Wednesday, July 31, 2019

Successful Leadership Leads to a Successful Business

Quality of leadership has become a major focus of almost every business in America today. Extensive research and analysis of this aspect of management has led to many insightful books on effective leadership. One such book is C. A. O†Conner†s Successful Leadership. O†Conner discusses this complicated subject by breaking it up into seven major areas. These areas are developing awareness, understanding people, power and authority, communication, decision making, creating a vision, and taking charge. Through these seven areas, O†Conner gives valuable skills in becoming an effective leader. Before an individual can begin incorporating the seven major areas of leadership he must first learn followership. Through following, he realizes not only the importance of a leader that looks after the needs of his supporters, but also the need for supporters that contribute to the leader†s success. In any group or team where leadership is present, these two aspects are complimentary. Like wise, the skills of leadership and followership are also complimentary. An individual cannot develop his leadership skills without having developed his followership skills first. Followers learn the importance that teamwork, cohesiveness, and subordination have in the accomplishment of goals. Additionally, when an individual does obtain a leadership position, the experience he gains in following provides a basis to make better decisions. The first major area of leadership is developing self-awareness. In developing self-awareness, one must first obtain the assessment of others. A major source of this assessment is feedback. Careful attention to attitudes, comments and performance of subordinates offer great insight into the effectiveness of a leader. Listening to thoughts and opinions of fellow leaders is another major source. Honesty is the key to both sources of information in that the individual must not disregard negative aspects of his own leadership qualities. He must realize his own faults and shortcomings. The second step in self-awareness is to create a features list. A features list is done by the leader himself and is made up of at least five good leadership traits and at least five bad ones. A leader†s inability to come up with five or more traits in either category means a severe lack of self-awareness. The purpose of the features list is to keep the leader aware of his own qualities. As the individual develops as a leader, he should continuously create new features lists to ensure his own self-awareness. Once the individual has accurately assessed his own qualities, it is then time to implement improvements. A plan of action is the basis of this implementation. The plan should include creating a list of goals that enhance good qualities and make changes to bad ones. The leader must then make strides in realizing these goals. Like the features list, the individual†s plan of action should change as he develops as a leader. The next area of leadership is understanding people. It is essential that a leader understand that each of his subordinates is different, with different drives, dreams, and ambitions. To â€Å"classify† subordinates into a particular group is to deprive them of their individuality and ignore their particular needs. Understanding each subordinate†s needs is the key to motivating them. In assessing the needs of subordinates, a leader must be able to recognize what level each individual is on in Maslow†s hierarchy of needs. The hierarchy of needs is divided into five levels: the need for food, clothing, and shelter; personal safety and a source of income; family, friends, and caring relationships; self-confidence, creativity and individual achievement; meaning and purpose. In determining the level at which an individual is on, the leader can then help that individual in ascending to the next. The outcome is improved performance on the part of the worker. While this is not the only form of motivating people, it is the most effective in long term motivation. Put more practically, a leader can motivate an individual†s performance not only by explaining the advantages to the company, but also the advantages to that individual†s job security and advancement. By nature, humans seek to attain a better quality of life. For this reason, another effective form of motivation is rewarding. Individuals pay attention to doing a job well when they have personal interests as a result of the outcome. The job becomes beneficial to their own profits and not just the company†s. Balancing the use of rewards is very important. Too many offers of rewards result in disappointment and lack of motivation when one is not offered. Leaders must realize that rewards are only temporary forms of motivation that are not successful in long term leadership. The difficult task of managing power and authority is the third area of successful leadership. While understanding the authority of his position, a leader must also be open to the thoughts and ideas of his subordinates. Disregard for opinions is a sign of a weak leader who is afraid of being undermined and therefor hides behind his power. Leaders express leadership through three basic leadership styles: democratic, autocratic, and permissive. The democratic style of leadership is based on a mutual respect and treating everyone equal, regardless of seniority or position. The leader still maintains authority, but others are able to be active participants in finding solutions to problems. Autocratic leadership provides a strong, undisputed style of leadership that is