND: Ground. Port 0: Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification. Figure 3. 1: Pin Diagram of 89C51 Micro Controller Port 1: Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 1 also receives the low-order address bytes during Flash programming and verification. Port 2: Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @DPTR). In this application, it uses strong internal pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash programming and verification. Port 3: Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also serves the functions of various special features of the AT89C51 as listed below: Port 3 also receives some control signals for Flash programming and verification. The alternate functions of Port 3 are as shown in table 3. 1. Table 3. 1: Alternate Functions of Port 3 Port PinAlternate Functions P3. 0RXD(serial input port) P3. 1TXD(serial output port) P3. 2INT0(external interrupt 0) P3. 3INT1(external interrupt 1) P3. 4T0(Timer 0 external interrupt) P3. 5T1(Timer 1 external interrupt) P3. WR(external data memory write strobe) P3. 7RD(external data memory read strobe) RST: Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG: Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programmin g. In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode. PSEN: Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP: External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require12-volt VPP. XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2: Output from the inverting oscillator amplifier. Oscillator Characteristics: XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 3. 2. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven . There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed. Figure 3. 2: Crystal Oscillator Architecture of PHILIPS 89C51: The architecture of PHILIPS 89C51 is as shown in figure 3. 3 below and the modes of operation include idle mode and power down mode. Idle Mode: In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. It should be noted that when idle is terminated by a hardware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory. Figure 3. 3: Architecture of PHILIPS 89C51 Micro-controller Power-down Mode: In the power-down mode, the oscillator is stopped, and the instruction that invokes power-down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power-down mode is terminated. The only exit from power-down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize. Table 3. 2: Idle and power down modes ModeProgram MemoryALEPSENPORT0PORT1PORT2PORT3 IdleInternal11DataDataDataData IdleExternal11FloatDataAddressData Power downInternal00DataDataDataData Power downExternal00FloatDataDataData Timer 0 and Timer 1: The â€Å"Timer† or â€Å"Counter† function is selected by control bits C/T in the Special Function Register TMOD. These two Timer/Counters have four operating modes, which are selected by bit-pairs (M1, M0) in TMOD. Modes 0, 1, and 2 are the same for both Timers/Counters. Mode 3 is different. Memory Organization: During the runtime, micro controller uses two different types of memory: one for holding the program being executed (ROM memory), and the other for temporary storage of data and auxiliary variables (RAM memory). Depending on the particular model from 8051 family, this is usually few kilobytes of ROM and 128/256 bytes of RAM. This amount is built-in and is sufficient for common tasks performed â€Å"independently† by the MCU. However, 8051 can address up to 64KB of external memory. CHAPTER 4 SERIAL COMMUNICATION 4. 1 Introduction: When a micro processor communicates with the outside world, it provides data in byte-size chunks. In some cases, such as printers, the information is simply grabbed from the 8bit data bus of the printer. This can work only if the cable is not too long, since long cables diminish and ever distort signals. Furthermore, an 8-bit data path is expensive. For these reasons, serial communication is used for transferring data between two systems located at distances of hundreds of feet to millions of miles apart. The fact that in serial communication a single data line is used instead of the 8bit data line of parallel communication makes it not only much cheaper