Thursday, August 27, 2020
Activation Of T Lymphocytes Essay Example for Free
Enactment Of T Lymphocytes Essay Various sorts of T lymphocytes exist and each type plays out a specific capacity. à Helper T cells, otherwise called TH cells, fill in as couriers of the insusceptible system.â When partner T cells are actuated, these phones multiply and produce cytokines, which are little proteins that control the degree of safe reaction that a natural life form will express.â Several sorts of cytokines exist and every cytokine triggers the development of assistant T cells into explicit subtypes, for example, aide T cell subtype 1, 2 and 17 (Balandina et al. , 2005). Another sort of T lymphocyte is the cytotoxic T cell (CTL), which is otherwise called the TC cell.â Cytotoxic T cells are liable for the demolition of cells that were tainted by infections, just as for the obliteration of tumor cells.â These phones additionally assume a significant job in deciding if a phone is ordinarily part of the framework or an outside cell.â Cytotoxic T cells are known to be the preferred choice to respond and dismiss if an organ transplanted into a beneficiary isn't good regarding tissue similarity. The cytotoxic T cells that are related with tissue dismissal are assigned at CD8+ T cells, in view of the possibility that these cytotoxic T cells produce a particular CD8 glycoprotein that is shown on its cell membrane.â These CD8 glycoproteins associate with assistant T lymphocytes, of which may trigger its change into administrative T cells.â The significant job of administrative T cells is to hinder the beginning of an immune system issue inside the arrangement of the living being. Another sort of T lymphocyte is the memory T cell which is delivered when a disease happens in an individual.â These particular T cells keep on coursing in the blood framework for a while in any event, when the contamination has been stopped.â Memory T cells further separate into effector T cells when they locate a similar antigen that was related with the past contamination, subsequently the term memory is proper to apply to this kind of function.â Two general kinds of memory T cells incorporate the focal and effector cells.â â Memory T cells are known to convey either the CD4 or the CD8 glycoprotein on its plasma film (Wildin et al., 2001). Administrative T cells are another sort of T lymphocytes that assume a significant job in supporting the resilience of the invulnerable framework (Khattri et al., 2003).â These T cells were prior called silencer T cells and their essential job is to forestall invulnerability that is brought about by other T cells during the later phases of a resistant reaction (Fontenot et al., 2003).â Regulatory T cells are additionally answerable for repressing the insusceptible response towards different cells of the body or self cells since this is significant in keeping up the solidness of the whole immunological framework. Explicit conditions bring about the insusceptible reaction towards self cells and this is normally seen when the thymus encounters trouble in separating self cells from non-self or remote cells.â There are two significant sorts of CD4+ administrative T cells that have been characterized.â Naturally happening administrative T cells start from the thymus and are at times alluded to as CD4/CD25/ForP3 T administrative cells. The other significant kind of CD4+ administrative T cell is the versatile T administrative cell which is created when an intrinsic invulnerable reaction occurs.â This sort of cell is likewise called Tr1 or Th3 cell (Hori et al., 2003).â A distinctive component that encourages is the separation of normally happening T administrative cells from the remainder of sorts of T lymphocytes is the event of the FoxP3 particle that is arranged inside the cytoplasm.â Research has demonstrated that changes caused in the FOXP3 quality outcomes in the failure of administrative T cells to separate, which thusly impacts the beginning of the deadly state of autoimmunity. Another kind of T lymphocyte is the characteristic executioner T cell which is fills in as the communicator between the versatile and the intrinsic resistant systems.â Different from the standard T lymphocyte that recognizes protein antigens that are held by the significant histocompatibility complex (MHC), the common executioner T lymphocytes recognize glycolipid antigens that are appeared by the protein atom CD1d.à The normal executioner T lymphocyte is then actuated and along these lines gains the capacity to execute explicit capacities that are identified with Th and Tc cells, including the emission of cytokines and the outflow of cytolytic particles that are liable for the demolition of remote cells that have attacked the body. Gamma-delta T lymphocytes speak to a little subtype of T cells that convey a one of a kind receptor on their plasma membrane.â Most of the T lymphocytes convey a receptor that is contained by two strings of alpha and beta glycoproteins.â In gamma-delta T lymphocytes, the receptor is made out of a gamma and a delta glycoprotein string.â Gamma-delta T lymphocytes are very uncommon, including just roughly 5% of the whole T lymphocyte populace yet are found in high fixations in the epithelial coating of the stomach, as a component of populace of intraepithelial lymphocytes. Protein antigens that trigger a reaction from gamma-delta T cells have still yet to be determined.â It is fascinating to realize that gamma-delta T lymphocytes are not solely appointed to convey significant histocompatibility complex atoms and are really fit for recognizing whole proteins than essentially seeing short protein chains conveyed by the significant histocompatibility complex particles on lymphocytes that harbor antigens. There are specific gamma-delta T cells that have the ability to distinguish a particular kind of significant histocompatibility complex particles, explicitly class IB.à In the human resistant framework, the Vgamma9/Vdelta2 T lymphocyte makes up most of the gamma-delta T lymphocyte populace that is circling in the bloodstream.â These particular T lymphocytes have the capacity of rapidly responding to a small metabolite that begins from microorganisms, known as the isopentenyl pyrophosphate forerunner. à Another sort of T lymphocyte is the autoaggressive T cell which is exceptionally particular dependent on its capacity to emit the CD40 protein particle (Miura et al., 2004).â CD40 is commonly connected to T lymphocytes that current pieces of an antigen and this protein atom is usually created by a subtype of T assistant lymphocytes. Th40 cells are available in every single person yet the degrees of this particular sort of cells rapidly increment during states of autoimmunity.â In patients determined to have type 1 diabetes mellitus, the Th40 cells for the most part respond to self-antigens.â For the situation of patients determined to have non-immune system people, the Th40 lymphocytes don't respond with these antigens.â A significant capacity of the CD40 protein atom on T lymphocytes is to trigger the recombinase proteins RAG1 and RAG2 in coordinating the receptor of a T lymphocyte. The receptor of a T lymphocyte fills in as the course through which a T lymphocyte can distinguish a particular antigen.â It has been resolved that the two recombinase proteins be created solely in the thymus during the improvement of T lymphocytes.â It was, in any case, saw that the RAG proteins were discharged again by the T lymphocytes that were circling in the bloodstream.â what's more, it was additionally seen that the CD40 protein related with Th40 lymphocytes, bringing about the creation of RAG proteins.â Subsequent to the outflow of the RAG proteins, alterations in the receptor of the T cells occur, proposing that the Th40 lymphocytes convey the capacity to adjust for the whole span of an individualââ¬â¢s life. The technique of altering the declaration of the receptors of T cells that are circling in the circulatory system has been names as TDR revision.â Research has announced that TCR amendment impacts the development of the collection of T lymphocytes, just as creates T lymphocytes that are autoaggressive.â This perception along these lines shows that the update of the receptors of T cells is another strategy for T lymphocyte resistance. THE DEVELOPMENT OF T LYMPHOCYTES IN THE THYMUS T lymphocytes are created from the undeveloped cells of the hematopoietic framework which is situated in the bone marrow.â These undifferentiated organisms move from the bone marrow to the thymus, where they are relied upon to multiply through the procedure of cell division and produce juvenile thymocytes.â Young thymocytes for the most part don't emit any CD4 or CD8 proteins thus these cells have been depicted as CD4-CD8-cells. During their course of advancement, the youthful thymocytes procure the ability of discharging CD4 and CD8 particles and these thymocytes are presently named CD4+CD8+ (Sakaguchi, 2000).â Further development of these phones includes the particular emission of just a single protein, either the CD4 or the CD8 molecule.â Once this has been resolved in each thymocytes, these phones are then removed by the thymus with the end goal for them to flow to the remainder of the body.â Approximately 98% of the thymocytes delivered by the thymus are relied upon to break down during its development, bringing about just 2% of the thymocytes arriving at development and completely ousted by the thymus as immunocompetent T lymphocytes. Youthful thymocytes that harbor the two sorts of antigens, CD4 and CD8, relocate into the center of the thymus so as to connect with antigens that are produced by the T lymphocyte.â These thymocytes cooperate with the significant histocompatibility complex atoms that are available of the plasma film of the phones of the epithelium.â Only a particular division of thymocytes will have the option to totally tie with the significant histocompatibility complex particles in this way bringing about a sign that demonstrates the endurance of the thymocyte. The remainder of the th
Saturday, August 22, 2020
You Got Served Soundtrack free essay sample
The exceptionally acclaimed kid band B2K has another hit. ââ¬Å"B2K Presents You Got Servedâ⬠is the soundtrack to the film ââ¬Å"You Got Served,â⬠a film dependent on the lives of four debilitated high schooler young men who love to move. Like the film, this collection has a great deal of tunes that will rapidly make them move. What I truly love about it is that it has RB, hip bounce, pop and various different classifications. Your run of the mill B2K collection just offers RB, however here you get some extra. It additionally includes Lilââ¬â¢ Kim, ATL, Oââ¬â¢Ryan, Marques Houston and Jhene. This collection is the best in my B2K assortment. There are numerous features: the up-beat ââ¬Å"Take it to the Floorâ⬠is a superb tune that makes them move each time I play it; female rapper Lilââ¬â¢ Kim joins B2K on ââ¬Å"Do That Thing,â⬠a blasting hot tune that is my top pick. We will compose a custom article test on You Got Served Soundtrack or on the other hand any comparative point explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page The best melody on the collection is ââ¬Å"The Oneâ⬠by ATL, an appealing number that truly causes you to feel great. In general, ââ¬Å"B2K Presents You Got Servedâ⬠is a phenomenal collection. It isn't conventional B2K, which makes it shockingly better. This is obviously their best contribution to date and is certainly worth purchasing, particularly on the off chance that you are a genuine B2K fan!