effective when dealing with controversial issues. While clearly defining goals and expectations, the autocratic style of leadership often results in a leader overpowering subordinates which leads to dissension. The permissive style of leadership is described as being a weak attempt at democratic leadership. Subordinates whose leaders have adopted this style of leadership end up with poor coordination, direction, and guidance. In delegating particular tasks, effective leaders will follow a basic format of assignment. Rather then just handing a subordinate a task with the words â€Å"do this† attached to it, a good leader will define the task, discussing in detail the aspects of it, show why it is important and clearly state any expectations. In doing this the worker has a personal commitment and clear understanding of the importance of the task. Finally, the leader will evaluate and discuss the results of the task with that worker, providing feedback for that worker to improve himself. One of the most vital areas in successful leadership is communication. The most basic form of communication is listening and speaking. This involves not only the exchange of spoken words, but also close attention to body language and tone. This attention allows good listeners to sort of â€Å"read between the words† and fully understand the speaker†s message. Effective speakers take time to prepare what they intend to say, giving careful thought to what it is they are attempting to convey. There are five main features to effective communication. These features are often referred to as social skills. The first involves having a purpose for communication. This aids in guiding the exchange of information and avoids useless or irrelevant communication. The next feature is a clear and logical exchange with directness and confidence. The third feature is appropriateness. The presentation of the information must match the needs of the situation. In other words, choosing the format of delivery (i. e. mail, telephone, person-to-person interaction, etc. that is appropriate to the nature of the information. The forth feature is control. The leader must be able to exhibit self-discipline and restrain from over communicating. An example of this is allowing subordinates to learn tasks without intervention, creating an effective learning environment for the worker and not a micro-managed one. The last feature of communication is the ability to learn. Even the best communicators have room for improvement. Leaders must never be satisfied in their communication skills and continuously make efforts to improve them. Decision making is the next area of successful leadership. Leaders can be forced to make several decisions at the same time, making them to prioritize these decisions based on two criteria: future importance and current urgency. Future importance refers to the long term decisions that may seem insignificant presently, but will greatly impact the company in the long run. Making future importance decisions usually requires a great deal of analysis and planning. Current urgency decisions may seem extremely important at the time, but in actuality are not terribly relevant to the success of the company. In either case, future importance or current urgent, an effective leader makes these decisions with confidence and concern for his subordinates. The complications of decision making can often be made easier through good goal setting. In setting a challenging yet attainable goal, the leader gives solid direction to his department and sets clear objectives. From there, many decisions can be based on whether or not the consequences will help in realizing these goals. These goals offer basic guidance, eliminating irrelevant options. Even with the establishment of goals to guide in decision making, tackling a major decision can be very difficult. It is best for the leader to approach these decisions methodically, using a systematic approach of dealing with it. First the leader must establish what the primary and secondary requirements of the decision are and prioritize them. From there, he begins to consider every possible solution and tries to find new ones. Finally, through assessment of the first two steps, the leader chooses the best alternative based what he has come up with. This process can be used by the individual leader or be opened up for use of the entire workgroup in a more democratic leadership environment. The next area in successful leadership is creating a vision. A vision is an ultimate goal, usually rather universal, that gives overall direction to the company and its employees. The result is unified action that steers generally in the same direction. It is the difficult task of a leader to create and maintain this vision as a guiding light in day to day decisions. He must be aware of the sometimes ever changing â€Å"big picture† as seen by the interests of the company and ensure that the vision is in line with that picture. The final area in successful leadership is taking charge. This involves utilizing all of the first six steps and fully applying them to personal leadership development. It also emphasizes the importance of taking charge of leadership qualities that are already there and maximizing their potential. The leader must draw on experience to guide in decisions on how to lead. People are not born leaders. They become leaders through implementing these seven areas into their lives. A good leader must be able to fail and bounce back, learn from experience, and admit their own limitations. This along with a desire to learn and a drive to complete goals create the leader.