but also makes it possible for two computers located in two different cities to communicate over the telephone. Serial data communication uses two methods, asynchronous and synchronous. The asynchronous method transfers a block of data at a time while the synchronous data transfers a single byte at a time. It a mean possible to write software to use either of these methods, but the programs can be tedious and long. For this reason, there are special IC chips made by many manufacturers for serial data communications. This chips are commonly referred to as UART (Universal Asynchronous Receiver Transmitter) and USART (Universal Synchronous Asynchronous Receiver Transmitter). The ARM has built in UARTs. Figure 4. 1: Serial Communication 4. Asynchronous Serial Communication & Data Framing: The data coming in at the receiving end of the data line in a serial data transfer is all 0’s and 1’s; it is difficult to make sense of data unless the sender and receiver agree on a set of rules, a protocol, on how the data is packed, how many bits constitute the character, and when the data begins and ends. Start and Stop bits: Asynchronous serial data communication is widely used for character orientation transmissions. In the asynchronous method, each character is placed in between start and stop bits. This is called framing. In data framing for asynchronous communications, the data, such as ASCII characters, are packed in between a start bit and a stop bit. The start bit is always one bit but the stop bit can be one or two bits. The start bit is always a 0 and the stop bit is 1. Parity bit: In some systems in order to maintain data integrity, the parity bit of the character byte is included in the data frame. This means that for each character we have a single parity bit in addition to start bit and stop bits. The parity bit is odd or even. In case of an odd parity bit the number of data bits including parity bit is even. Data transfer rate: The rate of data transfer in serial data communication is stated in bps(bits per second). Another widely used terminology for bps in baud rate. Baud rate is defined as the number of signal changes per second. As far as the conductor wire is concerned, the baud rates as bps are the same. Data framing: Figure 4. 2: Data Framing 4. 3 RS232 Standard: To allow compatibility among the data communication equipment made by various manufacturers; an interfacing standard called RS232, was set by the Electronic Industries Association (EIA) in 1960. RS232 is the most widely used serial input-output interfacing standard. In RS232, a 1 is represented by -3 to -25v, while a 0 bit is +3 to +25v. To connect any RS232 to a micro controller, voltage converters such as MAX232 are used. Max 232 IC chips are commonly referred to as line drivers. RS232 connectors: The RS232 connector is as shown in figure 4. 3 and the working of pins is described in table 4. 1 Figure 4. 3: RS232 Connector Table 4. 1: Pin description of RS232 Connector Pin noFunction 1CD-Carrier Detector 2RxD-Receive Data 3TxD-Transmit Data DTR-Data Terminal Request 5GND-Signal Ground 6DSR-Data Set Ready 7RTS-Request To Send 8CTS-Clear To Send 9RI-Ring Indicator MAX 232: The RS 232 is not compatible with microcontroller, so a line driver converts the RS 232’s signals to TTL voltage levels. The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply TIA/EIA-232-F voltage levels from a single 5v supply. Each receiver converts TIA/EIA-232 -F inputs to 5v TTL/CMOS levels. These receivers have a typical threshold of 1. 3v, a typical hysteresis of 0. v, and can accept  ±30v inputs. Each driver converts TTL/CMOS input levels into TIA/EIA-232-F levels. Transfer between microcontroller and RS 232c: Figure 4. 4: RS232 Level to TTL Level Conversion CHAPTER 5 LIQUID CRYSTAL DISPLAY 5. 