Wednesday, October 30, 2019

Emergence of HIV and Drug Policy Ireland and Europe Essay

Emergence of HIV and Drug Policy Ireland and Europe - Essay Example In the year 2009, the number of new HIV positive cases was 395. Along with that, the total number of persons who have tested positive for HIV, in Ireland, stood at 5,637. It is also being estimated that, in that very year (2009), the total amount spent in the region (Ireland) spent towards HIV and several other communicable ailments was a staggering â‚ ¬114 million. This is way higher than the funds that have been allotted towards the same purpose, in countries such as Japan and Italy. (1) In the year 2009, there were two deaths that are directly attributable to HIV, and along with this, the total number of people who have died as result of AIDS, in Ireland, increased to 414. (1) At this juncture, a vital fact warrants special mention. Prior to the year 1985, HIV was not considered as that serious an ailment, by the Irish people. But in that year something happened, bringing about a drastic transformation in the manner in which the populace of Ireland viewed HIV. It was in the Oct ober of 1985 that the immensely popular actor, Rock Hudson, succumbed to HIV. That in fact was the first instance of Ireland where, the life of a celebrity was cut short by this deadly condition. It was only since then that the country’s people started to comprehend the seriousness of AIDS. For about the past two decades, the rise in incidence of HIV has tremendously influenced the drug policy of Ireland, as is the case with many other zones of the globe. The drug policy is based on the key objective of successfully combating the menace of wrong use of drugs. This in fact is amongst the primary causes of HIV in the country. The drug policy is being designed so as to be conducive for bringing out strategies that encourage community participation. Also, the policy strives to educate the citizens about the manner in which the risks of contracting HIV can be significantly minimized. (2) The aforesaid strategies are also aimed at enabling coordination amongst various health agenci es that are toiling in the realm. The drug policy was successful in identifying some zones of Ireland where, the residents are with limited economic strength. It was seen that, in these locations, the menace of drug abuse is rampant, and this invariably has a higher risk of HIV, as its inevitable consequence. The drug policy aims to form specialized task forces for implementing the strategies, in these zones. As a matter of fact, some sections of the Irish Society strongly opine that, a drug policy would be displaying comprehensive success, only if it is developed in such a way that it can easily be linked with other policies of the government, in the avenue of housing, employment and education, to cite a few. (2) It was felt that if the drug policy, instead of getting linked with all the above-mentioned policies, concentrates solely on altering the behavioral patterns of specified persons, key issues such as poverty and unemployment, etc, cannot be successfully addressed. In fact, it was also noted that the policy is now adopting a holistic approach for addressing the all-important issues. (2) Role of National Aids Strategy Committee Various NGOs that were also inclusive of drug agencies first started to work in the avenue of HIV, when people utilizing their services became HIV positive. These NGOs have meets at specified

Monday, October 28, 2019

Long Essay Essay Example for Free

Long Essay Essay Support, Modify, or Refute: The Monroe Doctrine ushered in a new era of US foreign policy The Monroe Doctrine was established in the early 19th century written by, of course, James Monroe. This document ushered in a new era of US foreign policy by stepping their foot down and showing the rest of the world how powerful they could be. This was when the US was slowly figuring out the power they could hold. This document stated that the US will not permit the following: Interfering with affairs in the Western Hemisphere, attempts to create new colonies in the Western Hemisphere, and the overthrowing of new colonies. These were said to be, â€Å"Dangerous to our peace and safety.† These statements clearly support how the US wanted to flex their muscles and flaunt independence. Foreign policy before the Monroe Doctrine was put into place is almost a polar opposite of foreign policy after the doctrine was put into place. Before the Monroe Doctrine, the US showed multiple examples of neutrality. For instance, on April 22nd, 1793, George Washington issued a proclamation of neutrality, which in turn declared the nation neutral in the conflict between France and Great Britain. After the Monroe Doctrine was put into place, Macon’s Bill No. 2 (passed by Madison) went into effect, which was an opposite extreme of Washington’s proclamation of neutrality. With Macon’s Bill, the US is now agreeing to trade with everyone (even France), except for Great Britain (The bill was originally passed to motivate both France and Britain to stop seizing American Vessels). This obviously causes copious amounts of tension between countries, and is yet again, a sign of strength and power coming from the US. Napoleon saw Macon’s Bill No. 2 as a great chance for him to move along his, â€Å"Continental Plan.† Now that Britain was unable to trade, this meant they were weak as a whole, but mainly their economy was in turmoil. Macon’s Bill No. 2 was the main cause of The War of 1812. This was a war between the US and Great Britain and Ireland (British ally). The war was basically a conflict because neither country could get over their ego’s, which is yet again, another example of how the US showed great strength (and a little stubbornness) in this period of time.

Saturday, October 26, 2019

Five Imporant Events Of The 19 :: essays research papers

Five Important Events of the 1960s Assassinations   Ã‚  Ã‚  Ã‚  Ã‚  During the 1960s the world was hit with four different assassinations of some of the leaders in the world who were out to change the way things were. Although some disagreed to the changes that they were trying to do and even threatened them, they still continued to pursue their idea of change.   Ã‚  Ã‚  Ã‚  Ã‚   Ngo Dinh Diem became the first president of South Vietnam in 1956 he was a catholic who opposed Communism and sought for an independent Vietnam while it was under French power. Although he was viewed as brutal, corrupt, and prejudice against non-Catholics and Buddhists, he did however help make Vietnam an independent country from France and help prevent Communist rule over all of Vietnam. In 1933 Ngo Dinh Diem was appointed Minister of the Interior by Emperor Bao Dai, at the same time during the 1930’s Ngo Dinh Diem began to disapprove of the French rule over Vietnam. He decided to leave the government and follow the many Vietnamese nationalists who were also against French rule. In 1950 he left Vietnam and headed for the U.S. after Vietnam had fallen under rule of Viet Minh in August of 1945, seeing Communism as a threat to his values as a Catholic and to an independent Vietnam. President Dwight D. Eisenhower’s administration fearing Communist take overs in Southeast Asia saw Ngo Dinh Diem as a Vietnamese nationalist capable of overturning Communist Viet Minh. In 1954 Viet Minh defeated the French and he won control of Northern Vietnam, thus splitting the country in half. Southern Vietnam remained under the control of Emperor Bao Dai, who was supported by the U.S. greatly. The U.S. appointed Ngo Dinh Diem as Prime Minister under Bao Dai. In 1956 elections were held in South Vietnam and Ngo Dinh Diem was elected the first president of the newly established Republic of Vietnam (South Vietnam). The U.S. military was sent into South Vietnam to form and train an army for the republic, thus becoming the Army of the Republic of Vietnam (ARVN). While Ngo Dinh Diem was president he forcibly moved peasants and rural villagers from their homes and put them into controlled settlements in order to suppress Communist activities. He also drafted all males from the villages into the ARVN. As a result of his acts a group called the National Li beration Front (NLF) was formed in order to overthrow his power as president.

Thursday, October 24, 2019

Faulkner Changed My Life :: Personal Narrative Essay Example

Thanks to Faulkner, to the very thought of him, between thirteen and fourteen I began to feel unassailable I spite of everything. I wasn't, of course, but I felt that way, enough to get on with my writing and to mop up like high-calorie gravy such praise from teachers as came my way. Â   If you fix one eye on Faulkner and the other on Melville, and you remember some of what Keats said about negative capability, you can just about manage to commit the delectable autonomy known as writing for its own sake - for the glory, the rebirth, the illusion of doing what nobody has ever done before. There's nothing more unassailable than that, even as things fall apart around you and you see the fruit-flies ascending to power without composing so much as a paragraph. Vary the image a bit, amassing the bestiary of the foul, and you can add Zola's toad of disgust, which he said you have the swallow every morning before getting on with the work. Swallow it, note the hegemony of the fruitflies, and indeed the demise of yet another nobel unicorn gone to roost in Paris or now plying trade on Wall Street, and you then become clear enough to write for the next few hours as if the world were waiting for your sun to rise and would do nothing serious without you. That's the feeling, the pu mped-up, inspired elation that lofts you---me-from essay to essay. Â   My admission includes the fact that, apart from admiring his expertise at caricatural opera, I never took much interest in Yoknapatawpha, the fantastic name apart only slightly below Brobdingnag. They might have been pinball salesmen in Ethiopia for all I cared. What bowled me over was WR's noise, that humming and thrumming you heard in the distance even as you opened just about any novel of his except the first two. It was a deliberate obfuscation of meaning yet done with meanings, using meaning to obliterate some other meaning, and the message, if such, was something choral and echoic with in its intimate hinterland just about everything else of his you'd read. He wasn't creative-writing, he was doing solo recitative, singing to himself all the while, wso that while you have Gavin Stevens in focus, one work of gab to eight hundred of deviant penumbral gesture, some of the