Tuesday, July 30, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. These three sensors are placed in three different threshold levels and are connected to the controller.If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instruction s given by the developer.This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very sp ecific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM p latform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer.All the featu res and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a progra m, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator.Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits a nd other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arr angement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass a lso rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection') and overheating (‘thermal protection'). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well.A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. Th e 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collecto r is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strappe d to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Al though polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the inter rupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least signifi cant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051’s serial communication UART circuitry divides the machine cycle f requency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the p in RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±3 0-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem inte rface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber.The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts.Subscriber carries the Mobile Station. The Base St ation Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific termina l. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that d efine a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User ManualTemperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the m odem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic]Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrode s and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) con tacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered:SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the gr ound. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses th e polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a R egulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows a utomatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAP TER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded app lication The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source fil es are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å"); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 && L2==1 && L3==1 && L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0);Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 && L2==0 && L3==1 && L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³);TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 && L2==1 && L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUP PLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – – – – – – – — – – – – – – – – – – – – – – – – –  œ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H

The Martig Case Study

The Martig case study is perfect example of how poor project management activities can lead to project failure. There are different problems discussed in each paragraph which illustrates the absence of well-defined business process resulting in lack of synchronization and conflicts among different departments. For a project to be successful, it's crucial to have well planned and balanced organization structure which will make coordination and communication clear as well as easy. The first problem is perfect example of leadership failure. After Martig senior's death, Martig Junior holds the position of president but his efforts to sell of the business and take long vacations every month shows his loss of interest in the organization.The project managers depend on Martig for feedback and instructions on certain decisions, however its observed they misuse this situation by making their own shot and are in a consistent battle for power. This problem can be simply solved if Martig Junior makes efforts to change his working style and focus little more on the business. The president is expected to make major decisions related to finance, management etc, and should be available so that project managers can reach him out, involve him in discussions and get his opinions in decision making. This will maintain his authority in organization and would not give project managers an opportunity to make their own decisions which might cause business failure. The next problem discussed is about the estimating department. As per the set business rules, its mandatory to involve project managers in proposal estimates to provide feedbacks to update the standards. However, its seen that this never happens in the organization. The project managers hesitate in giving the honest feedbacks as they fear that the estimator might be the next candidate for the executive promotion. This problem can be eliminated by maintaining the proper hierarchy and clarity about the candidates in position for promotion. In third problem is improper assignment of work. This is seen to be happening since there is no transparency in business processes and lack of communication. The procurement work reports to Martig, because of his absence project managers assumes procurement as their work. If Martig is available to do his job, the project managers will not have to spend extra hours doing the work which is not assigned to them. Project Managers are spending approximately 35% of time in procurement activities, if there is proper assignment of responsibilities the project managers can utilize their time in job assigned to them or activities which require attention. In last problem, we see the incorrect attitude of site superintendents towards project managers. The superintendents believe that they hold the same position as of the project manager. However, they are not involved in procurement activities which upsets them, so they find ways to annoy project manager. The case study says that whenever the project manager is present at the site, the work is delayed, and the report sent to the home office is inaccurate. One way of resolving this dispute is, the site superintendents can discuss and ask their supervisor to make changes to the existing process so to give them chance to be involved in procurement function. The other solution is that the project manager can confront the site superintendents to discuss this matter and if they are not able to resolve this, then supervisors should be involved. It is very important for both project and site superintendents to have a healthy work relation so as to complete the assigned tasks and make project a success.

Monday, July 29, 2019

Response paper Essay Example | Topics and Well Written Essays - 750 words - 3

Response paper - Essay Example Apart from certain borrowing between some of them, like Judaism, Christianity and Islam on the one hand, and Hinduism and Buddhism on the other, these religious cults have developed a sophisticated vision of the creation, which definitely and firmly departs from the realm of mythology and appertain to the realms of divine and/or philosophy. Given the major differences, in terms of monotheism and polytheism, between those religions, as well as the fact that all of them claim – quite understandably indeed – the divine high ground, it does rather beg the question of how one can discern their true value. Their concepts of the creation could present us with all-important clues in regard to this question. Due to the borrowings between some of those religious cults, as stated earlier, and for the sake of brevity, the following sections discuss only two of them, which are considered prototypes – Judaism and Hinduism. With its stunning array of traditions, which are not embraced by a single holy book or subjugated to a universal dogma, Hinduism hardly resembles an orderly religious cult, but rather a miscellany of things that Hindus consider essential to practice their religion – from astronomy to music and dance1. The four Vedic collections – Rig, Sama, Yajur and Atharva – which are believed to have been composed between 1750 BCE and 1500 BCE as a revealed scripture, consist of four sections each, namely hymns (Samhitas), directions for the performance of the sacred rituals (Brahmanas), the so-called ‘compositions for the forest’ (Aranyakas), and the Upanishads2. The latter are believed to have been composed around 600 BCE and are considered philosophical works which contain truths about the universe and the place of humanity in it3. The beginning of the world, according to Rig-Veda and Atharva-Veda, is seen as follows: â€Å"In the

Sunday, July 28, 2019

What lead the German people to fully accept Hitler's views on how Essay

What lead the German people to fully accept Hitler's views on how society should be run - Essay Example Our conception of Hitler is different from how the Germans perceived him. History shows that Hitler is a diabolical person who championed the holocaust. However, there was a substantial number of Germans who believed and supported Hitler’s ideas. At that time most Germans idealized Hitler as the fighting leader of German. Hitler believed that Germans were the superior race; this made him take his nationalistic activities too seriously. Hitler’s views made Germans feel important at a vulnerable stage of their lives. Germany was going through a difficult situation as a result of the World War 1. Hitler presented himself as the hero to the ailing state and manipulated the emotions of the people for his selfish interests. It took Hitler 10 years to be the Chancellor of Germany. During that time, Germans were feeling disillusioned about their leadership, economy, and the social life (Klaus 213) He exerted his extremist and nationalistic ideas, which were welcomed by the vuln erable Germans. Just like any popular leader, Hitler used almost all brainwashing techniques on the vulnerable Germans. ... The party amassed a huge following among the middle class and the workers because of the enigmatic and radical leadership of Hitler. The meetings of the Nazi party were violent because the party members wanted to impose their opinions on others; however this did not alarm the Germans because at that time there was a lot of violence in the German streets particularly from the Frei Corp and the Communists. Hitler’s radical views were against the Weimar Republic. He strongly condemned the leadership for the misfortunes that had befallen Germany. He spoke about it in his rallies, which motivated the people who already thought that Weimar republic was dull and had no capability of restoring the German nationalism. Nazi, on the other hand was considered radical, action oriented and capable of restoring German’s nationalism under the leadership of Hitler. Therefore, Hitler’s action and words played a big part in convincing the Germans that Hitler cared about them. Hitle r dwelled on nationalist ideas. Germany at that time was a bruised nation. After the First World War, Germany had lost a lot, particularly its power. In those days, there was rivalry between nations in Europe on who was superior more than the other. When Germany and their allies lost the world war, their superiority was at stake. People were no longer feeling nationalistic after the war as they used. Hitler maximized on the topic of nationalism. Nationalism was the nerve centre of his Nazist activities. In his book, meim kampf, he wrote that Germans are a portrayal of racial purity and they are destined to be the master race. Hitler made Germans feel superior and important at the time the nation was at its rock bottom. He made Germans believe that they were a part