Friday, August 21, 2020
Reducing Stress at Work - 7 Reliable Tips
Reducing Stress at Work - 7 Reliable Tips Make Money Online Queries? Struggling To Get Traffic To Your Blog? Sign Up On (HBB) Forum Now!Reducing Stress at Work 7 Reliable TipsUpdated On 18/11/2019Author : Ram kumarTopic : BloggingShort URL : https://hbb.me/2XqYzOg CONNECT WITH HBB ON SOCIAL MEDIA Follow @HellBoundBlogStress is so prevalent in todayâs society that it can hardly be called anything other than a plague. Itâs a disease that an alarming percentage of society is afflicted by. Of course, considering the amount of information weâre bombarded with every day, as well the breakneck pace weâre all expected to live by, itâs no wonder that people get a little bit tense.Out of all of the sources of stress that are the bane of our existence, it appears that work may be the most common. Stress in the workplace is something most of us struggle with in some way, shape, or form, though for the most part, we resign ourselves to a life of quiet suffering. âItâs just the way itâs supposed to be,â we tell oursel ves. âItâs work. Itâs supposed to be stressful.âWell, weâre here to tell you thatâs not true. Of course, there is some work-related stress that wonât just go away regardless of what you do and it should stay that way, since a little bit of stress is what sparks productivity! But there are ways in which you can reduce stress to a manageable level. Here are seven tip we find the most useful and reliable.#1 Put your best foot forwardStarting off with a tip thatâs relevant even outside of the workplace, itâs important to start your day right. Youâd be surprised with how much stress you can avoid simply by organizing your mornings well. If you make sure that you have time to eat your breakfast, get everything ready on time, leave at an appropriate hour, and just psych yourself up for the day ahead of you, youâre bound to be able to deal with whatâs to come at work much easier.If youâre really struggling to find the time which might very well be the case if you have kids consider preparing at least some of the things you have to do the evening before you go to bed. Alternatively, set your alarm a little earlier youâd be surprised with how relaxing the small hours of the morning when no one will bother you can be!#2 Be organizedOne of the leading reasons for stress in the workplace is a lack of control. If you work in a chaotic environment, with your responsibilities constantly changing at a whim, it may be the cause of more than a headache in the long run. Thatâs why taking control is key. Of course, thereâs only so much you can do to influence the whims of your superiors (more on that later), but there are things you can take control of right now that will make your work much more bearable.Plan ahead set up a schedule for your tasks. See which are top priority and which can wait a bit and make sure you take them on in a logical sequence. Use markers, spreadsheets anything that will help you contain the chaos better. See if ther eâs anything you can do to learn how to send a fax online ahead of time. If you can, make sure you delegate tasks to others so that you have a little more breathing room. Lastly, take a look at your desk is it well organized? Do you have everything you need handy with no distractions? A controlled environment begets actual control, so go on! Organize your desk, and your workflow is bound to improve as well.#3 Keep yourself comfortableSpeaking of organizing your desk, did you know that discomfort can be a big factor in reducing your ability to focus? This, in turn, increases stress. Itâs in your best interest, then, to make sure that you are sitting comfortably at all times. If youâre working a full-time job, it is the responsibility of your superiors to make sure you have a chair that offers support in all the right places, as well as a keyboard and mouse pad with padding, so you can avoid ailments like carpal tunnel syndrome. If youâre self-employed though, youâre on you r own donât skimp on office furniture. Not only will you be less stressed, but youâll also stay healthier for longer.READWhy Infographics Are Important To Your Blog#4 Stretch your legsSitting down all day is killer for your back, your legs the whole package, really. It also makes you more stressed out. What you want to do to combat that is to make sure you take regular breaks. Not just any break will do, though you need to make sure you spend that time moving around, preferably outdoors, where the sun can run its course and supplant you with some very beneficial vitamin D. Youâd be surprised how much of a difference that can make for your mental well-being.#5 Eat wellAs tempting as it might be to start your day at work with a cup of coffee, itâs actually best to avoid caffeinated drinks if you want to avoid stress. In general, sticking to a healthy diet can come a long way in making you feel more relaxed and in control of your life. Avoid sugars and get some more omega-3 fatty acids in you, eat more fruit and veggies and youâre bound to see results pretty quickly. You might lose some weight along the way, too, which is an added bonus!#6 CommunicateWeâve mentioned that instability at work is one of the most prevalent sources of stress. The thing is, in most cases this is not done out of malice, as professional life can get pretty rapid, leading to your superiors having to change their plans and tactics on the fly. The best course of action is to talk to them about how it affects you perhaps something can be done to take the load off your shoulders.It might also be the case that the main source of stress for you are your poor relationships with your coworkers. We all know office politics can be quite catty and gossipy at times, which can be very stress-inducing. The best course of action in this case is to find the coworkers you can talk to and focus on fostering good friendships with them. A companion can come a long way in making the workplace feel less hostile.#7 Leave work matters behind as you finishLastly, we have the most important tip of all donât take your work home with you. This also applies to freelancers who work from home, though admittedly, that is a bit harder to do. This is, of course, all easier said and done, since in particularly stressful situations, it might be hard to separate yourself from that office mental space just as you finish. What helps in those cases is following some kind of ritual to help you draw a clear line between your work life and your private life. Whether itâs twirling your keys around exactly three times or hanging your coat on a designated hanger, this is a simple trick that can help you mentally get away from all the stress.
Monday, May 25, 2020
Pricing Startegies for Mcdonald - 2297 Words
PRICING STRATEGIES Global pricing is one of the most critical and complex issues that McDonaldââ¬â¢s faces since price is the only marketing mix instruments that create revenues while all other elements entail costs. A multinational company such as McDonaldââ¬â¢s also faces the challenges of how to coordinate their pricing across different countries because of the fact that a companyââ¬â¢s global pricing policy may make or break its overseas expansion efforts. In this case, McDonaldââ¬â¢s is using Value-Pricing Strategy whereby its offer just the right combination of quality and good service at a fair price to their consumers. There are main drivers which affecting the McDonaldââ¬â¢s global pricing such as the company goals, the company costs, the customerâ⬠¦show more contentâ⬠¦McDonaldââ¬â¢s also encountered other barriers such as for example in India where the citizen worship cows as their God and does not eat them, the advertisement of the McDonaldââ¬â¢s product that based on beef is condemned and drew heavy criticism from the Indian society. McDonaldââ¬â¢s Television Campaign and Slogan. McDonalds has for decades maintained an extensive advertising campaign. In addition to the usual media (television, radio, and newspaper), the company makes significant use of billboards and signage, sponsors sporting events from ranging from Little League to the Olympic Games, and makes coolers of orange drink with their logo available for local events of all kinds. Nonetheless, television has always played a central role in the companys advertising strategy. Until today, McDonalds has used 23 different slogans in United States advertising, as well as a few other slogans for select countries and regions. There have been many McDonalds advertising campaigns and slogans over the years. The company is one of the most prevalent fast food advertisers. McDonalds Canadas corporate website states that the commercial campaigns have always focused on the overall McDonalds experience, rather than just product. The purpose of the image has always been portraying warmth and a real slice of every day life. Its Television advertisements showing various people engaging in popularShow MoreRelatedMcdonalds Pricing1208 Words à |à 5 Pagesenvironment. This is indeed the case with its implementation of its pricing strategy, which is one of localisation rather than globalisation. Table II illustrates the comparative Big Mac prices (flagship brand of McDonaldââ¬â¢s) from around the world. It succeeds in highlighting the point that McDonaldââ¬â¢s has had to come up with different pricing strategies for different countries. More importantly, rather than just having a different pricing policy for the Big Mac in these listed countries, McDonaldââ¬â¢s hasRead MoreMcdonalds Project.Pdf File11266 Words à |à 46 Pagesà ´Marketing strategies of McDonaldà ¶sà ´ ACTUAL FACTS ABOUT MCDONALDS COFFEE CASE 4|P a ge On February 1992 the headlines of news paper hits with a McDonalds coffee case news. The case was about Stella Lie beck of Albuquerque, New Mexico, was in the passenger seat of her grandsons car when she was severely burned by McDonalds coffee in February 1992. Lie beck was 79 at the time, ordered coffee that was served in a Styrofoam cup at the drive through window of a local McDonalds. After receiving the orderRead MoreBusiness Plan Template5269 Words à |à 22 Pagesfirm. PRICING Pricing is the process of establishing the maximum price of the product or service at which it can be sold. Pricing strategy is a part of the companyââ¬â¢s marketing strategy it involves setting the price of the product/service in such a way that it aids towards the smooth operation of the business. There are several ways of pricing strategy such as market skimming, target pricing, value pricing psychological pricing, contribution pricing, cost-plus pricing, penetration pricing, tenderRead Morepaul hoang answers72561 Words à |à 291 Pageshighly flexible and adaptable to change, so if business idea or plan does not work out then Keith and Tonina are quite flexible in making the necessary changes, e.g. it is relatively easy to transfer a small restaurant to a hair salon than for McDonalds to change their operations. Small businesses such as EXP might operate in niche markets and can become highly profitability yet these markets may be untouched by larger businesses that are more concerned with mass market operations. There is
Thursday, May 14, 2020
Theories For The Classification Of Culture Essay - 1179 Words