Wednesday, October 23, 2019

Mission, Vision and Values

Microsoft is an American multinational computer technology company which contributes greatly to the American economy through the revenue contribution. Microsoft is among the largest employer in US. The company is involved in development, manufacture, licensing of wide range of software products. Microsoft dominated the home-computer operating system market in the mid-1980s with Ms-Dos which was user unfriendly. In the recent past, Microsoft has dominated the operating system market with modern variety of software which is user friendly and this has contributed greatly to its growth. Microsoft best selling products include Microsoft Windows operating system and Microsoft Office group of productivity software (Peng and Heide, 1993). Microsoft is presently involved in sale of various products besides operating system and Microsoft Office suites. These products include entertainment in form of computer games, computer hardware products such as Microsoft mouse. Microsoft has been known for customer support through Usenet newsgroup and World Wide Web. Microsoft websites receives the highest number of customers as compared to other websites. This can be attributed to the friendly services offered by the company which is customer oriented. The products available from Microsoft Company can be used for either business of home use (Baillargeon, 1999; Peng and Heide, 1993). Microsoft company strategic plan is to dominate the computer software and hardware market by 2030 through production of efficient user friendly software. The Microsoft which faces a lot of criticism by many companies who claim that the company’s marketing tactics are forcing employees to be overworked while is using the software. Innovations made by the company hinder entry into the industry. Microsoft plan to monopolize the software industry through patent laws and manufacturing software that obey the command of the manufacturer rather than the user. Microsoft (MS) through software industry aim to dominate the international software market. The company aim to make a good name (Drejer, 2002; Weiss and Piderit, 1999). Microsoft company products attract customers internationally. Customers of Microsoft products are of all ages and due to the latest modification, the products can be used in business, home or both. Application software designed by the Microsoft are used for specific purposes and follow certain specifications depending on the type of organization. Microsoft manufactures it own computer games which are mainly used for home entertainment and their sale have greatly contributed to the rise in revenue accrued from sale (Peng and Heide, 1993). Microsoft vision is to have a positive impact on the world and its people. The company is committed in mobilizing resources all over the world to create opportunities where business can thrive and improve welfare through technological innovations provided by the company. Microsoft develops software and other Microsoft products that will stimulate development of computer literate society. Microsoft is committed to production computer professional who will stimulate development in the business industry. Microsoft vision is achieved through manufacture of updated versions of software that are easy to use and hence promote efficiency in any business that utilize products. Microsoft mission is to assist people each their potential. The company pursues its mission through donation of software, hardware funding and training to programs all over the world. Most individuals in various companies have ambition of becoming excellent in their career and this can only be achieved through acquiring complete and updated information in the specific area of specialization. The individual interests in line with career development are enhanced by the Microsoft Company availability of information concerning the use of hardware and software that are manufactured by the company. The company manufactures software which incase of problem in operation one can contact the manufacturer (Mathews, Dennis and Economy, 2003; Drejer, 2002). Microsoft company values are customer oriented and recognize the products customer as an employee. The values which are highly observed include; integrity, passion for technology, accountability, self-criticism and eagerness act on big challenges that are offered by the business environment. The company embraces change that is inevitable in every society through new technological innovations. Microsoft Company desires to dominate the software market through provision of products that will have positive impact on people and the world in general. The company dominion will encourage uniformity in various organizations through use of Microsoft products and this will promote achievement of the desired potential by individuals and companies. Strategic management should address the public criticism concerning the company products to be able to achieve the objectives of the strategic plan. Dominion in the market can only be achieved if the criticisms are addressed. Strategic plan depends on the leadership of the company. The culture of the company has been worldly known for customer support through Usenet and World Wide Web which enhance efficiency in other companies. Success of the strategic plan will have positive impact on most stakeholders especially the beneficiaries who accrue higher dividends from increased profits. However, competitors will incur decreased sales success of the plan will improve efficiency of the leadership in the company (Drejer, 2002; Weiss and Piderit, 1999). References Baillargeon, Emily (1999) â€Å"Seattle Now: a Letter.† New England Review. 20. 2, 111-148. Drejer, Anders (2002) Strategic Management and Core Competencies: Theory and Application. Westport, CT: Quorum Books. Matthews, J., Dennis, Jeff and Economy, Peter (2003). Survival Skills for Starting and Growing a Company. New York: Oxford University Press. Peng, Chan, S. and Heide, Dorothy (1993) â€Å"Strategic Alliances in Technology: Key Competitive Weapon.† SAM Advanced Management Journal. 58, 11-56. Weiss, J. A .and Piderit, S. K. (1999) â€Å"The value of mission statement in public agencies.† Journal of Public Administration Research and Theory, 9, 121-145.      

Tuesday, October 22, 2019

Free Essays on Pierre De Fermat

Pierre Fermat's father was a wealthy leather merchant and second consul of Beaumont- de- Lomagne. Pierre had a brother and two sisters and was almost certainly brought up in the town of his birth. Although there is little evidence concerning his school education it must have been at the local Franciscan monastery. He attended the University of Toulouse before moving to Bordeaux in the second half of the 1620s. In Bordeaux he began his first serious mathematical researches and in 1629 he gave a copy of his restoration of Apollonius's Plane loci to one of the mathematicians there. Certainly in Bordeaux he was in contact with Beaugrand and during this time he produced important work on maxima and minima, which he gave to Etienne d'Espagnet who clearly shared mathematical interests with Fermat. From Bordeaux Fermat went to Orlà ©ans where he studied law at the University. He received a degree in civil law and he purchased the offices of councillor at the parliament in Toulouse. So by 1631 Fermat was a lawyer and government official in Toulouse and because of the office he now held he became entitled to change his name from Pierre Fermat to Pierre de Fermat. For the remainder of his life he lived in Toulouse but as well as working there he also worked in his hometown of Beaumont-de-Lomagne and a nearby town of Castres. From his appointment on 14 May 1631 Fermat worked in the lower chamber of the parliament but on 16 January 1638 he was appointed to a higher chamber, then in 1652 he was promoted to the highest level at the criminal court. Still further promotions seem to indicate a fairly meteoric rise through the profession but promotion was done mostly on seniority and the plague struck the region in the early 1650s meaning that many of the older men died. Fermat himself was struck down by the plague and in 1653 his death was wrongly reported, then corrected:- I informed you earlier of the death of Fermat. He is alive, and we no long... Free Essays on Pierre De Fermat Free Essays on Pierre De Fermat Pierre Fermat's father was a wealthy leather merchant and second consul of Beaumont- de- Lomagne. Pierre had a brother and two sisters and was almost certainly brought up in the town of his birth. Although there is little evidence concerning his school education it must have been at the local Franciscan monastery. He attended the University of Toulouse before moving to Bordeaux in the second half of the 1620s. In Bordeaux he began his first serious mathematical researches and in 1629 he gave a copy of his restoration of Apollonius's Plane loci to one of the mathematicians there. Certainly in Bordeaux he was in contact with Beaugrand and during this time he produced important work on maxima and minima, which he gave to Etienne d'Espagnet who clearly shared mathematical interests with Fermat. From Bordeaux Fermat went to Orlà ©ans where he studied law at the University. He received a degree in civil law and he purchased the offices of councillor at the parliament in Toulouse. So by 1631 Fermat was a lawyer and government official in Toulouse and because of the office he now held he became entitled to change his name from Pierre Fermat to Pierre de Fermat. For the remainder of his life he lived in Toulouse but as well as working there he also worked in his hometown of Beaumont-de-Lomagne and a nearby town of Castres. From his appointment on 14 May 1631 Fermat worked in the lower chamber of the parliament but on 16 January 1638 he was appointed to a higher chamber, then in 1652 he was promoted to the highest level at the criminal court. Still further promotions seem to indicate a fairly meteoric rise through the profession but promotion was done mostly on seniority and the plague struck the region in the early 1650s meaning that many of the older men died. Fermat himself was struck down by the plague and in 1653 his death was wrongly reported, then corrected:- I informed you earlier of the death of Fermat. He is alive, and we no long...