1 Introduction: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80-byteDD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. The LCD unit incorporates a character generator ROM which produces 160 different 5Ãâ€"7 dot-matrix character patterns. The unit also provides a character generator RAM (64 bytes) through which the user may define up to eight additional 5Ãâ€"7 dot matrix character patterns, as required by the application. To display a character, positional data is sent via the data bus from the microcontroller to the LCD unit, where it is written into the instruction register. A character code is then sent and written into the Data register. The LCD unit displays the corresponding character pattern in the specified position. The LCD unit can either increment or decrement the display position automatically after each character entry, so that only successive characters codes need to be entered to display a continuous character string. The display/cursor shift instruction allows the entry of characters in either the left-to-right or right to left direction. 5. 2 Features: The features of liquid crystal display include: Interface with either 4-bit or 8-bit microprocessor. Display data RAM. 80 x8 bits (80 characters). Character generator ROM 160 different 5 x7 dot-matrix character patterns. Character generator RAM. different user programmed 5 x7 dot-matrix patterns. Display data RAM and character generator RAM may be accessed by the microprocessor. Numerous instructions. Clear Display, Cursor Home, Display ON/OFF, Cursor. ON/OFF, Blink Character, Cursor Shift, Display Shift. Built-in reset circuit is triggered at power ON. 5. 3 Pin diagram: Figure 5. 1: LCD Pin Diagram 5. 4 Pin description: VCC, VSS and VEE: While VCC and VSS provide + 5 V on and ground, respectively, VEE is used for controlling LCD contrast. RS: register select There are two very important registers inside LCD. The RS pin is used for their selection as follows. Is RS= 0, the instruction command code register is selected, allowing the user to send a command such as clear display, Cursor at home, etc. if RS=1 the data register is selected, allowing the user to send data to be displayed on the LCD. R/W: read/write R/W input allows the user to write information to the LCD or read information from it. R/W=1 when reading; R/W=0 when writing. E: enable The LCD to latch information presented to its data pins uses the enable pin. When data is supplied to data pins, a high to low pulse must be applied to this pin in order for the LCD to latch in the data present at the data pins. This pulse must be a minimum of 450 ns wide. D0-D7: The 8-bit data pins, D0-D7, are used to send information to the LCD or read the contest of the LCD internal registers. To display letters and numbers, we send ASCII codes for the letters A-Z, a-z, and numbers 0-9 to these pins while making RS=1. We also use RS= 0to check the busy flag bit to see if the LCD ready to receive. The busy flag isD7 and can be read when R/W=1 and RS= 0, as follows: if R/w=1 and RS = 0. When D7 =1, the LCD is busy taking care of internal operations and will not accept any new information. WhenD7=0, the LCD is ready to receive new information. . 5 LCD Commands: The commands given to the LCD are as shown in table 5. 1 Table 5. 1: LCD Commands HEXREGISTER 01Clear display screen 02Return home 04Decrement cursor (shift cursor to left) 06Increment cursor (shift cursor to right) 05Shift Display right 07Shift display left 08Display off, cursor off 0ADisplay off, cursor on 0CDisplay on, cursor off 0EDisplay on, curs or blinking 0FDisplay on, cursor blinking 10Shift cursor position to left 14Shift cursor position to right 18Shift the entire display to the left 1CShift the entire display to the right 80Force cursor to beginning of 1st line C0Force cursor to beginning of 2nd line 382 lines and 5Ãâ€"7 matrix 5. 6 Power Supply Unit: The input to the circuit is applied from the regulated power supply. The a. c. input i. e. , 230V from the mains supply is step down by the transformer to 12V and is fed to a rectifier. The output obtained from the rectifier is a pulsating d. c voltage. So in order to get a pure d. c voltage, the output voltage from the rectifier is fed to a filter to remove any a. c components present even after rectification. Now, this voltage is given to a voltage regulator to obtain a pure constant dc voltage. Figure 5. : Power Supply Unit 5. 6. 1 Transformer: Usually, DC voltages are required to operate various electronic equipment and these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly. Thus the a. c input available at the mains supply i. e. , 230V is to be brought down to the required voltage level. This is done by a transformer. Thus, a step down transformer is employed to decrease the voltage to a required level. 