Friday, May 31, 2019

Luis Valdezs Los Vendidos Essay example -- History Historical Los Ven

Luis Valdezs Los Vendidos Los Vendidos, which translates from the literal Spanish to The Sold Ones or a more than appropriate explanation of the title is The Sell Outs. This is a satiric play written by Luis Valdez and performed by El Teatro Campesino, which translates into The Farmworkers Theater. El Teatro Campesino, founded by Luis Valdez in 1965, was a group of calcium farmworkers who put together Actos, or Skits. These Actos were made mainly to entertain striking farmworkers, support them in their marches, and attract public attention to their strikes and organization (http//www.pbs.org/chicano/bios/lvaldez.html). Though in that location is much comedy in the play, it brings about many important social issues that faced Mexicans and Mexican-Americans in the U.S. during the 1960s. Even after almost three decades, these social issues be still apparent in Mexican-American society and others as well. While I was aware of such movements, such as the Black Panthers movement observed in African-American history, I was never aware of the hardships facing Latins, such as Chicanos, in the U.S. By analyzing Los Vendidos through class readings, class notes, notes from a speaker, and profits resources, I can easily further my understanding of a society that was in need of equality. In the first part of the video, our Latins in the U.S.A. class was shown part of Chicano The part of the video documentary that our class saw showed us a brief summary of what life was like for Mexicans in the 1960s. The way Mexicans were treated by the U.S. government wasnt fair. For instance this is seen, in Chicano, when journalist Ruben Salazar, who is the news director of KMEX and a columnist for the L.A. Times,... ...em did not want to go. After reflection Los Vendidos, and after laughing a little or a lot, all the underlying messages, or most of them, are jumping straight out of the film. The more the film is watched, the more the underlying messages youll find dwelling in this bed of knowledge and hidden beneath the sheets of comedy and sarcasm. At the end, we find out that open Sancho was the real robot and that all the people he was trying to sell were just acting. Each member in the lot feels for Eric, whose real name is Kiki, because he really did not want to leave with the secretary, Miss Jimenez. Though it seemed throughout the play that Chicanos did not know what to do, the last segment of the play clarifies all. By victorious out a map, the Chicanos continue to work systematically figuring out how to disperse as many Chicanos to as many communities as possible.

Thursday, May 30, 2019

Analyzing Themes in Robert Frosts The Road Not Taken Essay -- Road No

Analyzing Themes in Robert Frosts The Road Not Taken This is a wonderful poem with many various themes and ideas. One of the biggest themes is not being afraid(p) to take a chance. Some of the other themes include, not following the crowd, trying new things, and standing for fewthing. This poem state that the author took the one (road) less traveled by, and that has made all the difference so the author is telling the reader that we too should not be afraid to take another path.The Road Not Taken is a twenty-line poem written in iambic pentameter with the rhyme scheme ABAAB. This poem starts with the author go through the woods. He comes to a fork in the path and is torn by which path to take...does he take the path that is traveled by everybody, or the one rarely traveled upon? He decides to take the road less traveled by. By taking this path he changes his life in some way unknown to the reader.We get the idea that the poem starts out in the diminish, Two roads diverged in a yellow wood (5). The season fall represents the year coming to an end, and e...

Wednesday, May 29, 2019

This Way To The Gas versus On My First Son Essay -- Tadeusz Borowski B

The short story, This Way To The Gas, Ladies And Gentlemen by Tadeusz Borowski and the poem On My First Son by Ben Johnson, both deal with death. They ar very different types of death and atomic number 18 told in different ways but through some similar approaches, a similar relishing is portrayed to the reader of each.One of the first similarities of the two is that they are both told in the first person as well as being personal accounts. Ben speaks, as himself, about the death of his son and Borowski tells of events at a death camp that he was in during WWII. They both tell their stories through their own voices which adds a potentiometer to the experience of reading. It allows the reader to except just how real the story is. Once the reader accepts that, then the reader is able to more fully understand and mend to the feelings of the authors especially because of how reality based they are. For example, in On My First Son, when Johnson says Oh, could I lose all father now(J ohnson, ln.5), the reader is able to feel the deep sorrow in that line. That is because it is told to the reader by Ben Johnson, the father of a dead son. When the story is made that personal, it is impossible to not share the passionate feelings that are expressed. Borowski causes this type of reaction in the reader as well but in a more indirect way. He does through his personal descriptions sooner than personal expressions of feelings. One example is when he describes the dead babies in the box cars and explain...