Saturday, July 27, 2019

Critique of Articles on Opiates Essay Example | Topics and Well Written Essays - 750 words

Critique of Articles on Opiates - Essay Example NIDA/NIH also states that â€Å"opiates used without a doctor’s prescription or in ways other than how they are prescribed, can be dangerous and addictive.† Additional information has also been provided on how opiates act on the brain and nervous system in giving feelings of pleasure, relaxation and contentment; acting as an automatic response mechanisms and how it acts on the spinal cord to reduce pain. The article also provides information on how persons can become addicted to opiates which acts on brain stems that controls the automatic response mechanism of the body.. Goodnough’s article entitled â€Å"Abuse of Xanax Leads a Clinic to Halt Supply† points to widespread abuse of the opiate Xanax. It looks at preventative measures that have been taken at the Seven Counties and other Health Centers in the United States to prevent the abuse of opiates like Xanax. Goodnough indicates that: â€Å"The experiment will be closely watched in a State that has wre stled with widespread prescription drug abuse for more than a decade†. The article points to serious repercussions since its withdrawal such as the killing of a doctor by a patient demanding a prescription for the drug. Patients who have been taken off the drugs have complained of increased anxiety since the change as the alternative drugs are not as effective. However, doctors have indicated that there are other ways to treat panic and anxiety disorders. In fact Dr. Hedges (qtd in Goodnough 2011) indicates that â€Å"the risk to the community, if we continue to use this medication is very high†. The article also points out that contrary to popular thinking, the misuse and abuse of Xanax knows no class boundary as people from all walks of life use the drug for various reasons. 3. Comparison and Critique Both articles take a different approach in controlling the use of opiates. NIDA/NIH focuses on opiates in general and mentions a gives a few examples while Goodnough dea ls specifically with Xanax. Both use pictures to give the articles prominence but NIDA/NIH article was more prominent than that of Goodnough. The one picture used by Goodnough was over-bearing and does not really serve any useful purpose in terms of assisting readers in understanding the article. A reader has to really take a second or a third look to really connect the picture to the article. NIH/NIDA on the other hand used several pictures to explain how opiates work, the effects they have on certain parts of the body and how people become addicted to these kinds of drugs. The pictures compel the reader to read the article by drawing attention to it and are useful for a better understanding and appreciation of the article. The use of a variety of colors in the text also added meaning to the NIH/NIDA article. While both articles state some disadvantages of taking the drugs pointing to the effects that it can have on persons who abuse it, NIDA/NIH focuses on how it affects certain p arts of the body. Goodnough focuses on what is being done to control the use of a specific Opiate Xanax in order to prevent its abuse. Goodnough also suggests ways in which misuse and abuse can be prevented. The article looks at the transition process in getting patients off the opiate to another the drug. NIH

Friday, July 26, 2019

Definitions Essay Example | Topics and Well Written Essays - 500 words

Definitions - Essay Example Financial System - system that enables transfer of money between savers or investors/lenders and borrowers and may also pertain to the set of implemented procedures that track the financial activities of the company. Diversification - a risk management technique that mixes a wide variety of investments within a portfolio and strives to smooth out unsystematic risk events in a portfolio so that the positive performance of some investments will neutralize the negative performance of others. Repurchase Agreement - (repo for short) is a type of short-term loan much used in the money markets, whereby the seller of a security agrees to buy it back at a specified price and time; the seller pays an interest rate, called the repo rate, when buying back the securities. US Treasury Security - government debt  issued by the  United States Department of the Treasury  through the  Bureau of the Public Debt; treasury  securities  are the  debt  financing instruments of the  United States federal government, and they are often referred to simply as  Ã¢â‚¬Å"Treasuries.† OTC Markets - decentralized (Over-The-Counter) markets of securities not listed on an exchange where market participants trade over the telephone, facsimile or electronic network instead of a physical trading floor. Adverse Selection - also called anti-selection or negative selection refers to a market process in which â€Å"bad† results occur when buyers and sellers have  asymmetric information  (i.e. access to different information): the â€Å"bad† products or services are more likely to be selected. Moral Hazard - The risk that a party to a transaction has not entered into  the contract in good faith, has provided misleading information about its assets, liabilities or credit capacity, or has an incentive to take unusual risks in a desperate attempt to earn a profit before the contract settles. Money - a medium that can be