Monday, October 21, 2019

Licencia de conducir para indocumentados en California

Licencia de conducir para indocumentados en California En cumplimiento de la ley AB60 los inmigrantes indocumentados que tienen su residencia habitual en California pueden sacar la licencia de conducir.   Esta ley ha sido todo un à ©xito. Comenzà ³ a aplicarse con fecha del 2 de enero de 2015 y, en su primer aà ±o, 830,000 migrantes indocumentados obtuvieron su licencia. Es decir, la mitad del total de conductores que obtuvieron su documento eran indocumentados. En este artà ­culo se explica en 7 puntos lo que se debe de tener en cuenta y que facilita entender todos los pasos en la tramitacià ³n de la licencia, particularmente quà © documentacià ³n se puede presentar para probar identidad y residencia. Cà ³mo hacer una cita para los exmenes para sacar la licencia Marcar al 1-800-777 o ingresar en la pgina oficial de DMV de California (en espaà ±ol). Y asà ­ cerrar la cita. Antes de hacer gestiones para sacar la licencia, tener muy presente que si se ha utilizado una licencia bajo un nombre falso, eso es delito de fraude y podrà ­a ocasionar problemas. En estos casos, consultar con un abogado o una organizacià ³n de apoyo a inmigrantes para estudiar el caso. Quà © hay que hacer ANTES de cerrar la cita para los exmenes Si en el momento de solicitar la licencia de conducir  se tienen  tickets (multas)  sin pagar no se podr obtener. Hay que pagar la totalidad de lo que se debe o, si es mucho, cerrar un acuerdo para pagar a plazos. Recordar que las condenas por DIU (manejando mientras intoxicado por alcohol y drogas) es una falta grave, est incluida entre las causas que convierten a un inmigrante en prioridad para deportacià ³n.   Quà © exmenes hay que rendir para sacar la licencia Son necesarios dos exmenes:  uno de manejar y otro de conocimientos sobre leyes de trfico, seà ±ales, etc. Este examen de conocimientos se puede rendir en inglà ©s y tambià ©n en otros idiomas, como el espaà ±ol o el mixteco, el trique y otras lenguas indà ­genas.  En la pgina web de DMV hay ejemplos de exmenes de manejo  que se pueden utilizar para practicar. Tambià ©n se puede acudir a organizaciones sin fin de lucro  que brindan servicios para preparar el test. Quà © documentacià ³n se necesita para que los indocumentados puedan obtener una licencia de manejar en California Entre los documentos que se necesitan para sacar la licencia de conducir habr que mostrar los que prueben  la identidad del inmigrante  y tambià ©n los que  prueben que efectivamente reside  en el estado de California: Para identificarse: Suficiente UN (1)  documento: Tarjeta Federal Electoral vlida de Mà ©xico. Si no se tiene, mirar las siguientes opciones.O mostrar dos (2) documentos de entre los siguientes: Tarjeta de identificacià ³n vlida de Guatemala, Tarjeta de identificacià ³n vlida de Perà º, pasaporte extranjero vlido de cualquier paà ­s, tarjeta ID con foto emitida por el gobierno federal, tarjeta consular de Mà ©xico, Ecuador o Guatemala. En estos casos el DMV comprobar con el gobierno que emitià ³ el documento que es verdadero. Por ejemplo, chequear con los consulados sobre la tarjeta consular y con los gobiernos extranjeros sobre los pasaportes. Si no es posible obtener dos de esos documentos, entonces:O mostrar dos (2) documentos de entre los siguientes: Pasaporte extranjero expirado, pero que tiene una fecha de emisià ³n de 2005 o posterior, o un certificado de nacimiento que ha sido emitido  en los à ºltimos seis meses a la fecha de aplicacià ³n de la licencia por la autoridad del paà ­ s en el que se nacià ³ y que adems tiene una foto del aplicante y que adems est traducida al inglà ©s por el consulado y contiene una certificado con Apostilla. O una tarjeta I.D. emitida por el gobierno federal con una foto actual. Si tampoco es posible obtener estos documentos: O solicitar una entrevista con un investigador del DMV  que puede tener en cuenta documentos diversos como  transcrips  de escuela con fecha de nacimiento de solicitante, aplicacià ³n de asilo,  forma I-20 para estudiantes internacionales, forma DS-2019 para los que han tenido una visa J-1, licencias de matrimonio y/o divorcio, licencias de manejo de otros paà ­ses, planillas de impuestos, etc. Antes de presentar estos papeles verificar las caracterà ­sticas que deben tener en cuanto a idioma, traduccià ³n, fechas, fotos, autoridad que las emite, etc. Documentos para probar la residencia en California Presentar uno (1) de los siguientes documentos: Escritura de hipotecaLease  de vivienda con fecha de inicio del alquiler y firmas del inquilino y del arrendador.Tà ­tulos de propiedades inmobiliarias.Facturas de  utilities  con direccià ³n y nombre.Rà ©cords mà ©dicosRà ©cords de pago de impuestos federales o al estado de CaliforniaRà ©cords de pago de impuestos sobre bienes raà ­ces (property tax bill)Confirmacià ³n de cambio de direccià ³n emitido por el Servicio de Correos (forma CNI. 107)Licencia de matrimonio o documentos sobre parejas civiles (domestic partners) con la direccià ³n de residencia.Rà ©cords de bancosDocumentos emitidos por el gobierno federal Los padres o guardianes de  menores de edad  puede testificar en la  aplicacià ³n el lugar de residencia del menor. Todo lo que hay que saber sobre la mayorà ­a de edad en Estados Unidos. Cul es el costo El  costo  de la licencia es de  $33. Para quà © puede utilizarse esta licencia de manejar La licencia de manejar para indocumentados de California sà ³lo se podr utilizar para conducir y para comprar un seguro para el auto. No puede utilizarse como I.D. para, por ejemplo, abrir una cuenta en un banco. Hay que saber que la licencia para indocumentados luce distinta de la que tienen el resto de californianos. En la parte frontal tiene escrito la frase (FEDERAL LIMITS APPLY) y por eso es fcil identificarla.   A tener en cuenta Estar alerta y evitar fraudes, por ejemplo, comprar para uso errà ³neo una licencia internacional de manejar. Si se viaja a menos de 100 millas de la frontera es posible encontrarse en carretera con un control migratorio interno. Y si se es detenido o arrestado (manejando o de otra manera) estos son 7 derechos que tienen los indocumentados. Por à ºltimo, California es el estado con ms inmigrantes indocumentados en todo Estados Unidos con ms de 2.4 millones de personas en esa situacià ³n migratoria. Reconociendo esa realidad,muchas ciudades han optado por proteger a todos los miembros de su comunidad mediante una polà ­tica de ciudades santuario  y tambià ©n reconociendo beneficios sociales. Disfrutar California Por à ºltimo, para las personas que residen o visitan California, puede ser de interà ©s estas 7  recomendaciones para obtener boletos baratos para Disneyland, en Anaheim, California. Este artà ­culo no es asesorà ­a legal. Sà ³lo tienen carcter informativo.