Theories For The Classification Of Culture A culture is a sum of attitude, values, beliefs, and customs that distinguishes a person or group of people from another. Culture is inherited from one generation to another through languages, rituals, religion, art and many other such things. In the business world, the comparing, dealing or interacting of different people from different culture, community or background is called cross culture management. It is an important function for international firm, as the success of the business depends upon the way of dealing and interacting with the employees from different culture or region. If an employee is appointed or transferred to another country .i.e host country (HCNs), he will face problems like culture, language, attitude and so on. So the employee must learn these things to be efficient. Such issues related to cross cultural management is developing nowadays, as globalization and competition is increasing. Many economistââ¬â¢s did research to solve this problem and came out with different modelââ¬â¢s and theories. Today, we are going to study two of such models/theories, which are Hofstedeââ¬â¢s model and Fons Trompenaars cultural dimension. (http://www.investopedia.com/, 2014) Hofstedeââ¬â¢s Model Greet Hofstede is a Dutch social psychologist who did a comprehensive study of culture across modern nations. His most popular book is Cultures and Organizations: Software of the Mind (1991). He conducted a pioneering studies of how values inShow MoreRelatedLeadership Theories And Philosophies Of Case, Kouzes, And Drucker1689 Words à |à 7 Pagesmany leadership theories and philosophies currently used to describe the different principles and strategies by various leaders to drive their decision making and actions in the business world. A common perception about leaders is that they are born and not made. This theory often portrays great leaders as destined to rise to leadership. However, there are many different classifications of other commonly used leadership theories which include trait theories, contingency theories, situational theoriesRead MoreThe Archaeological Theory Of Practice1451 Words à |à 6 PagesIn the Archaeological Theory in Practice textbook, the positive legacies of Culture History are detailed by V. Gordon Childeââ¬â¢s archaeological theory processes. It emphasized that cultural History subdivided historical societies into distinct ethnic and cultural groups by their physical culture, rejecting a comparative method and independent cultural development, with documentation reflecting the development of specific groups have distinctive set of traits unique to each cultural group. It explainedRead MoreBinary Oppositions And Its Impact On The Context Of Culture871 Words à |à 4 PagesSymbolic anthropologists examined binary oppositions in the context of culture, investigating how rules were formed as a result of these contradictions. The four main theorists of symbolic anthropology all have different opinions on what binary oppositions mean to culture; however, all of them agree that culture must be organised in some way and that binary oppositions play a role this organisation. Claude Levi-Straussââ¬â¢s theory of binary oppositions was extremely influential in the anthropologicalRead MoreCritically Evaluate Maslowââ¬â¢s Hierarchy of Needs in Relation to Employee Motivation in Contemporary Chinese Business953 Words à |à 4 PagesMaslow has a clear classification of normal humanââ¬â¢s needs which consisted by physiological, safety, belonging, esteem and self-actualization. Also Maslow (1986) stated that as long as the lower-level needs are met, people would modify to satisfy the higher-level needs and this is what brings motivation out. Maslowââ¬â¢s hierarchy of needs is classic, however, it seems that this theory cannot be applied to the whole business environment. This essay will evaluate whether Maslowââ¬â¢s theory is suitable to theRead MoreTechnical and Tactical Classification of Games and Physical Activity1324 Words à |à 5 PagesTechnical and Tactical Classification of Games and Physical Activity Objective The objective of this study is to analyze the technical and tactical principles of play for the major sport classification together with the different methods and instructional approaches. Introduction The work of Dyson, Griffin and Hastie (2004) entitled Sport Education, Tactical Games and Cooperative Learning: Theoretical and Pedagogical Considerations states that many educators hold the belief that studentsRead MoreYouth And The Hip Hop Youth Culture1695 Words à |à 7 PagesAustralian Youth Culture Introduction Youth has various definitions. It can be considered as a state of mind, a life stage, or a stage of development. Youth can also be considered as a creation of marketing and a demographic category. Youth cultures as well as subcultures based on the theory or theories applied refer to cultures that in most part comprise of young people as the members. Youth cultures are determined by ways of living and they revolve around peer groups that stress a definitiveRead MoreCommodity School1154 Words à |à 5 PagesMarketing Theory Commodity School 01.11.2012 [Ã
žirket adà ±nà ± yazà ±n] Bahcesehir University, MA Marketing What is commodity school and what are strengths and weaknesses of that thought? Marketing theory has been discussed over years. Many theorists had tried to explain marketing thought since it was a separate field apart from economics. In order to indicate progress of the theory; Sheth, Gardner and Garret in the book of Marketing Theory Evolution and Evaluation compiled all schools of marketingRead MoreHow to Write Good Essey1042 Words à |à 5 Pagesvarious types of essay, comprising example, comparison and contrast, cause and effect relation, classification, and process analysis for descriptive and expository types of essay. Contents The knowledge and skills offered to the students would cover the components and organization of an essay, including using examples, details, casual analysis, comparison and contrast, cause and effect, classification and process analysis. Besides skill in writing, the students are also expected to learn to judgeRead MoreAdditionally, In His Book ââ¬Å"Distinction,â⬠Bourdieu Discusses1321 Words à |à 6 PagesAdditionally, in his book ââ¬Å"Distinction,â⬠Bourdieu discusses cultural capital and the way people use classes of classifications while classifying one another. As habitus, fields and cultural capital develop distinct of different class factions within social spaces, of the ââ¬Å"sacredâ⬠sphere of culture that legitimates social order. Therefore, people undoubtedly know their place within society as well quickly identify other individuals who are within their class are other factions of society that areRead MoreDifferent Types of Change Management Models844 Words à |à 3 Pagessynthesis different types of change/models of change were introduced. Many change management models are adapted from natural science models such as chaos theory or the behavior of living organisms to nature (Dooley, 1997). The application of these theories will be used as a Meta theory for better understanding change management behavior in theory and practice. Therefore change management models have evolved over the last decades. In addition, change models can be used for changing a strategy (Gioia
Wednesday, May 6, 2020
The Underdogs By Mariano Azuela - 1416 Words
The Underdogs by Mariano Azuela is arguably the most important novel of the Mexican Revolution because of how it profoundly captures the atmosphere and intricacies of the occasion. Although the immediate subject of the novel is Demetrio Macias - a peasant supporter of the Mexican Revolution -, one of its extensive themes is the ambivalence surrounding the revolution in reality as seen from a broader perspective. Although often poetically revered as a ââ¬Ëbeautifulââ¬â¢ revolution, scenes throughout the novel paint the lack of overall benevolence even among the protagonist revolutionaries during the tumultuous days of the revolution. This paper will analyze certain brash characteristics of the venerated revolution as represented by Azuelaââ¬â¢sâ⬠¦show more contentâ⬠¦Macias is clearly not interested in the comforts of material riches and physical safety as Cervantes is. While Cervantes later decides to escape abroad, Demetrio, pursuing his own interest in proving himse lf as an intrepid man and warrior, decides to continue to fight for the revolution despite knowing that there appears to be no end in sight and at the same time sensing the initial purpose of the revolution slowly turning vague. Cervantes, on the other hand, has a different perception of the revolution - which seems nobler and greater - until we learn about its shortcomings on a practical level. He pointed out that the revolution, which was bound to win, was meaningless if Mexico is going to fall again in the cluthces of [its] eternal opressors, excecutioners, and caciques. Cervantes believes that he and Demetrio and his men are the tools Destiny makes use of to reclaim the sacred rights of the people, and that they should be fighting against tyranny itself for principles and ideals. On a rhetorical level this view seems sound and virtuous. However, the foreboding dark consequences remain discernible. Rhetoric plays a crucial role in moldingShow MoreRelatedThe Underdogs By Mariano Azuela1302 Words à |à 6 Pagesup and leaving their families for reasons they do not fully comprehend. It is the women, however, in the novel The Underdogs, by Mariano Azuela, that understand this all too well. In The Underdogs, the author depicts Northern Mexican villages overrun by the Mexican Revolution sending impromptu soldiers to fight the war, leaving few citizens left behind with essentially nothing. Azuela paints a picture of the tremendous pressure put on the citizens of Northern Mexico during the Revolution and we seeRead MoreEssay on The Underdogs by Mariano Azuela958 Words à |à 4 PagesAuthor Mariano Azuelas novel of the Mexican revolution, The Underdogs, conveys a fictional representation of the revolution and the effects it had on the Mexican men and women who lived during that time. The revolutionary rebels were composed of different men grouped together to form small militias again st the Federalists, in turn sending them on journeys to various towns, for long periods of time. Intense fighting claimed the lives of many, leaving women and children behind to fend for themselvesRead MoreEssay about Analysis of The Underdogs by Mariano Azuela822 Words à |à 4 PagesAnalysis of The Underdogs by Mariano Azuela In The Underdogs written by Mariano Azuela, we are introduced to a character that strongly symbolizes the fuel of the Mexican Revolution. Heroes like Demetrio Macias brought the Serranoââ¬â¢s hope of giving them what they felt they truly deserved. Although Demetrio Macias, the general (colonel) of a rebel army is hunting down the army of Pancho Villa, he seems to have the same ideals as the enemy. In addition to Demetrio Macias, we meet women like CamillaRead MoreThe Underdogs by Mariano Azuela as a Reflection of the Mexican Revolution2158 Words à |à 9 PagesThe Underdogs by Mariano Azuela as a Reflection of the Mexican Revolution In 1910, the first social upheaval of the 20th century was unleashed in Mexico. Known as the Mexican Revolution, its historical importance and impact inspired an abundance of internationally renowned South American authors. Mariano Azuela is one of these, whose novel, The Underdogs is often described as a classic of modern Hispanic literature. Having served as a doctor under Pancho Villa, a revolutionary leader of theRead MoreThe Underdogs Is The Most Important Novel Written By Mariano Azuela868 Words à |à 4 PagesThe underdogs is the most important novel written by Mariano Azuela which is deeply linked to the historical context of how the Mexican Revolution was established, especially in the northern states of Mexico. The Mexican Revolution it was intended to ensure a fairer way of life of the agricultural classes. However, it was harsh, brutal, and bloody complex conflict for the whole country, in which federalism and rebels have been fighting tirelessly for a cause they both be lieved to be flawless. AzuelaRead MoreTheu.s. Mariano Azuela s The Underdogs ( Los De Abajo )1320 Words à |à 6 Pagesthat were finally implemented was not worth the senseless violence that wracked Mexico. Mariano Azuela, in his novel The Underdogs (Los de abajo), examines this notable problem of the Mexican Revolution through the narrative of a band of rebel soldiers. Their leader is a poor, illiterate, Indian Demetrio Marcà as, with his trusted aide the educated, city-boy, journalist Luis Cervantes. As displayed in The Underdogs, the disillusionment with the revolution resulted from the lack of a clear purpose forRead MoreMariano Azuelas the Underdogs1512 Words à |à 7 PagesMariano Azuelaââ¬â¢s The Underdogs, is about a brotherhood of the Mexican people taking a journey with only one thing on their mind; revenge against Huerta and the Federales. In this story, we as the reader are confronted with characters, such as Demetrio Macias, who is destined to lead his people int o the depths of retaining an incorrupt lifestyle and hopes to find peace from the effect of war. Although Demetrio is seen as one of the main characters in the novel, we are also briefly engaged in the otherRead MoreA Reflection Of The Mexican Revolution1713 Words à |à 7 PagesA Reflection of the Mexican Revolution ââ¬Å"ââ¬â¢I love the revolution like a volcano in eruption; I love the volcano because itââ¬â¢s a volcano; the revolution because itââ¬â¢s the revolution!