5. 6. 2 Rectifier: The output from the transformer is fed to the rectifier. It converts A. C. into pulsating D. C. The rectifier may be a half wave or a full wave ectifier. In this project, a bridge rectifier is used because of its merits like good stability and full wave rectification. 5. 6. 3 Filter: Capacitive filter is used in this project. It removes the ripples from the output of rectifier and smoothens the D. C. Output received from this filter is constant until the mains voltage and load is maintained constant. 5. 6. 4 Voltage Regulator: As the name itself implies, it regulates the input applied to it. A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. In this project, power supply of 5V and 12V are required. In order to obtain these voltage levels, 7805 and 7812 voltage regulators are to be used. The first number 78 represents positive supply and the numbers 05, 12 represent the required output voltage levels. Three-Terminal Voltage Regulator: Fig 5. 3 shows the basic connection of a three-terminal voltage regulator IC to a load. The fixed voltage regulator has an unregulated dc input voltage, Vi, applied to one input terminal, a regulated output dc voltage, Vo, from a second terminal, with the third terminal connected to ground. For a selected regulator, IC device specifications list a voltage range over which the input voltage can vary to maintain a regulated output voltage over a range of load current. The specifications also list the amount of output voltage change resulting from a change in load current (load regulation) or in input voltage (line regulation). GND4 Figure 5. 3: Fixed Positive Voltage Regulator CHAPTER 6 RELAY DRIVER, RELAYS & DEVICES 6. 1 Introduction: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance we may use two ransistors to form a Darlington pair. This pair in CC configuration provides input impedance as high as 2Mohms. The input signal varies with the base current of the first transistor this produces variation in the collector current in the first transistor. The emitter load of the first stage is the input resistance of the second stage. The emitter current of the first transistor is the base current of the second transistor. The IC is as shown in figure 6. 1. . Figure 6. 1: ULN2003 Relay driver 6. 2 Features: The features of ULN2003 relay driver are: Output current (single output) 500mA MAX High sustaining voltage output 50v MIN Output clamp diodes Input compatible with various types of logic 6. 3 Pin Diagram & Description: Fig 6. 2: Pin diagram of ULN 2003 The IC is of 16-pin and is a monolithic linear IC. It has 7darlington pairs internally of 7 inputs and 7 outputs i. e. 1 to 7 are inputs of Darlington pairs and 10 to 16 are the outputs, 8-pin is ground and 9-pin is common freewheeling diode. Applications: The ULN 2003 driver is used in Relays Hammer Lamps Display (LED) drivers 6. 4 Relays: 6. 4. 1 Introduction: The relay is a device that acts upon the same fundamental principle as the solenoid. The difference between a relay and a solenoid is that a relay does not have a movable core (plunger) while the solenoid does. Where multiple relays are used, several circuits may be controlled once. Relays are electrically operated control switches, and are classified according to their use as POWER RELAYS or CONTROL RELAYS. Power relays are called CONTACTORS, control relays are usually known simply as relays. The function of a contactor is to use a relatively small amount of electrical power to control the switching of a large amount of power. Control relays are frequently used in the control of low power circuits. . 4. 2 Electromagnetic Relay: Relays in which the relative movements of their mechanical components produce preset responses under the effect of the current in the input circuit are called electromagnetic relays. The relay used in this project is electromagnetic relay which is shown in figure 6. 4. 2. Figure 6. 3: Electromagnetic Relay 6. 4. 