Thursday, July 25, 2019

Questions and answers Essay Example | Topics and Well Written Essays - 1250 words - 1

Questions and answers - Essay Example Paul’s teachings differ from those of Jesus’ in his definition of heaven. Paul describes heaven in his teachings as where the body of Jesus Christ dwells, while Jesus described the Kingdom of heaven as prophetic Kingdom of the Israelites here on earth. Paul’s also differed with Jesus when it comes to teachings on authority. Jesus directed that people should obey authority and pay taxes while Paul’s teachings mostly condemned authority. Paul also differed from Jesus in his teachings where he emphasizes that one’s faith alone is required in salvation. This is different from what Jesus taught since he stipulated that in order for a person to have salvation; faith, repentance, and Baptism are necessary. Another difference that characterizes Paul’s teaching from those of Jesus was how the teachings were delivered. Paul’s teachings were mostly in form of letters to different congregations while those of Jesus were mostly delivered in form of parables. 2. Explain the schism between the Roman Catholic and Eastern Orthodox churches. There are various issues that contributed to the schism between the Roman Catholic and the Eastern orthodox churches. ... d to the schism between the two factions of Christianity were issues that surrounded priesthood, the major one being the celibacy of priests which the orthodox churches were greatly opposed to. The papal authority was one of the major issues that led to the schism between the west and the east. Eastern orthodox churches were greatly opposed to the religious and political power that revolved bishops and moreover the pope. These eastern orthodox churches argued that the pope was meant to be the servant of God thus to the people and not a form of authority on earth. In fact, before the separation of the two factions scholars have argued that the pope was the most powerful authority in the known world at the time. Disagreement over the Holy Spirit also contributed greatly o the two factions ex communicating each other (Fisher 328). For instance the western faction stipulated that the Holy Spirit came from the Son and the Father while the eastern faction stipulated that â€Å"the Holy Sp irit proceeds only from the Father† (Fisher 328). 3. What issues did each of the Protestant Reformers (Luther, Calvin, the English Reformers) have with the Roman Catholic Church? Luther One of the major issues that that Martin Luther had against the Roman Catholic was the understanding of salvation. According to the Roman Catholic, in order for a person to be forgiven of their sins after being baptized they must seek repentance and then confess to a priest their sins. Martin Luther differed with this since after studying the bible intensely, he understood that salvation was available to anyone as long as they repented since God offered salvation to all people through the death of his son Jesus. Calvin John Calvin also had issues with the Roman Catholic on the application and understanding of

Wednesday, July 24, 2019

Gay Marriages And National Right Essay Example | Topics and Well Written Essays - 1500 words

Gay Marriages And National Right - Essay Example In his article of 26th June 2015 in the New York Times, Adam Liptak presents various issues highlighting the positive and negative impacts of the judicial move to legalize gay marriage. Justice Kennedy, argues that the ideas in any marriage, whether gay or not, are the most important values which every individual should be given legal access to. His argument further explains that denying them access to gay marriage also reduces both their self-worth and confidence. On the other hand, Justice John G Robert claims that much as the plaintiffs celebrate their victory, they need to acknowledge that it is not in any way associated with their constitutional rights as citizens but rather a fulfillment of their desire (Liptak 7). Supporting John G. Roberts, Justice Scalia claimed that gay marriage is a self-centered interest of the few. Moreover, he stated that support of gay marriage has been championed through the use of appealing phrases which are baseless. Justice Kennedy’s view is that social change is inevitable and it comes as we gain more knowledge and experience in life. His point is premised on the fact that the proponents of constitutional rights did not have a complete understanding of all human rights and their dimensions and therefore, their proposition much as it is helpful is at times prone to changes. He further argues that the essence of marriage is to raise children. According to Kennedy, this obligation will be hampered if gay marriage is not legalized (Liptak 4).