ââ¬â¢Ã¢â¬ cries a revolutionary soldier in Azuelaââ¬â¢s The Underdogs (159). The Mexican Revolution of 1910 was aimed to overthrow the dictatorship of the Mexican government, which was in constant turmoil as presidents were constantly toppled from power. Porfirio Diaz, the president at the time the uprising began, was removed fromRead MoreThe Underdogs Essay837 Words à |à 4 PagesHIST 342 The Underdogs Second Examination (Part I) Mariano Azuelas The Underdogs tells the story of a dauntless Indian farmer who almost unintentionally rises to a generalship in Pancho Villas rebel army during the Mexican Revolution of 1910. Though the events that occur throughout the book are not actual events that took place during the revolution, Azuela is able to paint a very realistic picture of the revolution and leaves a bitter taste in the mouth of the reader as one witnesses theRead MoreWomen of The Underdogs We were asked to write a 7-8 page paper on Mariano Azuelas The Underdogs, and how women were portrayed in it, as well as whether or not we felt the portrayal was accurate.2391 Words à |à 10 PagesWomen of The Underdogs Mariano Azuelas novel, The Underdogs, is a male-dominated novel. The story of the exploits and wartime adventures of a rebel band during the Mexican Revolution is primarily driven by men; the majority of the characters are men who are separated from their families and lives and who are fighting for a cause in which they strongly believe (at least at the beginning of the novel). Despite the masculine story, however, there are two highly developed and significant female characters
Tuesday, May 5, 2020
Ethics and Counselor Essay Example For Students
Ethics and Counselor Essay Case Vignette1: Jessica Jessica is sixteen years old, and is sent to the school counselor following concerns from her year level coordinator. Jessica is finding it difficult to concentrate in class, is continuously late to school, and often arrives to school disheveled and unkempt. The coordinator is concerned about what may be happening at home with Jessica, and that she may be getting involved in a notoriously bad circle of friends in the area known for drug taking and other delinquent activities. Although reluctant during the first few sessions to disclose anything much, Jessica begins to trust the counselor and opens up about her frequent drug use. She says she used to only smoke marijuana, but that now this had increased to weekly party hits of Cocaine and speed. She tells the counselor that the effects of these drugs is beginning to diminish and that she feels like she has to try something harder like heroin, to gain the same effect. That week the counselor receives a call from Jessicaââ¬â¢s parents wanting to know what is going on with their daughter. What should she do? Ethical standard involved: The issue here is of sharing confidential information divulged by a minor during therapy with the parents. The following points from the Singapore Association for Counselling, Australian Counselling Association and American Counseling Association pertain to this issue: Singapore Association for Counselling (SAC)ââ¬â¢s Code of Ethics: Section B point number 3, which states ââ¬ËMembers discuss with clients as early as feasible in the therapeutic relationship appropriate issues such as the nature and anticipated course of counseling, fees and confidentialityââ¬â¢. Australian Counselling Association (ACA)ââ¬â¢s Code of Conduct: Code of Ethics section, point number five which states, ââ¬Ëas members of the ACA we will: offer a promise of confidentiality and explain the limits of duty of careââ¬â¢. Also the following points in the Code of Practice section: 2. 1 Issues of Responsibility 2. 1. 6. 1 Counsellors must take all reasonable steps to be aware of current law as it applies to their counselling practice. 2. 3 Confidentiality 2. 3. 4 Exceptional Circumstances 2. 3. 4. Any disclosure of confidential information should be restricted to relevant information, conveyed only to appropriate people and for appropriate reasons likely to alleviate the exceptional circumstances. The ethical considerations include achieving a balance between acting in the best interests of the client and the counsellorââ¬â¢s responsibilities to the wider community. 2. 3. 4. 3 Counsellors hold different views about the grounds for breaking confidentiality, such as potential self-harm, suicide, and harm to others. Counsellors must consider their own views, as they will affect their practice and communicate them to clients and significant others e. g. supervisor, agency. American Counseling Association (ACA)ââ¬â¢s Code of Ethics: Section A: The Counseling relationship A. 1 Welfare of Those Served by Counselors A. 1. d. Support Network Involvement Counselors recognize that support networks hold various meanings in the lives of clients and consider enlisting the support, understanding, and involvement of others (for e. g. , religious/ spiritual/ community leaders, family members, and friends) as positive resources, when appropriate, with client consent. A. 2. Informed Consent in the Counseling Relationship A. 2. d. Inability to Give Consent When counseling minors or persons unable to give voluntary consent, counselors seek the assent of clients to services and include them in decision making as appropriate. Counselors recognize the need to balance the ethical rights of clients to make choices, their capacity to give consent or assent to receive services, and parental or familial legal rights and responsibilities to protect these clients and make decisions on their behalf. Section B: Confidentiality, Privileged Communication and Privacy B. . Clients Lacking Capacity to Give Informed Consent B. 5. b. Responsibility to Parents and Legal Guardians Counselors inform parents and legal guardians about the role of counselors and the confidential nature of the counseling relationship. Counselors are sensitive to the cultural diversity of families and respect the inherent rights and responsibilities of parents/ guardians over the welfare of t heir children/ charges according to law. Counsellors work to establish, as appropriate, collaborative relationships with parents/ guardians to best serve clients. Ethical trap possibilities: There being not enough information about the counselor in the case, to ascertain the possibility of a values or objectivity trap. Circumstantiality: Jessica is a minor but she is 16, which is a bit of a grey area between being a child and adult and depending on Jessicaââ¬â¢s psychological development, the counsellor may fall into a Circumstantiality trap and procrastinate about informing her parents. Preliminary response: Jessica is a minor and her parents are stake holders in her well-being. Drug abuse is a major clinical and life issue and her parents deserve to be informed. Having said that, the counselor should discuss it with Jessica first and sensitively deal with her inevitable resistance. The counselor should inform her of her duty to take the parents into confidence and draw her attention to the limits of confidentiality and also the informed consent process that she must have gone through at the beginning of the therapy. How to deal with this disclosure depends on her own state of mind and her family situation. Does she recognize that she has a problem and is she looking for a way to come out of it? Or is she unapologetic about her drug abuse and wants to keep going down that path? Then the counselor should try to understand by discussing with Jessica how she thinks her parents will react. Her family background could be complicated. In that event the counselorââ¬â¢s accurate judgment of the level of support the parent/s can offer is vital to the disclosure process. If the parents are up to their necks with their own problems relationship or work issues etc. t is very likely they wonââ¬â¢t be in a position to offer much support and on the contrary may even resent her for adding to their list of problems. In such a scenario the counselor can either recommend family therapy if she thinks it will help Jessica and her family come to terms with her drug abuse and any other issues they may be facing. If however, the counselor either from Jessicaââ¬â¢s account or from an actual meeting fee ls that Jessicaââ¬â¢s family will not be able to offer the needed support then they will have to explore other ossibilities like support networks for drug abusers etc If on the other hand, Jessicaââ¬â¢s family comes across as supportive and wanting to be with her as she tries to come out of the drug habit, the counselor can then make the most of their involvement and seek their help and understanding and complementing Jessicaââ¬â¢s therapy. Ideally Jessica informing them herself would be the best option. The counselor can offer her office as a neutral venue for them to meet and discuss, can also offer to be there to facilitate the conversation. As a last resort if Jessica cannot bring herself to tell her parents, the counsellor can offer to do it for her. There is also the legal aspect to be considered. Drug abuse is a serious offence in Singapore, however there is no mandatory reporting per se and it really depends on the counsellor whether and at what stage she wants to involve the police or Ministry of Community Development, Youth and Sports (MCYS). She could choose to delay that decision and explore how Jessica benefits from the therapy before she reports. Roman Architecture EssayC. 2. g. Impairment Counselors are alert to the signs of impairment from their own physical, mental, or emotional problems and refrain from offering or providing professional services when such impairment is likely to harm a client or others. They seek assistance for problems that reach the level of professional impairment and, if necessary, they limit, suspend, or terminate their professional responsibilities until such time it is determined that they may safely resume their work. Counselors assist colleagues or supervisors in recognizing their own professional impairment and provide consultation and assistance when warranted with colleagues or supervisors showing signs of impairment and intervene as appropriate to prevent imminent harm to clients. Section D: Relationships with Other Professionals D. 1 Relationships with Colleagues, Employers, and Employees D. 1. h Negative conditions Counselors alert their employers of inappropriate policies and practices. They attempt to effect changes in such policies or procedures through constructive action within the organization. When such policies are potentially disruptive or damaging to clients or may limit the effectiveness of services provided and change cannot be affected, counselors take appropriate further action. Such action may include referral to appropriate certification, accreditation, or state licensure organizations, or voluntary termination of employment. Section H: Resolving Ethical Issues H. 1. Standards and the Law H. 1. a. Knowledge Counselors understand the ACA Code of Ethics and other applicable ethics codes from other professional organizations or from certification and licensure bodies of which they are members. Lack of knowledge or misunderstanding of an ethical responsibility is not a defense against a charge of unethical conduct. H. 2. Suspected Violations H. 