Sunday, October 20, 2019

Simulate a Dice Roll With C Code

Simulate a Dice Roll With C Code This application uses the srand() function to seed the random number generator. The function Random(n) returns an integer in the range of 1 to n. The int array totals holds the total counts for the scores 3 to 18. It then loops 10 million times. This number is defined as a const but if your compiler doesnt support const, uncomment the #define instead. Each dice, d1, d2 and d3 holds the Random() generated dice roll die roll and the element for the combined dice score (in the range 3-18) is incremented. The last part prints out the totals to see that it generates throws in accordance with the probabilities. A 6 sided dice has an average score of 3.5, so three dice should average about 10.5. The totals for 10 and 11 are roughly the same and occur about 12.5% of the time. Here is the output of a typical run. It takes no more than a second. Rolling Ten Million Dice 3 461304 1386085 2772786 4626077 6953818 9720209 115834710 125367111 124926712 115648013 97200514 69287415 46245216 27757517 13914218 46163 // dicerolls.c :#include time.h /* Needed just for srand seed */#include stdlib.h#include stdio.hconst tenmillion 1000000L;/* #define tenmillion 10000000L */void Randomize() {srand( (unsigned)time( NULL ) ) ;}int Random(int Max) {return ( rand() % Max) 1;}int main(int argc, char* argv[]){int i;int totals[19];printf(Rolling Ten Million Dice\n) ;Randomize() ;for (i3;i18;i)totals[ i ]0;for (i0;i tenmillion;i){int d1Random(6) ;int d2Random(6) ;int d3Random(6) ;int totald1d2d3;totals[ total ];}for (i3;i18;i){printf(%i %i\n\r,i,totals[ i ]) ;}return 0;}

Saturday, October 19, 2019

Enterprise Rent-A-Car A Market-Driven Company Case Study

Enterprise Rent-A-Car A Market-Driven Company - Case Study Example In order to ensure that it meets it aim, the Enterprise relates to other institutions such as insurance toward providing proper services to its customers. The case analysis makes use of customer value funnel in order to realize the way the company relates to its macorenvironmental and microenviromental. The company acts as the biggest company offering the rental cars to the public. The macroenvironmental drivers include Society and subcultures, Demographics and Psychographics, Economic Factors, Natural-Physical Factors, Political-Legal Factors, Technological Factors while the microenviromental drivers include, Collaboration, Competition, Suppliers and Regulators.The company must always put proper strategies towards manipulating the macroenvironmental factors to help in delivering continuous value to the customer.Society and subcultures.The society and the existing subcultures is important when studying how the Enterprise strive towards ensuring continuous value to the customer. The E nterprise have to consider the essential needs of the society, which always affect the taste of the individuals about the product or service they consume. For instance, the company maintain the need for a friendly environment to ensure that it does not interfere with everyday activities of the residents. The company has established a fuel efficient rental car opportunity which is a step towards offsetting the amount of carbon released in the atmosphere. Demographics and Psychographics Study of demographic is significant since it helps in showing how the company is striving to serve its potential customers in a given geographic location. The company also consider the need to reach a wider part of the market in order to provide services for all their potential customers. The case study shows that the enterprise has established branches and is in the process of increasing its size in order command larger part of the market (Weinstein, 2012). This have allowed the company to offer local ized response to its potential customers. Economic Factors This refers to how the company relates to the global economy towards achieving profits. The case analysis shows that the Enterprise has been able to gain control in the North American rental car industry. This is a step towards enlarging the market share of the company which ultimately led to improvement in the profit. Technological Factors This refers to how the company is striving to improve its services to the customers through application of technological advancements. Technological advancement is significant for every contemporary firm especially when there is need to avoid becoming obsolete (Weinstein, 2012). The company looks forward to develop iPhone application

Friday, October 18, 2019

Compare and contrast the marketing strategies of two companies Essay

Compare and contrast the marketing strategies of two companies - Essay Example Both companies like to keep their product at the introductory and growth stages of the product lifecycle by introducing new models of cars to the market. BMW Company does not like having their products at the maturity or declining stage of product life cycle. They like introducing new models of cars to the market so as to keep a competitive edge over other automobile companies in the industry. In contrast, although the Rolls Royce Company keeps their products in the introductory and growth stage of product life cycle, this company also maintains their products in the maturity and decline stage of life. This is because they target a sale market of middle-income earners (Smith, 2013). Both companies use similar market approaches so as to have a competitive advantage over other automobile companies in the market. They both produce products that serve the global needs of customers. The two companies’ produces new models of cars to suit the customers demand and recognizes the need of quality and luxury as both of their products is built on this attributes. The two companies, therefore, produces attractive and trend products that suit the needs of their customers. Both companies differentiate their market into demographic segmentation. This market is segmented into income, age, and gender. Therefore, the two companies produce products that favor these segments of the market. BMW produce products that target high-income earners basing on the economic segment. Their target customers are those with an income of $75,000 unlike the Rolls Royce, who targets customers with an income of more than $30, 000. These makes BMW brands most common among the rich while the Rolls Royce more common among the middle-income earners ( Simms & Trott, 2007). Both companies have a good number of market dealership and imports from no dealership-networked countries. They both have various manufacturing plants in Germany and UK with the companies operating in more than 100

The Bluest Eye by Toni Morisson Essay Example | Topics and Well Written Essays - 500 words - 1

The Bluest Eye by Toni Morisson - Essay Example It depicts the sort of stereotypical communities we live in and the unconventional family settings that shape the fabrics of the modern society. Pecola, hailing from Ohio, sets to see the world through a different pair of eyes. Consequently, she plunges herself into the flaws of misguided perceptions that leads her down the road of failure. The new blue eyes that she dreams of helping us to see the norms and tradition of beauty without distraction in the lines of racial segregation. Morrison keeps the reader enchanted to the realization of the facts that form the core of our society for so many years. He uses the theme of beauty to focus on the consequences of the decision made by Pecola. Amazingly, it is the way that the society appreciates human dignity by in accordance with the allocation of favorable materials or acquisition. Supposedly, those deemed beautiful get better chances in life, and that is the primary driving force for Pecola (Mbalia 28). She believes that beauty lies in the possession of blonde hair and blue eyes. Toni Morrison captures the stigma that we embrace and questions its credibility as the only way of acceptance of some level of beauty in the society. Throughout the history, the society deems everyone as equal but that ideal case ceases to exist when in a real life situation. Its scripts shine boldly in the books of literature, state and federal laws. On the contrary, the practices of the society are entirely different from the writings in the books.  Pecola represents a section of the community that thrives to find a sense of belonging in a narrow-minded society. Conversely, Claudia was the antagonist in accordance with the story of her life (Mbalia 30). She grew to be fond of herself and proud of whom and what life made her. Clearly, she embraces her life and heritage that shows how powerful beauty besets upon someone that embraces it. Claudia

Thursday, October 17, 2019

Fauquier Gas Company Logistics Assignment Example | Topics and Well Written Essays - 750 words

Fauquier Gas Company Logistics - Assignment Example A change from agricultural life to commercial and residential life within a society increases the demand for gas thus the business needs to react urgently to serve the customers’ needs. It is a fact that different departments within Fauquier gas company operate independently as opposed to one unit. It thus makes communication within the organization difficult. Another fact within the organization is that the organization’s heads of departments respond slowly to the news. That aspect is evidenced by the fact that even after Mr. Murphy heard about the new pipe construction project and made efforts to contact all the heads of the department’s partaking the project in January. By April 14 he is yet to receive a purchase request and pipe specification (Hood, 2013).The main problem within the organization is communication. Whereas communication is enhanced after inquiries about certain events are made, timely information is essential for an organization’s develo pment. As logistics entails efficient flow of information within an organization’s department, it is thus important if communication within the organization is effective and timely (Drucker and Marciariello, 2009). In order to cater for the rising customer demand, Fauquier Gas Company requires undertaking a mega investment decision. To ensure sufficient gas supply to customers, three and a half miles of new gas needs installation by September (Hood, 2013). Though the capital investment seems to be taking progress, all the departments involved in achieving that objective are not equally engaged. It seems awkward to realize that Mr. Murphy, being the head of supply management is unaware of the undergoing project within the organization. Investing in a three, and a half mile gas line requires a lot of resources and to make such decisions regarding authorization of material purchases, sufficient  information is necessary.  