3 Operation: OperationAndWhen a certain voltage or current is applied to both ends of the coil of an electromagnetic relay, the magnetic flux passes through the magnetic circuit composed of iron core, yoke iron, armature iron and the magnetic circuit operation air gap. Under the influence of magnetic field, armature iron is attracted to iron core pole face thus propelling normally closed contact to open and normally open contact to close, when the applied voltage or current at both ends of the coil is lower than a certain value and mechanical reactance is greater than electromagnetic attraction, armature iron is restored to the original state and normally open contact opens and normally closed contact closes. 6. 4. 4 Components of Electromagnetic Relay: Electromagnetic relay is composed of magnetic circuit system, contact system and return mechanism. Magnetic circuit system is made up of such parts as iron core, yoke iron, armature iron and coil. Contact system is composed of such parts as static contact spring, movable contact spring and contact seat. Return mechanism is made up of return springs of draw springs. Figure 6. 4: Components of Electromagnetic Relay 6. 5 Devices: The devices include microwave oven, electric bulbs, fans, motors, coolers, etc. Any of the devices can be operated from anywhere by interfacing them to the microcontroller. CHAPTER 7 COMPONENTS INTERFACING WITH MICROCONTROLLER 7. MT8888C Interfacing With Microcontroller: The MT8888 DTMF transceiver is interfaced to the microcontroller port P2. The data pins of transceiver are interfaced with P2. 0-P2. 3 and the control pins are connected to P2. 4-P2. 7 as shown in figure 7. 1. PHILIPS 89C51MT8888 Figure 7. 1: Interfacing MT8888 with the microcontroller 7. 2 LCD Interfacing with the Microcontroller: Depending on how many lines are used for connection to the m icrocontroller, there are 8bit and 4bit LCD modes. The appropriate mode is determined at the beginning of the process in a phase called â€Å"initialization†. In the first case, the data are transferred through outputs D0-D7 as it has been already explained. In case of 4-bit LED mode, for the sake of saving valuable I/O pins of the microcontroller, there are only 4 higher bits (D4-D7) used for communication, while other may be left unconnected. Consequently, each data is sent to LCD in two steps: four higher bits are sent first (that normally would be sent through lines D4-D7), four lower bits are sent afterwards. With the help of initialization, LCD will correctly connect and interpret each data received. Besides, with regards to the fact that data are rarely read from LCD (data mainly are transferred from microcontroller to LCD) one more I/O pin may be saved by simple connecting R/W pin to the Ground. Such saving has its price. Even though message displaying will be normally performed, it will not be possible to read from busy flag since it is not possible to read from display. Here we used 8 bit LCD. The LCD is interfaced with microcontroller port P0. The data pins of LCD are interfaced with the Port 0 pins P0. 0-P0. 7 and the control pins of LCD are interfaced with Port 1 pins P1. -P1. 7 as shown in figure 7. 2. PHILIPS 89C51 LCD Figure 7. 2: Interfacing LCD to the Microcontroller Algorithm to send data to LCD: 1. Make R/W low 2. Make RS=0; if data byte is command RS=1; if data byte is data (ASCII value) 3. Place data byte on data register 4. Pulse E (HIGH to LOW) 5. Repeat the steps to send another data byte 7. 3 Interfacing devices with the microcontroller: The devices that are t o be controlled are interfaced with port 1 of microcontroller. Here we used four devices and they are interfaced to P1. 0-P1. 3 as shown in figure 7. 3. Figure 7. 3: Interfacing devices with the microcontroller CHAPTER 8 SOFTWARE DETAILS 8. 1 Keil  µVision 4: Keil was founded in 1986 to market the add-on products for development tools provided by many of the silicon vendors. Keil implemented the first C compiler designed from the ground up specifically for 8051 microcontroller. Keil provides broad range of development tools like ANSI C Compiler, macro assembler, debuggers and simulators, linkers, IDE library managers, real time operating system & evaluation boards for 8051 & ARM families. It is used to write programs for an application. The programs can be written in embedded C or in assembly language. 