Dance Therapy Essay -- History Health Therapy Dancing Essays

Dance Therapy Dance therapy is a type of psychotherapy that uses movement to provided the social, cognitive, emotional, and physical development of the individual. Dance therapists work with people who have many kinds of emotional problems, intellectual deficits, and life-threatening illnesses. They are employed in psychiatric hospitals, daylight care centers, mental health centers, prisons, special schools, and private practice. They work with people of all ages in both group and individual therapy. Some in any case hold in research.Dance therapists try to help people develop communication skills, a positive self-image, and emotional stability.OriginsDance therapy began as a profession in the 1940s with the work of Marian Chace. A modern springr, she began teaching dance after ending her career with the Denishawn Dance Company in 1930. In her classes, she notice that some of her students were more interested in the emotions they expressed while dancing (loneliness, shyness, fe ar, etc.) than the mechanics of the moves. She began encouraging them by emphasizing more freedom of movement quite a than technique.In time, doctors in the community started sending her patients. They included antisocial children, people with movement problems, and those with psychiatric illnesses. Eventually, Chace became part of the staff of the Red Cross at St. Elizabeths Hospital. She was the outgrowth dance therapist employed in a formal position by the federal government. Chace worked with the emotionally troubled patients at St. Elizabeths and tried to get them to cooking stove out to others through dance. Some of them were schizophrenics and others were former servicemen suffering from post traumatic latent hostility disorder. Success for these patients meant being able to participate with their class in wretched to rhythmic music. This rhythmic action in unison with others results in a feeling of well-being, relaxation, and good fellowship, Chace said once.Chace event ually studied at the Washington tutor of Psychiatry and began making treatment decisions about her patients along with other members of the St. Elizabeths medical team. Her work attracted many followers and the first dance therapy interns began learning and teaching dance therapy at St. Elizabeths in the 1950s.Other dancers also began using dance therapy in the 1940s to help people feel more comfortable with thems... ...d to practice. After 2 years they may receive an additional recognition when they become an Academy of Dance Therapist Registered. They can then teach dance therapy and can finagle interns.Dance therapists can also obtain psychological credentials by taking a test and becoming registered by the National Board for show Counselors, Inc.Key TermsAuthentic movementA type of movement that is influenced heavily by Jungian analysis, and works by analyzing the internal images of the patient. Patients are also urged to dance only when they feel the impulse to move. Freud ian analysisA type of psychological treatment where the therapist seeks to help the patient resolve conflicts and traumas bury in the subconscious. Jungian analysisA method of psychological treatment where the patient strives to understand the internal, often mythic images in his or her thoughts and dreams. PsychotherapyA medical treatment that seeks to resolve psychological traumas and conflicts, often by discussing them and emotionally reliving difficult events in the past. Test anxietyA name for the stress and anxiousness that commonly occur in students before they take exams.

Tuesday, May 28, 2019

Creon as the Tragic Hero in Sophocles Antigone Essay example -- Antig

Creon as the Tragic Hero in Antigone This essay will compare two of the characters in Antigone, Antigone and Creon, in an effort to determine the identity of the tragic hero in this tale. To identify the tragic hero in Sophocles renowned play Antigone, we should first consider both the elements present in Greek tragedies and what characteristics find out a tragic hero. Aristotles definition of tragedy is Tragedy is a story taking the hero from happiness to misery because of a fatal deformity or mistake on his part. To be a true tragic hero he must also elicit a strong worked up response of pity and fear from the audience. This is known as catharsis or purging of emotion. In most cases the tragic hero begins the play with utmost status, which is frequently lost in the exodus of the play. For example, in another of Sophocles plays, Oedipus Rex, in which Oedipus is the undisputed tragic hero, Oedipus begins the play as an illustrious king and ends as a subterfuge beggar. His pli ght encourages sympathy from the audience because of the curse that had been on him since he was a child. Antigone, to whom the play owes its name, is daughter of Oedipus, the former king of Thebes. It would seem that she has a relatively high position for a woman, based on the fact that she has a marriage tie to Haemon, son of Creon, the present king of Thebes. Antigone, rather than being happy at the plays beginning, instead makes her entrance in the opening scene very upset with the order given by Creon not to bury her brother Polynices. Antigone is then caught piece burying Polynices and seems almost content with being put to death, I earned the punishment which I now suffer (Antigone, 152), though... ... In Twentieth Century Interpretations of Oedipus Rex, edit by Michael J. OBrien. Englewood Cliffs, NJ Prentice-Hall, Inc., 1968. Heidegger, Martin. The Ode on Man in Sophocles Antigone. In Sophocles A Collection of Critical Essays, edited by Thomas Woodard. Englewood Cliff s, NJ Prentice-Hall, Inc., 1966. Jaeger, Werner. Sophocles instruction of Character Development. In Readings on Sophocles, edited by Don Nardo. San Diego, CA Greenhaven Press, 1997. Segal, Charles. Oedipus the King Tragic Heroism and the Limits of Knowledge. New York Twayne Publishers, 1993. Sophocles. Antigone. Exploring Literature Writing and thinking approximately Fiction,Poetry, Drama, and the Essay. Ed. Joseph Terry. New York Addison-Wesley Educational Publishers Inc, 2001. Sophocles. Oedipus Rex. Trans. Bernard M. W. Knox. New York Washi ngton Squ are Books, 1994.