Ethnic minorities in USA and UK jail Essay Example | Topics and Well Written Essays - 3750 words

Ethnic minorities in USA and UK jail - Essay Example In the contemporary era, it has been evident that there are about two adults in Jail for every Afro-Caribbean male. This ratio is clearly observable in the prisons of United States of America. Several scholarly reports signify that the prisons of United Kingdom have higher ratio of black prisoners as compared to the white population. Around 27 percent of the prison population in Wales and England identify themselves as belonging from ethic minority groups. The black convicts of UK and USA are five times higher than that of the white convicts. The police and the judicial system of USA and UK constitute maximum officials from the major group of the society i.e. the white population. Therefore, the jurisdiction system of UK and USA are criticized by many civil societies across the world. There are mainly three broad explanations that have been brought forward in the favour of the possibility for higher number of minority prisoners in UK and USA. First of all, disproportionate criminality can be a reason. The persons belonging from different ethnicities and minority groups have higher tendency to commit crimes. Secondly, the jurisdiction, detection of crimes and prosecution are more likely to be charged against the minority groups under the light of limited evidences. Thirdly, disproportionate conviction can be a major reason behind sentencing minority group prisoners for longer imprisonment. It is important to note that the relationship between criminality and race is perplexing. Several debates and critics have surrounded the jurisdiction system of UK and USA with respect to fair treatment with the respective populations. This essay highlights the important factors that have over-represented ethnic minorities in USA and UK prisons. The proportion of black people in prison in United States is lower compared to England and Wales. Politicians and experts have stated that

Wednesday, October 16, 2019

Fauquier Gas Company Logistics Assignment Example | Topics and Well Written Essays - 750 words

Fauquier Gas Company Logistics - Assignment Example A change from agricultural life to commercial and residential life within a society increases the demand for gas thus the business needs to react urgently to serve the customers’ needs. It is a fact that different departments within Fauquier gas company operate independently as opposed to one unit. It thus makes communication within the organization difficult. Another fact within the organization is that the organization’s heads of departments respond slowly to the news. That aspect is evidenced by the fact that even after Mr. Murphy heard about the new pipe construction project and made efforts to contact all the heads of the department’s partaking the project in January. By April 14 he is yet to receive a purchase request and pipe specification (Hood, 2013).The main problem within the organization is communication. Whereas communication is enhanced after inquiries about certain events are made, timely information is essential for an organization’s develo pment. As logistics entails efficient flow of information within an organization’s department, it is thus important if communication within the organization is effective and timely (Drucker and Marciariello, 2009). In order to cater for the rising customer demand, Fauquier Gas Company requires undertaking a mega investment decision. To ensure sufficient gas supply to customers, three and a half miles of new gas needs installation by September (Hood, 2013). Though the capital investment seems to be taking progress, all the departments involved in achieving that objective are not equally engaged. It seems awkward to realize that Mr. Murphy, being the head of supply management is unaware of the undergoing project within the organization. Investing in a three, and a half mile gas line requires a lot of resources and to make such decisions regarding authorization of material purchases, sufficient  information is necessary.  

Tuesday, October 15, 2019

Toenails in the corner Case Study Example | Topics and Well Written Essays - 500 words

Toenails in the corner - Case Study Example The nurse carrying out the cleaning role half-heartedly is therefore justified because it is not in her job-description and there is a better qualified individual to carry out the cleaning role other than her. The situation was managed poorly by both the doctor and the nurse because the roles of the nurse were clearly specified but the doctor wanted her to perform additional roles not specified and not in line with her career simply because she is a woman and is therefore supposed to clean up despite the private practice having a janitor to carry out that work. In any organization, if the members of the organization are to work in harmony and without any employee or even the employer complaining, the roles and duties of each and every individual have to be clearly specified. If the roles are not clearly defined, there is bound to be role confusion or role disambiguity and which in turn leads to stress on one party at the expense of the other (s). The nurse did not have the will power to stand up against her boss the doctor and tell her about the chores she was carrying out that were not in her job description. This may be majorly because the employer-employee relationship in that organization was purely work-related and hence making it hard for the employees to air out their grievances or opinion to their employer. In such a situation, the nurse was afraid of fighting for her working rights because she may fear the implications that might result. This is a poor way to manage such a situation because the employee (nurse) will continue suffering alone and which in the end may result to poor performance on her job due to the stress and the job dissatisfaction she is deriving from her unspecified chores. On the other hand, the doctor will continue complaining about Nurse Walsh’s attitude without knowing the real reason behind it and maybe in the

Function of Plant Organs Essay Example for Free

Function of Plant Organs Essay As was noted in the previous chapter, most plant cells are specialized to a greater or lesser degree, and arranged together in tissues. A tissue can be simple or complex depending upon whether it is composed of one or more than one type of cell. Tissues are further arranged or combined into organs that carry out life functions of the organism. Plant organs include the leaf, stem, root, and reproductive structures. The first three are sometimes called the vegetative organs and are the subject of exploration in this chapter. Reproductive organs will be covered in Chapter 5. The relationships of the organs within a plant body to each other remains an unsettled subject within plant morphology. The fundamental question is whether these are truly different structures, or just modifications of one basic structure (Eames, 1936; Esau, 1965). The plant body is an integrated, functional unit, so the division of a plant into organs is largely conceptual, providing a convenient way of approaching plant form and function. A boundary between stem and leaf is particularly difficult to make, so botanists sometimes use the word shoot to refer to the stem and its appendages (Esau, 1965). The Leaf -The plant leaf is an organ whose shape promotes efficient gathering of light for photosynthesis, but the form of the leaf must also be balanced against the fact that most of the loss of water a plant might suffer is going to occur at its leaves. Leaves are extremely variable in details of size, shape, and adornments like hairs. Although the leaves of most plants carry out the same very basic functions, there is nonetheless an amazing variety of leaf sizes, shapes, margin types, forms of attachment, ornamentation (hairs), and even color. Examine the Leaves (forms) page to learn the extensive terminology used to describe this variation. Consider that there are functional reasons for the modifications from a basic type. The Stem The stem arises during development of the embryo as part of the hypocotyl-root axis, at the upper end of which are one or more cotyledons and the shoot primordium. The Root The root is the (typically) underground part of the plant axis specialized for both anchoring the plant and absorbing water and minerals. Root (Follow any links for terms you do not understand and to gain a complete picture of root structural variation) Be sure to read about and understand the meaning of each (at a minimum) of the following terms: adventitious roots, endodermis, epidermis, gravitropism, root cap, root hair, stele, taproot. Most of the material you have read discusses the root organ as found in the angiosperms (flowering plants). However, among the vascular plants, only Psilotales lack such an organ, having i nstead rhizomes that bear hair-like absorbing structures called rhizoids (Eames, 1936 in Esau, 1965).