8. 1. 1 Evaluation of Keil Software: Start the  µVision Program Select new  µVision Project from the project menu Give the project name: prjname and save it with extension*. uvproj as shown in fig 8. 1. 1a After saving another window will be displayed to select the target device. In that select LPC 2478 from NXP (founded by Philips) from the data base given Select it and click OK a new project with target file will be created. Select the new†¦ from the file menu Type your c file Select save†¦ from file menu. The first time you save the program a dialog box will pop-up and allow you to name your file and file type. Save program with file name: xxxx. c The file type mentioned at last (. c) means embedded c language. Right click on source group and click add files to source group. This will add files to project as shown in figure 8. 1. 1(b) Right click on source group and select build all target files. This will create HEX file needed for ARM. Figure 8. 1: Starting a New Project in KEIL Figure 8. 1 indicates how to start a new project in KEIL software to develop a program. Select the name of the project ant save it as . v2, then a new project is created as shown in figure. Figure 8. 2: Adding Files to the Source Group Figure 8. 2 shows how we should add files to the source group after we created a new project using KEIL micro vision. Figure 8. 3: Program written in the File added to the Source Group Figure 8. 3 shows the picture after the program file is being added to the source group so t hat an ASM file is created for the source file where code is written. 8. 1. 2 Using the Keil dscope Debugger: Select start /stop debug session from debug menu The debug program will start a new session as shown in figure 8. 1. 1(d) Select File, load object file from the program menu. Change the file type to HEX Select your hex file, e. g. xxxx. Hex Click OK You should now see the source code of the file typed in earlier Select Peripherals, GPIO Fast Interface, Ports required from the program menu. So that you can see the how output varies on ports. Select Port 0, Port 1, Port 2, Port 3 and port 4. Select Peripherals, UART, UARTs required from the program menu. So that you can see the how output varies on UARTs. Select UART0, UART1, UART2 and UART3. Click on go to see the real time update of the I/O ports. Click on stop when you are finished. You can also single step through you program or set break points at locations that you want the debugger to stop at. To set a breakpoint, double click on the line. Figure 8. 4: Debugging the code using Start/Stop Debug Session Figure 8. 4 shows that after the ASM file is created, it should be debugged using Start/Stop Debug Session. The program debuuging starts when we press the start and it can be ended using stop. Figure 8. 5: After Debugging, the value of the registers 8. 2 Flash Magic Software: The flash magic software is one of the best known microcontroller programs dumping software. It has the compatibility with the KEIL software. The HEX file generated by the KEIL is used by the FLASH MAGIC to program the microcontroller. The software uses the computer serial port to transmit data into microcontroller. It has many options like appending the code, erasing the memory, reading from the microcontroller etc to dump the code program first the FLASH MAGIC has to be provided with necessary information about the target, the band rate supported, the clock frequency,etc. ,then the software checks for the device connected to the computer serial port. If the target is not connected, an error is generated. The software then checks for the available memory and the size of file to be dumped. Then it checks whether the target (microcontroller) is in ISP (In –system programming) mode or not. If everything is fine then, it starts writing into the microcontroller using the serial data transfer pins Txd and Rxd pins on the microcontroller. After the code is loaded into the microcontroller, even the power goes off , the code will not be lost as it is stored in the EEPROM which is not volatile. Giving the RESET will restart the program execution from the beginning. We have seen that using a high level