Creon as the Tragic Hero in Sophocles Antigone Essay example -- Antig

Creon as the Tragic Hero in Antigone This essay will compare two of the characters in Antigone, Antigone and Creon, in an effort to get the identity of the tragic hero in this tale. To identify the tragic hero in Sophocles renowned make up Antigone, we should first consider both the elements present in Greek tragedies and what characteristics define a tragic hero. Aristotles definition of tragedy is Tragedy is a story taking the hero from happiness to misery because of a fatal flaw or mistake on his part. To be a true tragic hero he must also elicit a strong emotional response of pity and fear from the audience. This is known as catharsis or purging of emotion. In most cases the tragic hero begins the play with high status, which is often lost in the exodus of the play. For example, in another of Sophocles plays, Oedipus Rex, in which Oedipus is the undisputed tragic hero, Oedipus begins the play as an illustrious king and ends as a blind beggar. His plight encourages sympathy from the audience because of the curse that had been on him since he was a child. Antigone, to whom the play owes its name, is daughter of Oedipus, the former king of Thebes. It would seem that she has a relatively high position for a woman, based on the fact that she has a marriage tie to Haemon, son of Creon, the present king of Thebes. Antigone, rather than existence happy at the plays beginning, instead makes her entrance in the opening scene very upset with the order given by Creon not to bury her chum Polynices. Antigone is then caught while burying Polynices and seems almost content with being put to death, I earned the punishment which I now suffer (Antigone, 152), though... ... In 20th Century Interpretations of Oedipus Rex, edited by Michael J. OBrien. Englewood Cliffs, NJ Prentice-Hall, Inc., 1968. Heidegger, Martin. The Ode on Man in Sophocles Antigone. In Sophocles A Collection of Critical Essays, edited by doubting Thomas Woodard. Englewood Cliffs, NJ Prentice-Ha ll, Inc., 1966. Jaeger, Werner. Sophocles Mastery of Character Development. In Readings on Sophocles, edited by Don Nardo. San Diego, CA Greenhaven Press, 1997. Segal, Charles. Oedipus the King Tragic Heroism and the Limits of Knowledge. New York Twayne Publishers, 1993. Sophocles. Antigone. Exploring Literature create verbally and thinking About Fiction,Poetry, Drama, and the Essay. Ed. Joseph Terry. New York Addison-Wesley Educational Publishers Inc, 2001. Sophocles. Oedipus Rex. Trans. Bernard M. W. Knox. New York Washi ngton Squ are Books, 1994.