Monday, October 14, 2019

Biochemical Processes of Oil Degradation

Biochemical Processes of Oil Degradation 1. INTRODUCTION Surfactants are surface active compound that reduce the interfacial tension between two liquids, or that between a liquid and a solid. Surfactants are organic compound that contain both hydrophobic (head part of the surfactant) and hydrophilic (tail part of the surfactant) moieties. Thus surfactant contains both water insoluble i.e. water repellent group as well as water soluble i.e. water loving group. Biosurfactants are also surface active compound like chemical surfactants but unlike the chemical surfactant, biosurfactant are synthesized by microbes like bacteria, fungi and yeast. Biosurfactants comprise the properties of dropping surface tension, stabilizing emulsions, promoting foaming and are usually non-toxic and biodegradable. Recently interest in biosurfactant has increased because of its diversity, flexibility in operation, and more eco-friendly then chemical surfactant (BS Saharan et al., 2011; Eduardo J. gudiËÅ"na et al., 2011). Biochemical processes of oil degradation carried out by microbes involves several type of enzymatic reactions driven by oxygenase, dehydrogenase and hydroxylase (Hamamura N et al., 2008). These enzymes cause aliphatic and aromatic hydroxidation, oxidative deamination, hydrolysis and other biochemical transformation of original oil substance leading to formation of large number of intermediate degradation products. However, a major limitation of microbial degradation of crude oil is its hyydrophobicity. Biosurfactant produced by oil degrading bacteria facilitate the uptake of crude oil hydrocarbons by bacterial cells and also have low toxicity and high biodegradability (Batista SB et al., 2006). So, crude oil degrading bacteria with the ability to produce biosurfactant is widely recommended for fast degradation of crude oil. (Kumar M et al., 2006). Furthermore possibility of their production on large scale, selectivity, performance under intense conditions and their future applications in environmental fortification also these have been increasingly attracting the attention of the scientific and industrial community. These molecules have a potential to be used in a variety of industries like cosmetics, pharmaceuticals, humectants, food preservative and detergents (BS Saharan et al., 2011). But the production of biosurfactant on industry level is still challenge because of using high costly synthetic media for microbial growth. Biosurfactants are classified on the basis of diversity in their structure and their microbial origin. They contain a hydrophilic group, that contain an acid, peptide cations, or anions, mono-, di- or polysaccharides and a hydrophobic group of unsaturated or saturated hydrocarbon chains or fatty acids. Biosurfactants produced by a variety of microorganisms mainly bacteria, fungi and yeasts are diverse in chemical composition and their nature and the amount depend on the type of microbes producing a particular biosurfactant. 1.1 Classification of Biosurfactant: Biosurfactants are classified in to two major group one is low molecular weight surface active agent call biosurfactant and high molecular weight substance called bio-emulsifier that is especially used as enhancement of emulsification of hydrocarbon. Further these two major group is divided in to six major group known as glycolipids, lipopolysaccharides, lipoproteins-lipopeptides, phospholipids, hydroxylated and cross linked fatty acids. (a) Glycolipids: Mostly biosurfactants are glycolipds. They are lipids with a carbohydrate attached. The connection is by means of either an ether or ester group. Among the glycolipids, the best known are rhamnolipids sophorolipids and trehalolipids. Fig 1: Glycolipid (b) Rhamnolipids: Rhamnolipids is a group of biosurfactant that studied extensively. These are produced by many species of Pseudomonas and have tremendous antimicrobial activity against several common microorganisms, which is an essential property of all cosmetics due to the daily contamination of the product by the human touch (Lourith N et al., 2009). Rhamnolipids is a type of glycolipid biosurfactant that contain either a one or two molecule of ÃŽ ²-hydroxydecanoic acid. In 1999 the structure of rhamnolipid produced by P. aeruginosa on mannitol and nepthalene by liquid chromotography was compared. And it was found that for mannitol the most common rhamnolipid contained two rhamnoes and two 3-hydroxydecaonic acid and whereas rhamnolipid produced by nepthalene contained two rhamnoes and one 3-hydroxydecaonic acid. Fig 2: Structure of mono and di rhamnolipid (c) Trehalolipids: It is another type of glycolipids that containing trehalose hydrophobic moieties. Such type of biosurfactant structure is diverse in hydrophobic moieties, varying from short fatty acid to long fatty acid chain. In general it is observed that the bacteria showing Gram’s positive produces Trehalolipids biosurfactant (Anderson RJ et al, 1983). Fig 3: Structure of Trehalose lipid (d) Sophorolipids: Such glycolipids are synthesized by yeast; these are the complex mixture of both free acid and lactone form. The acidic SL contain fatty acid as tail where as SL lactonic are formed by the esterification between carboxylic end of the fatty acid and 4† of the sophorose end. Generally lactonic SL has better surface tension lowering property whereas the acidic SL have better potential to form foam and solubility properties (Nuneza A. et al., 2003). Fig 4: Structure of Sophorolipid lactonized and acid Form. 1.2 Lipopeptides and lipoproteins: Lipopeptide biosurfactants are cyclic compounds and they are mostly isolated from Bacillus and Pseudomonas type bacteria Lipopeptides mainly consist of hydrophilic peptides, generally they consist 7 and 10 amino acids long, linked to a hydrophobic fatty acid structure. Bacillus cyclic lipopeptides consist of three major groups known as the surfactin, iturin and fengycin families. Surfactin is the most commonly studied and it contains 7 amino acid cyclic sequences connected to a C13–C16 fatty acid (Kakinuma A. et al.,1969). Fig 5: Structure of aminolipopetide Fig 6: Structure of cyclic aminolipopetide 1.3 Polymeric Biosurfactants: Polymeric biosurfactant are high weight molecular biopolymers which consist polysaccharides, proteins, lipopolysaccharides, lipoproteins or mixture of theses biopolymers. A wide variety of microbes produces polymer biosurfactant. Polymer biosurfactant exhibits properties like high viscosity, tensile strength, and resistance to shear. The following are example of different type of polymeric biosurfactant. 1.4 Advantages and Uses of Biosurfactant: The unique properties of biosurfactant (Microbial Surface Active Agents) such as low toxicity, relative ease of preparation and widespread applicability, make it different from chemical synthetic surfactant and now it has become recently an important product of biotechnology for industrial and medical applications and they allow to replacement of chemical synthetic surfactant. They can be used as emulsifiers, de-emulsifiers, wetting agents, spreading agents, foaming agents, functional food ingredients and detergents in various industrial sectors such as, Petroleum and Petrochemicals, Organic Chemicals, Foods and Beverages, Cosmetics and Pharmaceuticals, Mining and Metallurgy, Agrochemicals and Fertilizers, Environmental Control and Management, and many others. Table 1. Classification of biosurfactants and their use in remediation of heavy metal and hydrocarbon contaminated sites. (Magdalena Pacwa-PÅ‚ociniczak et al., 2011) Stabilization of the hydrocarbon-in-water emulsions Dispersion of limestone in water Stabilization of hydrocarbon-in-water emulsions Alasan Acinetobacter radioresistens KA-53 Biodispersan Acinetobacter calcoaceticus A2 Liposan Candida lipolytica Mannoprotein Saccharomyces cerevisiae There are many advantages of biosurfactant as compare to chemically synthesized surfactants. Some of those are: Biodegradability: Easy to biodegradable as compare to the chemical surfactant (Kosari N, 1992). Low toxicity Biocompatibility and digestibility, that allows their application in cosmetics, pharmaceuticals and food seasonings. Easily availability of raw material: The raw material need for production of biosurfactant are easily available, biosurfactant producing microorganism can be isolated from the industrial waste like oil contaminated soil, petrol pump spilled, and also can be isolated from municipal waste. Use in environmental control: Biosurfactants can be efficiently used in handling industrial emulsions, control of oil spills, biodegradation and lowering the toxicity of industrial discharges and in bioremediation of polluted soil. Specificity in their action, since biosurfactant has specific organic functional group and often specific in their action. This is particularly used in lowering the toxicity of the pollutant, used in enhancing the emulsification property, used as raw material in cosmetic, medicinal and foodstuff applications. 1.5 Crude oil spills The crude oil spills are one of the main environmental pollutants. Their abundance and persistence in several polluted environmental areas have been reported (Mohammed M. A., 2004). Oil spillage may be caused by natural disasters like earthquakes in the sea surface or due to accidental leaks during exploration, refining, storage and transportation. The causes can be numerous but the consequences are the same. In case of crude oil, the different types such as heavy or light crude oil can affect the clean-up procedures. Crude oil spreads very rapidly on the sea surface and after a short period of time the thickness of the oil film can be at least 1mm. It is therefore necessary to prevent the spreading to reach the shoreline. Once it reaches the shoreline, it contaminates the soil and cause a great damage to the soil ecosystem as well. Some of the largest oil spills that have taken place all over the world are at Iran, Iraq, Persian Gulf, Uzbekistan, Kuwait, United States, Gulf of Mexico, Pakistan and even in India. The most recent oil spill in India is the spill of ONGC Trunk oil pipeline burst, at Uran, Mumbai on 21st January 2011. Around 40 to 45 metric tons of oil was spilled in Mumbai coast that spread around 4 sq km area. Many such disasters reported one seeping oil from a sinking ship. In August 2010, oil spill at Gopalpur beach Orissa in April 2010 causing the death of many Ridley turtles that breed there during that period. It hence becomes a necessity to clean up this oil in order to save the marine life. Clean-up and recovery of hydrocarbons from an oil spill is difficult and the strategies for cleaning up an oil spill are greatly affected by a variety of factors such as the type of oil spilled, the temperature of the water body, and the types of shorelines and beaches involved. A number of approaches an d technologies have been developed for spreading of oil spills in marine shorelines and freshwater environments. Many mechanical and chemical methods can be applied to clean-up the spills (Zhu et al., 2001). Fig 7: Crude oil spill 1.6 Methods applied in cleaning of oil spills 1.6.1 Physical methods Booms. Skimmers. Manual removal (Wiping). Mechanical removal. Washing. Sediment relocation or Surface washing. Tilling. In-situ burning 1.6.2 Chemical methods Dispersants. Demulsifies. Solidifiers. Surface film chemicals. Although various conventional cleaning methods such as physical methods like the first response selection, rarely achieve complete cleanup of oil spills. According to the Office of Technology Assessment (U.S. Congress, 1991), current mechanical methods typically recover no more than 10-15 percent of the oil after a major spill. Chemical methods are faster in action but they are toxic to the biota present in the spill environment. Bio-surfactants can be used for cleaning of crude oil spillage. 1.7 Hydrocarbons of Crude oil: Oils are further categorized into three broad groups, according to their molecular weight. General statements can be made for each of the three categories namely light weight, medium weight, and heavy weight components (Scholz et al., 1999). Crude oils are composed of various combinations of these three categories with the following general characteristics. 1.7.1 Light Weight Components: These are components which have carbon atoms ranging from C1 to C10 which are smaller molecules with few numbers of atoms. They are characterized by high volatility, readily dissolvable and evaporate and leave little or no residue because of their short residence time. Many of these components (e.g., benzene, and toluene) are thought to be more bioavailable to animals by primary exposure route (respiratory system). Being highly flammable and readily inhaled, and therefore are of concern for human health and safety. 1.7.2 Medium Weight Components: These are components which have carbon atoms ranging from C11 to C22 which have complex molecules. It has low rate of evaporation and dissolves very slowly that take several days with some residue remaining. Not as bioavailable as lower weight components, it is less likely to affect aquatic animals. Its primary exposure route is respiratory system and gets readily absorbed through skin. 1.7.3 Heavy Weight Components: These are components which have carbon atoms more than C23. It has the longest residence time with very little loss due to evaporation or dissolution. It can cause chronic effect through smothering as residue in the water column and sediments (tarballs, etc). Its primary exposure route is direct topical contact. Some heavy weight components contain carcinogens that are absorbed through the skin. Its risk of exposure is increased due to long residence time, probability of contact, and adsorption property of the oil components. Table 2: List of oil spill incidents since 2010 1.8 Oil Spills and Their Effects: Recently on 21st January 2011, ONGC trunk oil pipeline burst at Uran, Mumbai. About 40 to 45 metric tons of oil was spilled and spread around 4 sq km area. On 7th August, 2010 a foreign cargo ship, collided with another vessel about 10 km off Mumbai harbor, that spilled the oil in spite of the hectic effect made by Navy and Coast Guard to contain the leak, around 700 tons of fuel oil and 28 tons of diesel oil was spilled. Thousands of eggs of the endangered Olive Ridley Turtles on the beach adjoining river Rushikulya in Ganjam district have failed to hatch this year because of the recent 924 tons of furnace oil spill at a nearby port. Rushikulya Sea turtle protection committee have found that the hatching of the eggs, which ended last week, have gone down by 40 to 50 percent this year as the eggs, numbering thousands, got spoiled after the leaked oil soaked the nesting site on the beach. A number of incidents have been reported happening every year. Some of the oil spill incidents ar e listed in the Table 2. Oil spills kill wildlife and damage the ecosystem that can last for generations by forcing changes in reproduction and compromising complex food webs. Oil spill damage to the waterways of birds and animals, destroys the animal immune systems, interrupt breeding and fouling of breeding grounds. Besides, they thin bird and turtle egg shells and also damage the fish larvae, causing deformities. They cause damage to sea grass beds and other shelter/feeding areas, tainting of algae, which perform a vital role in waterway ecosystems. Due to oil spill on soil the insects and worms living in it are killed due to hydrocarbon toxicity, lack of oxygen supply and it reduce the pH of the soil. This affects the fertility of soil and its productivity in terms of the growth of plants (Wokocha G.A., 2011). As a result soil eco system is getting disturbed and it effects the plant growth. Soil oil also contaminates ground water and it causes illness to the human beings and animals when consumed.