2. a. Ethical Behavior Expected Counselors expect colleagues to adhere to the ACA Code of Ethics. When counselors posses knowledge that raises doubt as to whether another counselor is acting in an ethical manner, they take appropriate action. H. 2. b. Informal Resolution When counselors have reason to believe that another counselor is violating or has violated an ethical standard, they attempt first to resolve the issue informally with the other counselor if feasible, provided such action does not violate confidentiality rights that may be involved. H. 2. c. Reporting Ethical Violations If an apparent violation had substantially harmed or is likely to substantially harm a person or organization and is not appropriate for informal resolution or is not resolved properly, counselors take further action appropriate to the situation. Such action might include referral to state or national committees on professional ethics, voluntary national certification bodies, state licensing boards, or to the appropriate institutional authorities. This standard does not apply when an intervention would violate confidentiality rights or when counselors have been retained to review the work of another counselor whose professional conduct is in question. Ethical Trap Possibilities: This is a Values trap if Alex is influencing his clients and urging them to adopt solutions that are consistent with his values without regard to their value system. Preliminary Response: Alex has very strong values in the areas of contraception and abortion and based on the information in the case study, makes no secret about it. He is also trying to propagate his views by talking to other staff members about the need to save lives and oppose abortion. Therefore it appears that he is not the ideal therapist for single female clients with issues relating to family planning because of his ââ¬Ëcontraception is sinful and abortion is murderââ¬â¢ views. Also he might have a conflict of interest between being a therapist and the President of the local right to life organization. Although there is no clear information on whether he is indeed imposing his values during therapy on clients; as a colleague I should be concerned on various points: Is he respecting the clientââ¬â¢s autonomy and right to self-determination? Is he abusing the power of the counselorââ¬â¢s position? How would he deal with a single female client who is in a sexual relationship? Would he ââ¬Ëadviseââ¬â¢ her against contraception? Or with a client that is pregnant and does not want the pregnancy? Would he try to convince her that ââ¬Ëabortion is murder? ââ¬â¢ Having observed Alexââ¬â¢s behavior and had concerns about how it is affecting his clients, it becomes a part of my ethical duty as a counselor to discuss the issue with Alex. How do I go about it? Taking a higher moral position or accusing him of unethical practice outright will alienate him and that will not serve my purpose. I should probably try to initiate an open discussion with him about whether he feels that his values conflict with his work specially when working with the kind of clients that frequent our agency and how he deals with it. Maybe I could involve another colleague to get a second opinion, but taking care not to create an unfavorable opinion about him in the agency or indulge in rumor mongering. Possible Consequences of adopting this response: When we have this discussion Alex may open up to me and share that he has been feeling the same way. It may be that his views are not actually as fanatical as they appear to be. If that is the case I should support him, in whatever ways he feels will be useful. I could also encourage him to seek supervision from senior counselors (if he has not already contemplated it) so that there is third party expert validation of his efficiency as a counselor and also of the fact that he has recognized that there is a problem and is trying to address it. On the other hand, he might be completely blind to his problem. In that case, I will have to sensitively draw his attention to how it appears to an observer that he has a serious conflict of values with his clients. Another option could be that after discussing with him I get the feeling that he is consciously abusing his position as a counselor and imposing his values and using his professional position to propagate his values. Something like that would probably call for more serious action like bringing indiscriminately unethical practice to the notice of the agency by initiating a complaint procedure. Ethical Resolution: I should definitely bring up the matter with Alex. Ignoring the issue would mean I am failing in my ethical duty. Depending on his reaction to our discussion, I should support him as he tries to deal with the issue by offering suggestions and feedback. I should encourage him to seek supervision. I should also try to get a second opinion and see if others feel the same way as me. If it turns out that Alex is either not ready to change or worse is abusing his power as a counselor to propagate his values, it is my ethical duty to report him to the agency. Last but not least if I then observe that the agency is turning a blind eye to Alexââ¬â¢s behavior in spite of drawing their attention to it I see his clientsââ¬â¢ welfare suffering as a result of his unethical practice, as an ethical counselor it behooves me to pursue the matter and further take it up with the regulating body. Which aspects of this dilemma do I anticipate would be the most challenging for me to deal with? Why? If I were Alexââ¬â¢s colleague in this situation, my pro-choice views would directly clash with his pro-life stance and I would be alert to this fact and leave it out during our discussions lest it becomes a personal issue between me and him.
Friday, April 10, 2020
Monitoring System free essay sample
Introduction Desmark Motor Monitoring System is a system made to help the retailer in recording the customers information in a fastest way and to make the process easier. Desmark Motor Monitoring System will tally each inputted information given from the customer and will show the list of all motorcylce products only. This system is just use when theres a client who wants to purchase an item and to view its record. The system is also used only by the retailer or the admin of Desmark Motor Monitoring System for better security. This study aims to develop a System for the said establishment. A Monitoring system is a method of monitoring the availability of the product and the client who purchased the product. It provides the client As Desmark continues to expand, it has evolved and continues to exert more effort to provide customers with life-building technology for their satisfaction. Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. We will write a custom essay sample on Monitoring System or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Experiments obtained by Desmark Monitoring System using complex road scenes are reported, which demonstrate the validity of the method in terms of robustness, accuracy, and time responses. 1. 2 Statement of the Problem Due to the absence of the Honda Desmark Motor Monitoring System the following problems were observed: Possibility of redundant files. Cataloging searching is time consuming. Prone to record losses. 1. 3 Objective of the Study The proponent aims to develop a Product Monitoring System. These are the following solutions in regards to the problems. Reduction of redundant records/information. To make the searching easy and fast. To lessen record losses. 1. 4 Scope and Delimitation of the Study This study will provide Desmark with a better way of managing the availability of the product. The information can be accessed only by an authorized personnel or staffs security issues are also addressed. And will focus on the motorcycle product and customer will not include payment transactions. 1. 5 Significance of the Study This study benefits the following: Client, With the help of this study, customer will be able to access this transaction anytime anywhere within the specific country where you registered only. And it may help also to make the work easier and faster. School, The study will help the address the upcoming concern regarding the common problems in monitoring system. CEIT Faculty Members. The study will help the teachers understand the benefits of a health monitoring system. Researchers, The study will help the researchers address the problem about monitoring system in an easier and convenient manner. It will also guide them and enhance their skills and capabilities in handling monitoring techniques. Future Researchers, The study will help and guide them in improving future researches in handling monitoring system prior to the demands of the client. Definition of Terms The following definitions are to clear up and focus on the term as they pertain to this study. Technology. The systematic scientific study of technique. The application of science to the solution of practical problems. Automation. The process of getting work performed without any human effort except that of instructing one or more machines what to do and when to do it. Entertainment. To engage a person or audience by providing amusing or interesting material. Monitoring system. Supervision of activities in progress system to ensure they are on-course and on-schedule in meeting the objectives and performance targets. Monitoring techniques. Mechanisms the team use to monitor changes. REFERENCES [1] Chestnutt, J. ; Carnegie Mellon Univ. , Pittsburgh ; Michel, P. ; Kuffner, J. ; Kanade, T. http://www. cuecent. com/includes/pdfs/IVMS_brochure. pdf [2] Honda, H. ; Aptina Japan, Tokyo, Japan ; Osawa, S. ; Shoda, M. http://www. google. com. ph/? gfe_rd=crei=y8sVU776KszA8gflt4GgBQ#q [3] Wako Res. Center, Honda RD Co. Ltd. , Saitama, Japan http://en. wikipedia. org/wiki/Honda [4] Hirose, M. ; Haikawa, Y. ; Takenaka, T. http://www. hondaph. com/about http://www. papercamp. com/group/scope-and-limitations-in-monitoring-system/page-270 Chapter 2 Review of Related Literature and Studies This chapter presents the overview of the related literature and the studies, which serve as the background information relevant to the problem of the studies. 2. 1 Related Literature 2. 2 Related Studies Youve probably seen your chart at your doctors office. In fact, you may have charts at several doctors offices. If youve been in the hospital, you have a chart there, too. These charts are your medical records. They may be on paper or electronic. To keep track of all this information, its a good idea to keep your own personal health record. What kind of information would you put in a personal health record? You could start with Your name, birth date, blood type, and emergency contact information Date of last physical Dates and results of tests and screenings Major illnesses and surgeries, with dates A list of your medicines and supplements, the dosages, and how long youve taken them Any allergies Any chronic diseases Any history of illnesses in your family CHAPTER 3 RESEARCH METHODOLOGY This chapter explains the different phases that are used to carry out fully in developing the system. Such phases are the analysis modelling, system design, system requirements and Gantt chart. 3. 1 Analysis Modelling In Analysis Modelling stages gives out the details on the context diagram which show the flow of developing the Monitoring system. Context Diagram The context diagram contains the process that generalizes the function of the entire system in relationship to external entities. 3. 2 System Design On this stage, the researcher gives details on the development of the ââ¬Å"Honda Desmark Motor Monitoring Systemâ⬠, and how its been design. The latterââ¬â¢s used various diagram that illustrate the flow and the different application of the system. Data Flow Diagram The Data Flow Diagram shows the main processes within the ââ¬Å"Honda Desmark Motor Monitoring System. â⬠Entity Relationship Diagram The entity relationship diagram enables the project team to identify data objects and their relationship using a graphical notation. During the making of analysis model, the project team initially an Entity Relationship Diagram for the Monitoring System. Gantt Chart 3. 