A Schematic Analysis of Medical Coronation Rituals Research Paper

A Schematic Analysis of Medical Coronation Rituals - Research Paper Example Schematic analysis of medieval coronation rituals indicates how powerful these factors are and how aware medical rulers were of the effects they could have. Ritual and symbolic communication have very specific characteristics (Luger, 2003). â€Å"When individual factors of communication are reduced and constitutive conditions changed or distorted, certain consequences for communication ensue...The ritualized element in speech is characterized by restricted individuality, as well as by being the consequence of a specific over-conventionalization† (Lager, 2003). Coronation rituals are a form of ritualistic communication that in a sense brings this to its height: While superficially an individual is gaining tremendous power, in actual fact an institution is being filled. One of the ways that medieval rulers brought to mind schema that would confer legitimacy and power was the connection to Old Testament rulers in imagery (Hedeman, 1991). â€Å"Ceremony and art dealing more speci fically with the king also associated biblical with French kingship. One of the most important ceremonies to do this was the French coronation, versions of which were drafted around 1230 and again around 1250† (Hedeman, 1991, 10).... Men like Moses and Abraham were leaders of men, wise and capable. These schema would bring to mind in the subjects of the Capetians images and feelings of power, wisdom, charisma and strength. â€Å"The changed subject matter and new narrative style in these cycles invested religious history with a "new prescriptive force" to become an example for royal behavior† (Hedeman, 1991, 10). Coronation rituals thus used Old Testament elements. One conclusion that is utterly clear is that the kings had no limit to their audacity. â€Å"After Louis's canonization in 1297, hagiographic programs, frequently presented within a dynastic framework, became more common at court. The presence of a royal saint allowed subsequent rulers such as Philip III or Philip the Fair to glorify the royal house by promoting the cult of their saintly forebear† (Hedeman, 1991, 10). Prior to the beatification of Louis IX, it would be impossible to imagine using New Testament imagery: This would place th e kings on the level of the saints or the Apostles and would be tantamount to blasphemy. But after a canonization, it was possible to use the imagery of the New Testament and of sainthood to give the dynasty an even more blessed touch. But it is not just religious legitimacy and imagery that is deployed. â€Å"Increasingly, courtly commissions emphasized the continuous succession of the three races of French kings, a succession whose length and holiness, confirmed by the sainthood of Louis IX, were the subject of the Grandes Chroniques de France† (Hedeman, 1991, 10). Schema for coronations are not just ways of establishing the power, wisdom and strength of the ruler to the people, but also the ongoing vitality and legitimacy of the institution of the kinghood itself.

Tuesday, July 23, 2019

Contemporary communication Essay Example | Topics and Well Written Essays - 2000 words

Contemporary communication - Essay Example The way Duchamp transfers the meanings of his own personal philosophy of art to the audience is characteristic of an approach to social semiotics that views art as a communication between subjectivities, with the object as a focal point for the transference to occur. By first deconstructing perception and the perspective of the traditional artist through cubism, Duchamp then further deconstructs the fundamentals of the artist-viewer exchange in order to become a master of symbolic communication in the exchange of meaning. The artist Duchamp acts as a psychologist in practicing semiotics as a way of interpreting the integration of science, art, philosophy, mysticism, and technology into the self-awareness of the modern individual. Art in Duchamp’s expression must first represent the subjectivity inherent in the artists’ vision which may be done stylistically or conceptually. In representing two types of vision, he also represented two types of thinking, the analytical an d the romantic. In this primal duality, he could also posit the masculine and feminine symbolically. Thus, social semiotics is constructed through the artist’s own motivations to communicate a personal mythology, giving cause to subjective style and distinctive articulation. The artistic method was a means to bridge this duality for the artist, but to communicate ideas effectively the audience’s perspective also must enter art in concept, and with this semiotic interpretation is created. Calvin Tomkins, Duchamp's biographer, in 1996 writes: â€Å"Duchamp had always maintained that his Glass was not just something to be looked at but ‘an accumulation of ideas,’ in which verbal elements were at least as important as visual ones, perhaps even more so... As Duchamp would say in a 1959 interview, he had ‘tried in that big Glass to find a completely personal and new means of expression; the final product was to be a wedding of mental and visual reactions; in other words, the ideas in the Glass were more important than the actual visual realization.’† (Gerrard, 2000) In the context of social semiotics, Duchamp creates the conceptual in art as his message and his theme lies inherent in the art object, furthering his experiments with form. From this and developments in dada, the entire Western art world is transformed philosophically and methodologically by these advances in semiotic interpretation. This transformation also takes place in Cubism with relation to the artist’s own relation to his own subjectivity. The mind of the artist and his/her perception is most personally shared in cubist painting. Yet, in comparison to dada, Cubism has not fully explored the relationship between the artist and audience inherent in semiotic interpretation. The distinction between the privacy of the artist and what he or she makes public through the art object also relates to the duality of the analytical and the romantic. The an alytical is taken to be objective in expression, where the romantic is inherently personal, as in the relationship between humans privately. As Andrew Stafford writes in Making Sense of Duchamp: â€Å"The Large Glass is a picture of the unseen forces that shape human erotic activity — the realm of ego, desire, and other mysteries. To represent these psychological and existential abstractions, Duchamp created a