Sunday, October 13, 2019

Why did the French loose the war in Vietnam? Essay -- essays research

  Ã‚  Ã‚  Ã‚  Ã‚  Q. Why did the French loose the war in Vietnam?   Ã‚  Ã‚  Ã‚  Ã‚  In April of 1956 the last remaining French troops would leave Vietnam. After over 200 years of influence and rule, the French at last realized that the occupation and control of Vietnam was an unreachable goal. In consideration of the many blunders (both militarily and political) , and the outright ignorance of the French high command, any efforts to stabilize Vietnamese nationalism and to maintain french rule over Vietnam were thwarted. Thus the French were defeated by an inferior force, and the question of how such an anomaly could occur lies within the 200 years of rule, and the many mistakes made through out way.   Ã‚  Ã‚  Ã‚  Ã‚  To completely understand how France could be defeated by a simple army of Vietnamese peasants, one must first acknowledge a brief history of the Franco-Vietnamese relationship. French Jesuits first arrived in Vietnam in 1634, in hopes of bringing over â€Å"souls† to the catholic church. The majority of Vietnamese are Buddhist, and many locals opposed the presence of the French. By the mid 1700's France would sign a treaty with the Vietnamese gaining protection for the Jesuits in return for French assistance in helping the Vietnamese fight their Chinese invaders. With the rest of Europe carving up the world in the mid 1800's, France now looked to Vietnam as an extension of its Empire. A successful invasion of Vietnam in 1859 gave the french control over Saigon. The invasion was in response to the murder of French Catholics, and looked to be for a time a just cause. However it was just a cover story for the French to settle in and eventually rape Vietnam of it’s raw materials and its culture. Thus from 1861 to the birth of Ho Chi Minh in 1890, French troops would conquer most of what is modern day Vietnam to their own discretion. The discretion of the French must be noted as racially bias. The term â€Å"white man’s burden,† best describes the presence of the French in Vietnam from the period of 1890-1939. Essentially the french believed everything about them was superior to the Vietnamese. Culture, language, religion, and race. This would not settle to well with many Vietnamese, however things would turn worse for the French with the outbreak of WWII.   Ã‚  Ã‚  Ã‚  Ã‚  I would like to argue that the tr... ... the Viet Minh. However by April it was clear that the French forces were losing the battle, and it was now it was clear that the French were putting their last remaining efforts in to Dien Ben Phu. It was an all or nothing situation. The French high command had hoped that Giap would throw his army in to the will of the occupying French forces and in the end be forced to retreat and regroup with a battered down weak force. However this was not the case and by May 7th the remaining French forces at Dien ben Phu will surrender. Peace talks between the French and Viet Minh open up in May of 1954. The agreement at Geneva would once again split Vietnam in to two. The North would be a pro Communist government at Hanoi led by Ho Chi Minh, and the South a pro democratic government backed by the United States out of Saigon. By 1956 the last remaining French forces would leave Vietnam, and a new struggle would begin in the South. The beginning of the American War in Vietnam was just around the corner. The Viet Minh had defeated a major European power, however it would be another 20 years before the reunification was complete.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚   Why did the French loose the war in Vietnam? Essay -- essays research   Ã‚  Ã‚  Ã‚  Ã‚  Q. Why did the French loose the war in Vietnam?   Ã‚  Ã‚  Ã‚  Ã‚  In April of 1956 the last remaining French troops would leave Vietnam. After over 200 years of influence and rule, the French at last realized that the occupation and control of Vietnam was an unreachable goal. In consideration of the many blunders (both militarily and political) , and the outright ignorance of the French high command, any efforts to stabilize Vietnamese nationalism and to maintain french rule over Vietnam were thwarted. Thus the French were defeated by an inferior force, and the question of how such an anomaly could occur lies within the 200 years of rule, and the many mistakes made through out way.   Ã‚  Ã‚  Ã‚  Ã‚  To completely understand how France could be defeated by a simple army of Vietnamese peasants, one must first acknowledge a brief history of the Franco-Vietnamese relationship. French Jesuits first arrived in Vietnam in 1634, in hopes of bringing over â€Å"souls† to the catholic church. The majority of Vietnamese are Buddhist, and many locals opposed the presence of the French. By the mid 1700's France would sign a treaty with the Vietnamese gaining protection for the Jesuits in return for French assistance in helping the Vietnamese fight their Chinese invaders. With the rest of Europe carving up the world in the mid 1800's, France now looked to Vietnam as an extension of its Empire. A successful invasion of Vietnam in 1859 gave the french control over Saigon. The invasion was in response to the murder of French Catholics, and looked to be for a time a just cause. However it was just a cover story for the French to settle in and eventually rape Vietnam of it’s raw materials and its culture. Thus from 1861 to the birth of Ho Chi Minh in 1890, French troops would conquer most of what is modern day Vietnam to their own discretion. The discretion of the French must be noted as racially bias. The term â€Å"white man’s burden,† best describes the presence of the French in Vietnam from the period of 1890-1939. Essentially the french believed everything about them was superior to the Vietnamese. Culture, language, religion, and race. This would not settle to well with many Vietnamese, however things would turn worse for the French with the outbreak of WWII.   Ã‚  Ã‚  Ã‚  Ã‚  I would like to argue that the tr... ... the Viet Minh. However by April it was clear that the French forces were losing the battle, and it was now it was clear that the French were putting their last remaining efforts in to Dien Ben Phu. It was an all or nothing situation. The French high command had hoped that Giap would throw his army in to the will of the occupying French forces and in the end be forced to retreat and regroup with a battered down weak force. However this was not the case and by May 7th the remaining French forces at Dien ben Phu will surrender. Peace talks between the French and Viet Minh open up in May of 1954. The agreement at Geneva would once again split Vietnam in to two. The North would be a pro Communist government at Hanoi led by Ho Chi Minh, and the South a pro democratic government backed by the United States out of Saigon. By 1956 the last remaining French forces would leave Vietnam, and a new struggle would begin in the South. The beginning of the American War in Vietnam was just around the corner. The Viet Minh had defeated a major European power, however it would be another 20 years before the reunification was complete.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  