3 Data Dictionary The data dictionary contains the field name, domain, with the parameters of attributes,constraints and the description of attributes. Table login Name Domain Constraints Description username String Not null Admin Username Password String Not null Admin Password Table Register Name Domain Constraints Description Username String Null Employee Username Password String Null Employee Password Confirm Password String Null Employee Confirm Password Gender String Null Employee Gender First Name String Null Employee First Name Last Name String Null Employee Last Name Address String Null Employee Address Employee Number String Null Employee Number Contact Number String Null Employee Number Employee Account Name Domain Constraints Description First Name String Null Employee First Name Last Name String Null Employee Last Name Employee Number Integer Null Employee Employee Number Contact Number String Null Employee Contact Number Gender String Null Employee Gender Customer Account Name Domain Constraints Description First Name String Null Customersââ¬â¢ First Name Last Name String Null Customersââ¬â¢ Last Name Motor Brand String Null Customersââ¬â¢ Motor Brand Motor Number Integer Null Customersââ¬â¢ Motor Number Gender String Null Customersââ¬â¢ Gender Customer Number Integer Null Customersââ¬â¢ Number Address String Null Customersââ¬â¢ Address Home Number Integer Null Customersââ¬â¢ Home Number Phone Number Integer Null Customersââ¬â¢ Phone Number Stock Monitoring Name Domain Constraints Description Model Name String Not Null Brand Model Name Model Number Integer Not Null Brand Model Number Quality String Not Null Brand Quality Price Interger Not Null Brand Price Availability String Not Null Brand Availability Credit App 1 Name Domain Constraints Description First Name String Null Credit App_ First Name Last Name String Null Credit App_ Last Name Middle Name String Null Credit App_ Middle Name Sex String Null Credit App_ Sex Citizenship String Null Credit App_ Citizenship Birthday String Null Credit App_ Birthday Civil Status String Null Credit App_ Civil Status Tin String Null Credit App_ Tin Date Issued Date Null Credit App_ Date Issued Place Issued String Null Credit App_ Place Issued Address String Null Credit App_ Address Length of Stay String Null Credit App_ Length of Stay Home Phone Number Integer Null Credit App_ HomePhone Number Office Phone Number Integer Null Credit App_ OfficePhone Number Mobile Phone Number Integer Null CreditApp_ MobilePhone Number Email Address String Null Credit App_ Email Address Name of Spouse String Null Credit App_ Name of Spouse Age Interger Null Credit App_ Age Credit App 2 Name Domain Constraints Description Name String Null Credit App_ Name Home Address String Null Credit App_ Home Address Residence String Not Null Credit App_ Residence Civil Status String Not Null Credit App_ Civil Status Sex String Not Null Credit App_ Sex Home Phone Number Integer Null Credit App_ Relation w/ Applicant String Null Credit App_ Relation w/ Applicant Birthday String Null Credit App_ Birthday Tin String Null Credit App_ Tin Mobile Phone Number Interger Null Credit App_MobilePhone Number Present Employer String Null Credit App_ Present Employer Date Hired String Null Credit App_ Date Hired Position String Null Credit App_ Position Employerââ¬â¢s Address String Null Credit App_ Employerââ¬â¢s Address Employment Status String Not Null Credit App_ Employment Status Credit App 3 Name Domain Constraints Description Brand String Not Null Credit App_ Brand Model String Null Credit App_ Model Color String Null Credit App_ Color LCP String Null Credit App_ LCP Downpayment Interger Null Credit App_ Downpayment 1 Month String Null Credit App_ 1 Month 3 Months String Null Credit App_ 3 Months 6 Months String Null Credit App_6 Months 12 Months String Null Credit App_ 12 Months 18 months String Null Credit App_18 months 24 Months String Null Credit App_24 Months 30 Motnhs String Null Credit App_ 30 Motnhs Remarks String Null Credit App_ Remarks Approve String Null Credit App_ Approve Approve w/ Condition String Null Credit App_ Approve w/ Condition Disapproved String Null Credit App_ Disapproved 3. 4 System Requirements This show the various hardware and software requirements. Hardware Requirements Some possible hardware components to be used for the developing the system Laptop Rating 2. 9 Windows Experience Index Processor:Intel(R)Atom(TM)CPU N550 @1. 50GHz RAM: 1:00GB System Type: 32-bit operating system Optical Mouse Software Requirements The following are the software requirements to be used in the study: Programming Language: MS Visual Basic 6. 0 Database: My SQL Microsoft Word Microsoft Access Monitoring system free essay sample ABSTRACT Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. RFID technology which is a matured technology that has been widely deployed by various organizations as part of their automation systems. In this study, an RFID based system has been built in order to produce a time-attendance management system. This system consists of two main parts which include: the hardware and the software. The hardware consists of the motor unit and the RFID reader. The RFID reader, which is a low-frequency reader (125 kHz), is connected to the host computer via a serial to USB converter cable. The Time-Attendance System GUI was developed using visual basic. Net. The Time-Attendance Management System provides the functionalities of the overall system such as displaying live ID tags transactions, registering ID, deleting ID, recording attendance and other minor functions. We will write a custom essay sample on Monitoring system or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This interface was installed in the host computer. Keywords: Radio-frequency identification, RFID technology, radio waves INTRODUCTION Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. RFID chips contain a radio transmitter that emits a coded identification number when queried by a reader device. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags. This small type is incorporated in consumer products, and even implanted in pets, for identification. The tags information is stored electronically. The RFID tag includes a small RF transmitter which transmits an encoded radio signal to interrogate the tag, and receiver which receives the message and responds with its identification information. Some RFID tags do not use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source. The RFID system design includes a method of discriminating several tags that might be within the range of the RFID reader. RFID can be used in many applications. A tag can be affixed to any object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has used RFID to reduce counting, looking for things and auditing items. Many financial institutions use RFID to track key assets and automate compliance. Also with recent advances in social media RFID is being used to tie the physical world Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 168 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 with the virtual world. RFID in Social Media first came to light in 2010 with Facebooks annual conference. RFID is a superior and more efficient way of identifying objects than manual system or use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags (those without a battery) can be read if passed within close enough proximity to an RFID reader. It is not necessary to show the tag to the reader device, as with a bar code. In other words it does not require line of sight to see an RFID tag, the tag can be read inside a case, carton, box or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can only be read one at a time. Radio frequency identification (RFID) is a matured technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal, or person. They are grouped under the automatic identification (Auto-ID) technologies. RFID tags are not an improved bar code as the proponents of the technology would like you to believe. An RFID system consists of three components which include: an antenna, a transceiver and a transponder (the tag). The antenna and the transceiver are often incorporated into one reader. The antenna uses radio frequency waves to transmit a signal that activates the transponder. When activated, the tag transmits data back to the antenna. The RFID can read the tag using Radio Frequency, meaning that the RFID reader can be read from a distance, right through your clothes, wallet, bags etc. An RFID tag consists of unique ID for each tag. The RFID technology has been in existence since the early 1920s. This technology has been used in libraries, museums, race timing, toll collection and contactless payment, tracking of persons and animals etc. The RFID attendance system is an automatic embedded system used in taking attendance of registered persons in a particular organization. The RFID attendance system offers an organization, the efficiency and convenience associated with RFID technology at a low cost. This method is fast as well as simple. Each employee uses an RFID card and the reader records the data when the employee enters or exits. RFID devices and software must be supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). Nowadays, there are lots of companies around the world and some of them consist of workers up to 10 thousand or more. To handle a large number of workers may be a problem especially to get the attendance of the workers. The manual process means that whenever a worker comes to work, he goes to sign at the time officerââ¬â¢s table. This manual process has some flaws because in a case where a worker bribes the time officer or is familiar with him, the time officer may tamper with the attendance records. This would be a big problem in the company and might affect the productivity and management of the company. The suitable solution for this problem is by designing a system that will record attendance automatically. In this project, RFID system is used to record the numbers of employeesââ¬â¢ attendance automatically. The ID cards of the employees is embedded with RFID tag which is read by a reader. This RFID system is interfaced to a database through a computer. This method is more effective to prevent problem encountered when getting attendance manually. Below is the block diagram of an RFID attendance system. Related Works The use of Radio-frequency identification (RFID) technology in automated electronic environment and for tracking objects has been widely researched upon by researchers and deployed by various organizations as part of their automation systems. References [21] and [7] provide examples of a real RFID contact less data link deployments that utilize RFID technology for object tracking and automated data collection solution. RFID is a technology that uses radio waves to transfer data from Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 169 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object In 1945, Leon Theremin invented an espionage tool (for spy activities) for the Soviet Union which retransmitted incident radio waves with audio frequency information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency even though this device was covert listening device, not an identification device or tag, it is considered to be a predecessor of radio frequency identification (RFID) technology because it was likewise passive, being energized and activated by waves from an outside source. Similar technologies such as the IFF (identification friend and foe) transponder developed in the United Kingdom, was routinely used by the allies in the World War 2 to identify aircrafts as friend or foe. Transponders are still used by most powered aircrafts to this day. Mario . W. Cardullo was the first to have received the United States patent for an active RFID tag with re-writable memory on January 23, 1973 [4]. In that