language improves the readability of the program, makes the programming process more efficient, and makes it possible to write portable code. The compiler generates the assembly code and therefore places a large role in determining the actual CPU operation. Because compilers are not as smart as programmers are, the machine code generated by compiler if typically larger and less efficient than the machine code generated from assembly source code. This may be disconcerting to some programmers, but it is not a good enough reason to avoid high level languages. Instead, it means that you must know yourcompiler and know how the different parts of your C code will be implemented. Figure 8. 2: Flash Magic for dumping the code into the microcontroller Flow Chart: NO YES YESYES NO YES YES NO YESYES NO YESYES NO 8. 4 Source Code: /***DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE***/ /*****************************BATCH – A2***********************************/ /********DTMF INITIALISATION********/ Dtmf_data equ p2 Dtmf_wr equ p2. 7 Dtmf_cs equ p2. 6 Dtmf_rs0 equ p2. 4 Dtmf_rd equ p2. 5 /********LCD INITIALISATION*********/ Lcddata equ p0 Lcd_rs equ p1. 5 Lcd_rw equ p1. 6 Lcd_en equ p1. 7 /*******DEVICES INITIALISATION********/ dev1 equ p1. 0 dev2 equ p1. 1 dev3 equ p1. 2 dev4 equ p1. 3 psswrd bit 21 org 00h mov p1,#0f0h mov r0,#50h call Dtmf_init call Lcd_init /*call DispLine1 mov dptr,#Proj_name call Disp_string call delay call DispLine2 mov dptr,#Proj_name1 call Disp_string call delay call DispLine3 mov dptr,#Proj_name2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#College_name call Disp_string call delay call Clr_Display call DispLine2 mov dptr,#College_location call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#TEAM call Disp_string call DispLine2 ov dptr,#NAME1 call Disp_string call DispLine3 mov dptr,#NAME2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#NAME3 call Disp_string call DispLine2 mov dptr,#NAME4 call Disp_string call DispLine3 mov dptr,#NAME5 call Disp_string call DispLine4 mov dptr,#NAME6 call Disp_string call delay call Clr_Display */ main: call Clr_Display mov dptr, #myname call Disp_string clr psswrd Rx_tone: mov a,#8fh call Lcd_cmnd mov r0,#50h mov r7,#00h store_tone: call delay50ms clr a call read_sta_reg jnb acc. 2,store_tone call read_rx_data_reg anl a,#0fh jb psswrd,compare mov @r0,a mov a,#†*† call Lcd_data_out inc r0 inc r7 jne r7,#04,store_tone mov r0,#50h mov a,@r0 cjne a,#1,invalid_Tone inc r0 mov a,@r0 cjne a,#2,invalid_Tone inc r0 mov a,@r0 cjne a,#3,invalid_Tone inc r0 mov a,@r0 cjne a,#4,invalid_Tone call Clr_Display mov dptr,#yesOk call Disp_string setb psswrd jmp store_tone invalid_Tone: call Clr_Display mov dptr,#NotOk call Disp_string clr psswrd call delay50ms call delay50ms jmp main /***********************************************/ compare: cjne a,#01,label1 setb dev1 call Clr_Display call DispLine1 mov dptr,#labela call Disp_string setb psswrd jmp store_tone label1:cjne a,#02,label2 setb dev2 call Clr_Display call DispLine2 mov dptr,#labelb all Disp_string setb psswrd jmp store_tone label2:cjne a,#03,label3 setb dev3 call Clr_Display call DispLine3 mov dptr,#labelc call Disp_string setb psswrd jmp store_tone label3:cjne a,#04,label4 setb dev4 call Clr_Display call DispLine4 mov dptr,#labeld call Disp_string setb psswrd jmp store_tone label4:cjne a,#05,label5 clr dev1 call Clr_Display call DispLine1 mov dptr,#labele call Disp_string setb psswrd jmp store_tone label5:cjne a,#06,label6 clr dev2 call Clr_Display call DispLine2 mov dptr,#labelf call Disp_string setb psswrd jmp store_tone label6:cjne a,#07,label7 clr dev3 call Clr_Display call DispLine3 mov dptr,#labelg all Disp_string setb psswrd jmp store_tone label7:cjne a,#08,label8 clr dev4 call Clr_Display call DispLine4 mov dptr,#labelh call Disp_string setb psswrd label8: jmp store_tone /*————-Dtmf_init———————-*/ Dtmf_init: call read_sta_reg mov a,#00h call write_cnt_reg mov a,#00h call write_cnt_reg mov a,#08h call write_cnt_reg mov a,#00h call write_cnt_reg ca ll read_sta_reg ret read_sta_reg: mov Dtmf_data,#0ffh setb Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret write_cnt_reg: mov Dtmf_data,a setb Dtmf_rd clr Dtmf_wr setb Dtmf_rs0 clr Dtmf_cs