Monday, July 22, 2019

Foreign Policy Toward Iraqi Refugees Essay Example for Free

Foreign Policy Toward Iraqi Refugees Essay In 2003, the US war in Iraq finally toppled Saddam Hussein’s dictatorial regime and freed the Iraqi people from the bondage of tyranny. However, the re-establishment of democratic processes and the road to achieving peace have led to perdition, as Islamist fundamentalism prevailed during the cultural-religious bestowal even at the time prior to Saddam’s reign of power. The victory of democracy in the installation of a new Iraqi government instilled the shadow of political unrest and extreme economic recession, in which the fall of Baghdad may have been buried in a deep grave. At present, the violence in Iraq is showing no sign of slowing down and majority of the Iraqi people continue to suffer tremendously as documented on this account : the UN estimates that 2. 6 million Iraqis have fled since 2003 ranging from 40,000 to 50,000 Iraqis leaves their homes every month; two million flees to nearby countries and about 1. 8 million of the civilian populace seek refuge in safer areas within Iraq, in which Syria and Jordan are among the countries directly helping the refugees for the past three years, and some have fled to Egypt, Lebanon, Yemen, Iran and Turkey. Meanwhile, almost daily the media reports on the desolation of Iraqi. The Refugee International has accounted for series and continuing street crimes, the prevalence of business closures, human trafficking, and kidnap-for-ransom cases. In addition, the media said that the documentation of casualties and victims of similar crimes has to be reconciled with at large proportion due inability to locate substantial witnesses and the family of the victims. Goal Positioning The goal of this paper generally seeks to discuss and examine the continuing struggle for survival in Iraq. The product of examination shall be presented through a course of study pertaining to foreign policy toward Iraqi refugees. In particular, a holistic approach will be undertaken, to: (1) identify the extent and magnitude of mass evacuation of refugees, and (2) examine the availability of foreign policies that concern Iraqi refugees. In addition, the objective of the study is to address the long debatable issue on host country refugee adoption and to answer the question â€Å"why and how Iraqi refugees could be hosted by countries like the United States of America but neither by other European countries or in Asia? † This question plainly posits the feasible means of a foreign policy that could be adopted [if there once that exists,] in which this compendium could ventilate the avenues of legislation and to the meanest effort of influencing the public interest for policy initiatives. Background of Study The background of the study focuses on the sub-human conditions of the Iraqi people and their desire to flee from their homeland in exile as refugees. The background [based on the plight of the Iraqi refugees] will also discuss derivatives of study on foreign policies that evolve the goals of this paper. The additional consideration on the need for enabling a foreign policy for Iraqi refugees could indicate and can be comparatively analyzed with the proportion of violence that links the overall unaccounted number of Iraqi casualties. Thus, the initial indicator is based on the documented report that follows: (1) US military killed in Iraq is estimated at 3,973; (2) number of US troops wounded in combat since the war began is 29,203; (3) Iraqi Security Force deaths is 7,924; (4) Iraqi civilians killed is estimated at a range from 81,632 to 1,120,000; (5) internally displaced refugees in Iraq is estimated at 3. 4 million. On the other hand, as part of the documented report , the cost of war has accounted to; $526 billion to date, with a cost per day of $275 million and being estimated at a long- term bill of $3 trillion. In addition, Iraqi unemployment has grown from 25 to 40 percent. Literature Review A brief review of similar literatures will be discussed in this section in order to: (1) present the collection of initiatives and collaboration of international entities and governments for refugees, and (2) link the relevance to the process of this paper. Canada was tasked to assume the role of â€Å"gavel-holder† of the newly established Refugee Working Group (RWG) in January of 1992 as part of the design of the general Middle East peace process (MEPP) that created the Expert and Advisory Services Fund (EASF) as a Canadian involvement to the Middle East Multilateral Peace Process . The EASF is administered by Canadian International Development Research Centre (IDRC) with funding from the Canadian International Development Agency (CIDA) in partnership with the Department of Foreign Affairs and International Trade (DFAIT). The implementation of EASF for the period of March 2002-2008 works within key policy issues on refugees, in which EASF (Phase 3 IDRC) programs embark on the â€Å"compensation to Palestinian refugees as part of a comprehensive solution, challenges of repatriation and absorption, and gauging and engaging public opinion† . In a related finding, the Georgetown University’s School of Foreign Service through its Center for International and Regional Studies (CIRS) located in Qatar and the Institute for the Study of International Migration (ISIM) in Washington jointly conducted a study in 2007 regarding this for . The study showed that Iraqis in Jordan and Syria are beneficiaries of two opposing foreign policies, one is the tradition of Arab brotherhood which comprises a political and