same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder used to unlock a door without a key. A card with an embedded transponder communicates a reader near a door, when the reader detects a valid identification number stored within the tag, the reader unlocks the door. Walton licensed the technology to Schalge lock of San Francisco, a lock maker and other companies [1]. Time and attendance systems are a major part of todayââ¬â¢s human resource systems, take organization towards better human resource practice, systems and excellence. The implementation of time and attendance system has a lot of advantages for the manager. The kind of system that is implemented depends upon what the organization is trying to achieve by implementing the system. There are different types of automatic attendance systems; each type of system is suited to different needs and requirements [9]. Some of the most common types include; biometric attendance system, magnetic stripe attendance system, barcode attendance system, and RFID attendance system. Barcode Attendance System The barcode system is a common type of time and attendance system through which the efficiency of measuring and tracking employeesââ¬â¢ time could be increased to a great degree. With the automation through barcode technology, the errors previously made in the manual payroll or attendances are eliminated. As a result, the system provides high levels of accuracy and reliability in tracking of employee attendance. In addition, the costs associated with the installation of the system are not too much relative to the cost of payroll or attendance errors. The implementation of the barcode system is easy. Every employee is issued a badge/card in which there is a barcode. In order to check into or out of the company, the badge/card is swapped on the time clock, and the data is captured by the clock. This data from the clock can be downloaded by the manager or the administrator and then used for updating and maintaining time and attendance records. The Universal Product Code (UPC) is a unique 12-digit number assigned to retail merchandise that identifies a product and the vendor. The Universal Product Code (UPC) on a product typically appears adjacent to its barcode, the machine-readable representation of the Universal Product Code (UPC). The UPC for a particular product is always the same. The first six digits is the vendor unique identification number. All the products that the vendor sells will have the same first six digits in their UPCs. The next five digits identify the product. The last digit is called the check digit. This is used to verify that the UPC for that specific product is correct. Each time that UPC is read, typically by a scanner reading the barcode, a calculation is done. And, if the check digit is different compared from the one that is calculated, then the computer knows that there is something wrong with the UPC. Figure 1 is a pictorial diagram of a barcode with its universal product code (UPC) [11]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 170 ISSN-L: 2223-9553 ISSN: 2223-9944 9553, Academic Research International Vol. 2, No. 2, March 2012 Fig. 1 picture of a barcode Biometric Attendance System This is the study of measurable biological characteristics. In computer security, biometrics refers to authentication techniques that rely on measurable physical characteristics that can be automatically checked. There are several types of biometric identification schemes which include:-face fingerprints, ecked. include: face retina, hand geometry, vein, voice etc. The computer uses any of these biometric identification schemes to determine who you are, and based your identity authorize your different levels of access authorize [12]. Under this system, there is time and attendance software that is paired with a time clock for employees which uses biometric technology for authentication purposes. When these systems are in use, the employees can use their finger prints for clocking in and clocking out. This method has the great benefit that the entire process is easy as well as quick. Other advantages include elimination of the cost previously incurred in getting the employees cards. In the other systems that uses card other (magnetic stripe and barcode systems), there is an ongoing expense associated with the damage, misplacement and stealing of cards and the continuous need for their restoration and maintenance. Magnetic Stripe Attendance System In the magnetic stripe attendance system, data is encoded in the magnetic stripe of the employee card. When the card, is swiped through the employee time clock, the information in the cardââ¬â¢s magnetic stripe is recorded by the time clock. This system also reads one card at a time and also requires contact reads with the reader. Figure 2 is a pictorial diagram of a card embedded with magnetic strip. Fig. 2 picture of a magnetic stripe card Radio Frequency Identification (RFID) A radio-frequency identification system comprises hardware shown in figure 3a 3b, known as frequency interrogators or readers and tags, also known as labels, as well as RFID software or RFID tags , middleware. RFID tags are of two major types, which include Active Tag and Passive Tag. and Fig. 3a RFID tag Copyright à © 2012 SAVAP International www. savap. org. pk Fig. 3b RFID card and reader www. journals. savap. org. pk 171 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 RFID tags can be either passive, active or battery assisted passive. Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts or beacons its signal. A battery assisted passive has a small battery on board that is activated when in the presence of a RFID reader. Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal. Depending on mobility, RFID readers are classified into two different types: fixed RFID and mobile RFID. If the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a bubble of RF energy that can be tightly controlled if the physics is well engineered. This allows a very definitive reading area for when tags go in and out of the interrogation zone. On the other hand, if the reader is mobile when the reader reads tags, it is called mobile RFID. An Electrical Engineering student of the University of Malaysia; Mohd Firdaus Bin Mahyidin designed RFID technology studentsââ¬â¢ attendance system 2008 [10], which only takes attendance of students and stores the information in the database. The block diagram of his project is shown figure 4. However, this system does not the incorporate a door unit which allows access to only registered users. Fig. 4: RFID Technology Students attendance system. Comparing Barcode with RFID is done on table 1. Table 1: comparisons between Barcode and RFID 1 2 3 4 5 6 7 Barcode Rely on the user to make contact to the reader, hence cannot be read from a distance In Barcode, only one card read at a time is allowed. Embedded information cannot be updated, hence the restriction of the repeated overwriting if the embedded election information for each card It does not allow for the increase technologies like surveillance cameras to be activated with an employee being in the vicinity. RFID Do not require contact with reader, hence can be read from a distance. Multiple read at a time is permitted Embedded information can be updated; this allows the repeated over-writing if embedded electronic information for each card. RFID has increased technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. It is slower and requires time of sight to RFID is faster and does not require line of function. sight. It has lower data storage transponder. It has higher data storage. This transponder is bogus, and cannot be The transponder is miniaturized, and can be incorporated in small items. incorporate in other items. For example in 2009 researchers successfully glued RFID micro-transponder to live ants [1] Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 172 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Radio Frequency Identification (RFID) Attendance System RFID READER GRAPHICAL USER INTERFACE (GUI) DATABASE MICROCONTROLL COMPUTER ER DOOR UNIT POWER SUPPLY UNIT Fig. 5 Block diagram of an RFID attendance system with door unit The RFID attendance system offers the organization, the efficiency and convenience associated with RFID technology at a low cost. Each employee uses an RFID card and the reader records the data when the employee enters or exits. Operations RFID devices and software are supported by a sophisticated software architecture that enables the collection and distribution of location based information in near real time. A complete picture of the RFID attendance system combines the RFID Tags and readers with access to global standardized database, ensuring real time access to up-to-date information on the card. The card contains a unique identification number called an electronic product code (EPC). The RFID tag can be read from a distance and the embedded electronic information for each card can be over written repeatedly. This increases technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. The RFID attendance system is faster, and does not require line of sight. The RFID system has higher data storage. In the RFID systems, the transponders are also easy to conceal or incorporate in other items. For example in 2009, researchers successfully glued RFID micro transponder to live ants in order to study their behavior [1]. Furthermore, multiple RFID cards can be read all at the same time. Information about the employeesââ¬â¢ access and attendance can be stored on the database. RFID Frequency band Frequency refers to the size of the radio waves used to communicate between the RFID systemââ¬â¢s components. It can be assumed that higher frequency resulting faster data transfer rate and longer reading distance. However as frequency increases, the sensitivity to environmental factor also increases. RFID system currently operates at Low Frequency, High Frequency and Ultra High Frequency. Generally a lower frequency means a lower read range and slower data read rate, but increased capabilities for reading near or on metal or liquid surfaces. The frequency chart is shown in table 2 [18]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 173 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Table 2: RFID Frequency Table Frequency band Description Operating range Application benefits Drawbacks Access control, animal tracking point of sale application, product authentication, vehicle immobilizer etc Smartcards library books, airline baggage etc Works well around water and metal products Short range slower rate Low cost of tag High read rate when compared to low frequency 125KHz to 134KHz Low frequency Less 0. 5m to 1. 5ft than read and read 13. 56M Hz High frequency Less 1m to 3ft than 860MHz To 930MHz Ultra high frequency (UHF) 3m to 9ft Parking lot access, electronic toll collection etc EPC standard built around this frequency Does not work well with high water or metal content 2. 4GHz microwave 1m to 3ft Airline baggage, electronic toll collection Most expensive Fastest rate read Miniaturization RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro-transponders to live ants in order to study their behavior [6]. This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances. Hitachi holds the record for the smallest RFID chip, at 0. 05mm x 0. 05mm. This is 1/64th the size of the previous record holder, the mu-chips. Manufacture is enabled by using the silicon-on-insulator (SOI) process. These dust-sized chips can store 38-digit numbers using 128-bits read only memory (ROM) [7]. A major challenge is the attachment of the antennas, thus limiting read range to only millimeters. The Radio Frequency Identification (RFID) Application Areas In 2010 three key factors drove a significant increase in RFID usage. They include; decreased cost of equipment and tags, increased performance to a reliability of 99. 