nop nop etb Dtmf_cs setb Dtmf_wr ret read_rx_data_reg: mov Dtmf_data,#0ffh clr Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret /***********Lcd Display*******************/ Lcd_init: mov a,#30h call Lcd_cmnd mov a,#38h call Lcd_cmnd mov a,#06h call Lcd_cmnd mov a,#0ch call Lcd_cmnd mov a,#01h call Lcd_cmnd ret Lcd_cmnd: call delay_50ms mov Lcddata,a clr Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Lcd_data_out: call delay_50ms mov Lcddata,a setb Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Disp_string: clr a movc a,@a+dptr jz exit call delay_50ms call Lcd_data_out nc dptr jmp Disp_string exit:ret /*****************************************************/ /***************************** ************************/ ;routine for clearing display Clr_Display: mov a,#01h call lcd_cmnd ret /****************************************************/ /****************************************************/ ;this routine is for display in different lines DispLine1: mov a,#80h call LCD_Cmnd ret DispLine2: mov a,#0C0h call LCD_Cmnd ret DispLine3: mov a,#94h call LCD_Cmnd ret DispLine4: mov a,#0D4h call LCD_Cmnd ret /*****************************************************/ delay: call Delay50ms call Delay50ms all Delay50ms call Delay50ms call Delay50ms ret delay50ms: mov r2,#5 back2:mov r1,#200 back1:mov r5,#250 back:djnz r5,back djnz r1,back1 djnz r2,back2 ret delay_50ms: mov r4,#20 back4:mov r3,#250 back3:djnz r3,back3 djnz r4,back4 ret /*————————————-*/ ;Display String data Proj_name: DB â€Å"DTMF REMOTE APPLIANCE â€Å",0 Proj_name1: DBâ€Å"CONTROL SYSTEM†, 0 Proj_name2:DB†USING MOBI LE PHONE†, 0 College_name:DB â€Å"MIC COLLEGE OF TECHNOLOGY â€Å", 0 College_location: DB † KANCHIKACHERLA â€Å", 0 TEAM:DB † DEVELOPED â€Å", 0 NAME1: DB † BY â€Å", 0 NAME2: DB † A2 BATCH â€Å", 0 NAME3: DB † LAVANYA â€Å", 0 NAME4: DB † SIRISHA â€Å", 0 NAME5: DB † PAVAN KUMAR â€Å", 0 NAME6: DB † KISHORE â€Å", 0 myname: DB â€Å"ENTER PASSWORD:†,0h yesOk: DB â€Å"VALID PASSWORD†,0h NotOk: DB â€Å"INVALID PASSWORD†, 0h labela:db † DEVICE1 ON â€Å",0 labelb:db † DEVICE2 ON â€Å",0 labelc:db † DEVICE3 ON â€Å",0 labeld:db † DEVICE4 ON â€Å",0 labele:db † DEVICE1 OFF â€Å",0 labelf:db † DEVICE2 OFF â€Å",0 labelg:db † DEVICE3 OFF â€Å",0 labelh:db † DEVICE4 OFF â€Å",0 end CHAPTER 9 ADVANTAGES & APPLICATIONS 9. 1 Advantages: Increased productivity Low cost Reduces power consumption Virtual control of appliances High security 9. Disadvantages: No acknowledgement Switch-device pair should be known Network failure 9. 3 Applications: Other applications of this circuit include Agriculture Industry Colleges Schools Future Enhancement: Acknowledgement of the deviceâ⠂¬â„¢s initial condition through SMS. This system can be expanded to provide control over the GPRS. CONCLUSION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† overcomes the limitations of Wireless Domestic Automation which uses a transmitter and receiver to control the home appliances. It resembles a virtual human controlling the remote appliances using a control unit and a mobile phone. It mainly uses DTMF transceiver for decoding the tones generated by the mobile phone, which is given to the micro-controller to control the appliances. The remote appliances control system using mobile phone will one day become a reality and it may revolutionize our way of living. The wide areas of application include controlling the appliances like microwave oven, lighting fans, lights, etc. Another major application is industrial automation as it reduces the power consumption and is of low cost. As this system is implemented using in 2G communication network, the video data cannot be obtained. Future work includes research on the robot control system in 3G communication networks which facilitates controlling the remote robot using DTMF of mobile phone, with video data from the remote mobile robot’s camera. The Future enhancement also includes control of GPRS system using this system. REFERENCES Text Books: The 8051 Micro Controller architecture and embedded systems by Mazidi and Mazidi. Other References: www. atmel. com www. alldatasheets. com www. electronicshub. com www. philips. com International Journal of Electrical & Computer Sciences IJECS Vol: 9 No: 10