Friday, October 11, 2019

Japanese Education Essay -- essays research papers

Haven’t you ever wondered why Japanese students continually score higher in academics than the rest of the entire world? Education and schooling in Japan varies greatly than the schooling in America. Japanese students have a greater advantage over their American counterparts in such a way that they are gaining more of an education than the Americans. The Japanese students have to study diligently and work hard to gain a hope of getting a continued education. Japanese children have a greater opportunity to seize hold of their education than the American children.   Ã‚  Ã‚  Ã‚  Ã‚  Whenever people start to think about education and IQ's in general they tend to think of Japan. Japan has the leading literacy rate; at over 99% of its population having the ability to read and write. The Japanese system of education is very well organized and structured. This is due, in part, to the standardization of the subject matter and teaching tools. Students have an equal chance to get the curriculum if they transfer to a different school. This is because the Ministry of Education, Culture, Sports, and Science sets the curriculum at a standard for teachers in all schools to follow. Japan's modern school system was established about a hundred years ago. This was about the time when Japan was opening trade to the rest of the world and westernizing in general. It modeled its education systems after the French and German school systems. However, it does not model just one country; it models many of them. They combine this with their own ideas to form their own personal school system.   Ã‚  Ã‚  Ã‚  Ã‚  Students at the elementary level have great expectations. Their environment reflects their academic priorities. There are around twenty-five thousand elementary schools throughout Japan. A typical Japanese Elementary school will have around 300 students and a variety of activities that go on. This means that the schools are many and can focus more on the children. Students get the chance to excel in their lives.   Ã‚  Ã‚  Ã‚  Ã‚  In the Japanese school day, students are in their classrooms by 8:30 a.m., and school gets out at 3:45 later that day. Those are for their typical public school classes. They have six classes throughout their school day. There are a lot of things to do in addiction to learning and studying. There are committee meeting... ...ernization III.  Ã‚  Ã‚  Ã‚  Ã‚  Secondary Schools A.  Ã‚  Ã‚  Ã‚  Ã‚  Difficulty B.  Ã‚  Ã‚  Ã‚  Ã‚  Materials C.  Ã‚  Ã‚  Ã‚  Ã‚  Entrance Examinations IV.  Ã‚  Ã‚  Ã‚  Ã‚  Juku and Yobiko A.  Ã‚  Ã‚  Ã‚  Ã‚  Cramming B.  Ã‚  Ã‚  Ã‚  Ã‚  Time C.  Ã‚  Ã‚  Ã‚  Ã‚  Entrance Examinations V.  Ã‚  Ã‚  Ã‚  Ã‚  High School A.  Ã‚  Ã‚  Ã‚  Ã‚  Curriculum B.  Ã‚  Ã‚  Ã‚  Ã‚  Tracking C.  Ã‚  Ã‚  Ã‚  Ã‚  Entrance Examinations These Japanese children definitely have a competitive educational edge over a lot of the world. Although they are oftentimes pressured into their studies, they come out on top and have learned a great deal. And most of the children actually want an education. They are not just at school because they have to be. Senior High schools have over 90% admission rate to Colleges and Universities. Once they attain the College-level status, a lot of students describe it as a walk in the park in comparison to their previous years of education. These years of education allow them to become a major educated force to be reckoned with.

Quationair on Airtel Broadband Customer Satisfaction Essay

QUESTIONNAIRE BASED ON CUSTOMER SATISFACTION NAME OF THE ORGANISATION:†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ ADDRESS / OFFICE (1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ BRANCH OFFICE / HO †¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.( INDIA / ABROAD) CONTACT NO. (†¦S)†¦.. (1) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ (2) †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ INFORMATION COLLECTED FROM †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ DESIGNATION/ E-MAIL ID †¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ NO. OF INTERNET USERS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ HOURS OF USAGE PER DAY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. * * ABOUT YOUR ORGANISATION SYSTEM ADMINISTRATOR†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. IT MANAGER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1. Overall, how do you feel about your experience with BHARTI as your Internet Service Provider? Excellent[ ] Very Good[ ] Good[ ] Fair[ ] Poor[ ] 2. Rate the following aspects of your internet connection from BHARTI ExcellentVery GoodGoodFairPoor Reliability[ ][ ][ ][ ][ ] Speed[ ][ ][ ][ ][ ] Busy signals[ ][ ][ ][ ][ ] Disconnects[ ][ ][ ][ ][ ] 3 In speaking with your support representative, how would you rate the following as friendly, as professionalism or as in interested in solving your problem? a. Friendly As friendly as I expected[ ] Friendly[ ] Average[ ] Less friendly than I expected[ ] Unfriendly[ ] N/A[ ] b. Professionalism As professional as I expected[ ] Professional[ ] Neither professional nor unprofessional[ ] Less professional than I expected[ ] Unprofessional[ ] c. Interest in solving your problem As interested as I expected[ ] Very interested[ ] Interested[ ] Neither interested nor uninterested[ ] Uninterested[ ] 4.When solving your problem, how would you rate the information provided? Extremely well presented and understandable [ ] Well presented and understandable [ ] Sufficient to solve the problem [ ] Difficult to understand [ ] Extremely difficult to understand [ ] N/A [ ] 5. Understanding of the problem Very satisfied that my problem was understood[ ] Somewhat satisfied that my problem was understood[ ] Unsure that my problem was understood[ ] My problem was not understood [ ] Did not have the ability to solve my problem [ ] 6. Was your problem solved on this call? Yes[ ] No[ ] Do not remember[ ] Other ___________________________________ 7. If your answer to the previous question was no, why? The problem was caused by a piece of software other than Bharti software. [ ] The problem was due to a network or server outage.[ ] The problem was with my system or phone lines. [ ] I got transferred to someone who could fix my problem. [ ] I got frustrated and decided it was not worth fixing my Problem. [ ] The rep lacked the knowledge to resolve the problems With my Bharti software and connection correctly. [ ] Other ___________________________________ 8. If you needed to contact Bharti’s technical support again and were given the option to speak with this representative, would you? Yes[ ] No[ ] Undecided[ ] 9. How would you rate Bharti technical support as compared to that of other companies? Much better than other companies’ technical support.[ ] Better than other companies’ technical support.[ ] About the same quality as other companies technical support.[ ] Worse than other companies’ technical support.[ ] Much worse than other companies’ technical support.[ ] I have never contacted another company for technical support.[ ] N/A[ ]

Thursday, October 10, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. These three sensors are placed in three different threshold levels and are connected to the controller.If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instruction s given by the developer.This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very sp ecific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM p latform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer.All the featu res and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a progra m, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator.Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits a nd other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arr angement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass a lso rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection') and overheating (‘thermal protection'). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well.A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. Th e 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collecto r is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strappe d to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Al though polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the inter rupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least signifi cant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051’s serial communication UART circuitry divides the machine cycle f requency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the p in RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±3 0-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem inte rface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber.The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts.Subscriber carries the Mobile Station. The Base St ation Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific termina l. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that d efine a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User ManualTemperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the m odem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic]Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrode s and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) con tacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered:SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the gr ound. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses th e polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a R egulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows a utomatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAP TER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded app lication The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source fil es are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å"); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 && L2==1 && L3==1 && L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0);Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 && L2==0 && L3==1 && L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³);TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 && L2==1 && L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUP PLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – – – – – – – — – – – – – – – – – – – – – – – – –  œ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H