9% and a stable international standard around UHF passive tag. The areas of significant use are financial services for Information Technology asset tracking and healthcare with more than 60% of the top medical device companies using passive UHF RFID in 2010. RFID is becoming increasingly prevalent as the price of the technology decreases [7]. Therefore, the current uses include: Electronic Vehicle Registration With security of cars being a major concern in many countries, RFID technology is being leveraged by government for Vehicle Registration [21] [13]. This helps detect stolen cars and in their retrieval [14] [18]. Payment by Mobile Phones Since summer 2009, two credit card companies have been working with Dallas, Texas-based Device Fidelity to develop specialized microSD cards. When inserted into a mobile phone, the microSD card can be both a passive tag and an RFID reader [19]. After inserting the microSD, a users phone can be linked to bank accounts and used in mobile payment. Diaryqueen in conjunction with Vivotech has Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 174 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 also begun using RFIDs on mobile phones as part of their new loyalty and rewards program. Patrons can ask to receive an RFID tag to place on their phone. After activation, the phone can receive promotions and coupons, which can be read by Vivotechs devices [16]. Similarly,Nokias 2008 device, the 6212, also has RFID capabilities. Credit card information can be stored, and bank accounts can be directly accessed using the enabled handset. The phone, if used as a vector for mobile payment, has added security in that users would be required to enter a passcode or PIN before payment is authorized [16]. Transportation Payments Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Car-Sharing The Zipcar car-sharing service uses RFID cards for locking and unlocking cars and for member identification [20]. Toll Roads The tags, which are usually the active type, are read remotely as vehicles pass through the booths, and tag information is used to debit the toll amount from a prepaid account. The system helps to speed traffic through toll plazas as it records the date, time, and billing data for the RFID vehicle tag. This has been introduced in some places in Nigeria. Public Transit (bus, rail, subway) In South Korea, t-money cards can be used to pay for public transit. It can also be used in most convenience stores and vending machines in subways as cash. 90% of cabs in Seoul accept card payment, including most major credit cards and the T-money card. T-money replaced UPASS, first introduced for transport payments in 1996 using MIFARE technology [15]. Also, in Hong Kong, mass transit is paid for almost exclusively through the use of an RFID technology, called the octopus card. This has also been used in various other countries like Canada, Russia etc [15]. Asset Management and Retail Sales RFID combined with mobile computing and Web technologies provide a way for organizations to identify and manage their assets. It was initially introduced to major retail by Craig Patterson, Knoxville, TN. Mobile computers, with integrated RFID readers, can now deliver a complete set of tools that eliminate paperwork, give proof of identification and attendance. Web based management tools allow organizations to monitor their assets and make management decisions from anywhere in the world. Web based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for example, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data. Organizations are already using RFID tags combined with a mobile asset management solution to record and monitor the location of their assets, their current status, and whether they have been maintained. RFID is being adopted for item-level retail uses. Aside from efficiency and product availability gains, the system offers a superior form of electronic article surveillance (EAS) and a superior self checkout process for consumers. The financial services technology consortium (FSTC) set a technical standard for tagging Information Technology assets [21] and other industries have used that standard as a guideline. For instance the US State Department is now tagging IT assets with passive RFID using ISO/IEC 18000-6 standard [8]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 175 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Schools and Universities School authorities in the Japanese city of Osaka are now chipping childrens clothing, back packs, and student IDs in a primary school. Similarly, Whitcliffe Mount School in cleckheaton England uses RFID to track pupils and staff in and out of the building via a specially designed card. In the Philippines, some schools already use RFID in IDs for borrowing books and also gates in those particular schools have RFID ID scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teachers attendance [8]. Human Implants Implantable RFID chips designed for animal tagging are now being used in human beings. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. In 2004 Conrad chase offered implanted chips in his night clubs in Barcelona and Rotterdam to identify their VIP customers, who in turn use it to pay for drinks. In 2004, the Mexican Attorney Generals office implanted 18 of its staff members with the verichip to control access to a secure data room [15]. Fig. 6a Hand with the planned location of the RFID chip Fig. 6b The hand just after the operation to insert the RFID tag was completed. The yellow is from the iodine disinfection before inserting the chip APPLICATIONS OF RFID TECHNOLOGY IN NIGERIA The RFID technology has been suggested to be applied in various sectors in Nigeria to reduce corruption. These sectors include; the monitoring of crude oil, tracking the movement of money, drug agencies and monitoring containers entering the country. Other proposed applications include: the cloning of documents such as certificate of occupancy, bills of lading and university certificates etc. An RFID technology company in Nigeria started providing anti-money laundering (AML) solutions to banks. The technology tracks the movement of money and alerts the Nigerian Financial Intelligence Unit of any suspicious activities. The company is providing the service to five major Nigerian banks. This technology has been used by NAFDAC to reduce the importation and distribution of counterfeit drugs 2008 [17]. SYSTEM DESIGN AND IMPLEMETATION METHODOLOGY The method/approach used in achieving this project design include; the designing of a hardware unit consisting of a motor interfaced with a designed database and graphical user interface(GUI) that will be responsible for taking and storing the data received from the reader. And the software development Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 176 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 unit consisting the Microsoft visual studio, Microsoft . Net framework and Microsoft access. This is done by comparing the information received from the RFID reader to the information stored in the database. The Hardware The hardware architecture consists of the UME4100 RFID tag, the SEEED 125 KHz RFID reader, the ATMEL AT89S52 microcontroller, the computer, the door unit, the power supply unit, the universal serial bus (USB), USB to serial converter, the RS-232 interface, the universal asynchronous receiver transmitter (UART) and the serial data transmission. The RFID reader in figure 7 uses low frequency band, and practically, the reading distance between the tag and the reader is about 7cm. The output of this reader is transmitted serially, and data is transmitted at 9600 baud rates. However, this reader has been chosen because it has a DB9 female header, which can be used to connect to the serial port of personal computer, and it can display the unique ID of the tag in Window operating system. Its applications includes Pet Toys and Access Control System Fig. 7 The SEEED RFID reader [2] (module and antenna) The figure 8 shows the RFID tags used in this paper. These RFID tags are passive tags thus it has no internal power supply. These tags activated by radio frequency transmitted by the reader. The reading distance is about 7 cm. When the RFID reader receives the data from the tag, the data then will be compared with the data in the database to identify the holder of the tag. Fig. 8 The UEM4100 RFID tag This design consists of the RS-232 circuit, the motor circuit and the microcontroller. The RFID reader sends signals to the RS-232 circuit which interfaces with the serial port. The microcontroller is programmed to receive signals from the RS-232 circuit and sends signals to control the motor circuit which controls the direction of movement of the door. The crystal oscillator generates pulses that enable the microcontroller to execute instructions. The microcontroller codes are written with assembly language. The motor unit controls the movement of the door. The microcontroller sends signals to the transistor which acts as a switching device. These transistors allow current flow into the relay. The RS-232 converts the transistor-transistor logic data to enables communication with the serial port. The Software The software development unit consisting: the Microsoft visual studio, Microsoft . Net framework and Microsoft access [3]. Copyright à © 2012 SAVAP International www. savap. org. pk www. journals. savap. org. pk 177 ISSN-L: 2223-9553, ISSN: 2223-9944 Academic Research International Vol. 2, No. 2, March 2012 Microsoft Access Database: There are two databases designed using Microsoft Access 2007. The databases named ââ¬Å"regDBâ⬠and ââ¬Å"attendanceâ⬠. The ââ¬Å"regDBâ⬠database stores information of registered users. This information is used by the administration to identify and manipulating attendance information.
Monday, March 9, 2020
Cervical Dysplasia Market Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2013 2019 Essays
Cervical Dysplasia Market Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2013 2019 Essays Cervical Dysplasia Market Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2013 2019 Essay Cervical Dysplasia Market Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2013 2019 Essay Essay Topic: The Birth Mark Cervical Dysplasia Market Global Industry Analysis, Size, Share, Growth, Trends And Forecast, 2013 2019 Cervical dysplasia, also known as cervical intraepithelial neoplasia (CIN), is a premalignant transformation, which is characterized by abnormal growth of cells over the surface of the cervix. This condition is curable and is not considered as cancer and ranges from mild to severe forms depending upon the concentration of abnormal cell formation. However, sometimes this disease may not require intervention and can eliminate on its own due to strong immune response, and if left untreated it may also lead to cervical cancer. Visit Complete Report Here: marketresearchreports.biz/analysis-details/cervical-dysplasia-market-global-industry-analysis-size-share-growth-trends-and-forecast-2013-2019 Chronic form of cervical dysplasia is mainly caused due to infection of the cervix with sexually transmitted human papilloma viruses, especially through its 16 and 18 ty pes. This disease is very common among females of age between 25 to 35 years of age, but it can affect women of all age groups. Cervical dysplasia can also be caused in people having multiple sex partners, early pregnancy or early child birth, and other illnesses and is often devoid of any visible symptoms, but it can be detected via human papilloma virus DNA test. Cervical dysplasia can be treated via monotherapy or combination drugs, ablation therapy and resection (removal of the abnormal area) therapy. On the basis of the degree of the condition the cervical dysplasia market can be classified into three major segments namely, mild dysplasia (CIN1), moderate dysplasia (CIN2) and severe dysplasia to cancer (CIN3).Major driving factors for the growth of cervical dysplasia market include, increasing occurrences of various sexually transmitted diseases (STDs), increasing smoking habits, alcohol and drug abuse, increasing usage of immunosuppressant drugs and others. The
Subscribe to:
Posts (Atom)