moral responsibility in providing refuge while the other is an option of Jordan and Syria not to integrate the Iraqis’ permanency . However, the United Nations High Commissioner for Refugees (UNHCR) considers the Iraqis as â€Å"prima facie refugees† (being registered refugees) who were issued with â€Å"asylum seeker cards† in Jordan and refugee cards in Syria. The UN agencies and NGOs have provided immediate support to lessen the misery. Furthermore, the study team stated that â€Å"the war in Iraq is not limited to Iraq since it has intensely affected the Middle East region . However, according to a statement of a UK-based NGO, many refugees are denied asylum status, being degraded and are even called as â€Å"welfare scroungers† or â€Å"fake refugees† when they come to the UK . It is obvious that the US and UK’s War on Terror is marginalizing refugees still further as numerous legitimate political movements are labeled terrorist . In addition, based on the statement, the UK has curved entire migrant communities as terrorist suspects [in which the anti-terrorism laws have widened the classification of terrorism] encompassed with political activities even on those who are against oppressive regimes overseas . Moreover, the US government has recently released a press statement disclosing that about 12,000 Iraqi refugees will be admitted to US before the end of 2008. According to State Department’s Senior Adviser James Foley, the Deputy Assistant Secretary of State for Consular Affairs’ Tony Edison and the Department of Homeland Security (DHS) Senior Adviser on Iraqi Refugee Issues’ Lori Scialabba, Iraqis were identified as potential candidates for emigration to the United States. After a year of redoubled efforts, all of the organizations involved in the process are working together to build a more effective refugee screening program . The three US officials further stated that the US has poured in $171 million in humanitarian assistance to displaced Iraqis both in and outside the country in 2007. However, the UN has appealed for $123 million in 2007 to $261 million for 2008 . Scope and Limitation The scope of work will be composed of a 2-prong method which are: (1) on-field and out- field research; within the scope of finding available and adequate materials as derivatives in the conduct of evaluation and the actual field validation of data and (2) study review in areas of fitting in the study parameters in view of legislative policy agenda for refugees in order to re-examine the gaps and further conduct of study. Considerably, the aspect of out-filed research may be limited only to accessing the available data sources, such as on-site interviews to various individuals or personalities and gathering of other data materials that are readily available. Perspectives It has been a glaring and presently debatable issue that Iraqi refugees pose a challenge to global governments and communities of progressive people. The parameters of the study believe that Iraq has not yet overcome the war. While it is true that Iraq was once a captive of political and religious dogmas, the country must still be retained to its sovereign people. The Iraqi refugees is a shame to the least part of developed and even underdeveloped world from Africa to Asian continents because in that part of Middle East lies a bleeding country characterized by the plagues of war. It is in this regard, the study envisions a perspective that would create and supplant the bondage and stigma of war from the life of the Iraqi people. The study also aims to map out the road to recovery, and through that, a foreign policy for Iraqi refugees may guide the ascendancy of moral values and responsibility in order to achieve peace in Middle East and the rest of the world. Conclusion It is clear the Iraqi people continue to walk on the road to perdition due to their long struggle of tyranny. It could be described that the misery after the fall of Baghdad has a continuum in despicable plight. The global partnership in restoring and retaining the democratic processes in Iraq may be a long process and difficult due to the intensely adverse cultural-religious entanglement. Nevertheless, it is necessary to first restore the people’s lives, specifically women, and children. Once this is achieved, it will be no longer hard to once again see the flourishing city of Baghdad where people co-exist in abundant life amidst the barren lands. Bibliography America. Gov, â€Å"United States to Welcome 12,000 More Iraqi Refugees in 2008† (February 06, 2008) [http://www. america. gov/st/peacesec- english/2008/February/20080206160027idybeekcm0. 824032. html] Erik Leaver and Jenny Shin, â€Å"The Iraq Quagmire†, Foreign Policy in Focus, Institute of Foreign Policy, Washington DC 20036. (March 4, 2008). [http://www. fpif. org/fpiftxt/5036] International Development Research Centre (IDRC), â€Å"Middle East Expert and Advisory Services Fund†, Department of Foreign Affairs and International Trade Canada (2008). [ http://www. idrc. ca/uploads/user-S/12060300201Microsoft_Word_- _EASF_Program_Profile__3__final. pdf] Kristele Younes, â€Å"The Iraqi Refugee Crisis†, Foreign Policy in Focus, Institute of Foreign Policy, Washington DC 20036 (March 14, 07). [http://www. fpif. org/fpiftxt/4059] Patricia Weiss Fagen, Iraqi Refugees: â€Å"Seeking Stability in Syria and Jordan†, Georgetown University Institute for the Study of International Migration (2007). [http://www12. georgetown. edu/sfs/isim/Publications/PatPubs/Iraqi%20Refugees. pdf] The Refugee Project, 44 Ainger Road, London, NW3 3AT (2008). [http://www. therefugeeproject. org/]