Monday, May 27, 2019

Abusiveessaycompleted

Child abuse is a topic that causes rage in more discussions through discover he county because it is extinctrageous actions against innocent children. M whatsoever p bents question whether discipline can become child abuse. In the essay Justice Childhood relish Lessons the author, Bell hooks, shows how love should occur solely around ones household and claims that, No one can rightfully claim to be pleasing when behaving abusively (Hooks, 1 1). To an extent, that is true. However, in my opinion, maintain that this assertion can be right or wrong, depends on how people perceive about love and vindicatement.Bell Hooks is an educated woman, feminist, and writer who has dedicated her life to teaching people about civil rights that every human being deserves. She wrote an essay in which she addresses her personal view on the direction children should not be hit under any circumstances, because it neglects love according to her, love and abuse cannot coexist. However, it is unfair to claim that a slap on the extend is considered abuse, and that if pargonnts commit this type of action, they do not love their child. in that respect is a huge difference between somatogenic penalisement and child abuse. A child demand to learn right from wrong, and when the childs actions turn out of control, it s acceptable to spank or hit them in the hand. As long as the hitting remain to a minimum degree, physical punishment is not child abuse. some(a)times, the parents may unintentionally abuse their child because of teaching their parents taught them. They claim to be loving while carrying out punishment, and that would absolutely confuse a child on what love and abuse is.To educate a child, mosttimes the punishment is necessary, but the extent of violence carried out to supply the discipline can be considered as abusive. Those physical acts are carried out, such as hitting, slapping, or pinching, cannot be called a loving action. When kids were whipped and told that t hese punishments were for their testify good, or parents are doing this because they love their children, would definitely be misunderstood when they are told they are being whipped because they are being loved.It is manipulative and sends the wrong message to the children. According to Hooks, on that point is nothing that creates more confusions about love in the looks and hearts of children that unkind and/or cruel punishment meted out by the adults they have been taught they should love and respect. (Hooks, 1) The mindsets for the kids are overlooked in a caddish way. Their approach would be like, Oh, I can hit everyone whenever want, which this shows the child growing up to be an overall abusive kid living over her or his childhood actions.Overall, there kids perceptions would be the same and think it is alright to do the something and hit anyone at anytime they want. The parents are messing up their childs childhood of learning from right to wrong. In fact, jolly a child the first time shows an overall lesson so that the next time they get out think about actions before they act. In some way, kids are still kids, they make mistakes and learn from it which shows them not to CT it up again. Continue on spanking them anytime whenever they do something wrong would leave wounded not only on their bodies but also in their hearts and minds.As young children to becoming young adults, Thai concept would stick with them forever and travel with them when they become older and have kids of their own, and this is not a good example to leave on their kids. Loving is hypothetic to be a good feeling that brings warmth and security to the heart and reminds of wonderful things. If a boy hitting his girlfriend but telling her that he is hitting her because he loves her, he girlfriend would feel uncertain because loving is supposed to be sweet and wonderful, not hurtful-As the same point, it is wrong to tell a child that they are being loved when they are being ab ut ilize or punished.Claiming to be loving while being abusive is as bad as telling someone that you love them, and then pushing them off a cliff to their death. No one can rightfully claim to be loving when behaving abusively/ (Hooks, 1). In this statement, Hooks declared that if a parent is hitting their child, then they are showing no love towards the child. In somehow, disagree with Hooks because she uses the word abuse in such a negative form throughout her whole essay. What exactly does behaving abusively mean?If a person sees the row, behaving abusively the person competency be thinking a child was hit in the face and now the child has a black eye, which is abuse. However, Hooks takes the definition of behaving abusively as any type of hitting even if its the least amount of pain like a slap on the hand, which is not abuse. It is natural for a parent to punish there children in one way or another during their childhood. Children are naughty and naturally misbehave, and they An ton help it because they are learning what is appropriate and inappropriate.In other words punishment of any kind, let it be pinching, flicking or spanking will result in disorientation in a childs mind. This statement is true to some people, false to others, but overall hooks tends to be bias in her argument. She doesnt explore the different variations of physical punishment and how these punishments affect the childs thought about love. There are many different types Of punishment out there in this cruel world, but not all of them can disorientate a childs mind or heart about eve.Simple physical punishments such as pinching, flicking, and spanking, are carried out on us at a very young age, and all throughout life. Our parents are here to discipline us, to teach us the difference of right and wrong. When we first misbehave, our parents might tell us to knock it off or split and they may raise their voice when asserting these commands. We sometimes stop when told to, but sometimes we ignore their commands and keep misbehaving repeatedly. This is where physical punishment comes into play. A form of physical punishment would and will be carried out on us.At first it may be a simple punishment, but gradually the punishments intensify. Once a punishment has been carried out, many of us become cloaked in fear of punishment and from this fear we learn not to do that mistake again. Simple punishment is used for the good of children and to discipline them, Dry. David Safari, father five and grandfather of five, CNN asked him to talk to us about his views on spanking. He said he was spanked as a child, spanked his own children when necessary and believes the occasional use of physical punishment not abuse can be an effective tool for parents. Giddier) Now, not all parents are abusive. Some discipline by spanking or punishing them in a form Of a time-out or taking away of a privilege. As long as the punishment does not fit a crime, it is fine to discipline a child. Al l parents experience a time that they have to punish their children, but it is not because they hate or dislike them, but because the children need to learn and the punishment is carried out to teach them that what they did was wrong. Bell Hooks writes, Why was vinegarish punishment a motion of love? (Hooks, 1) Harsh punishment is hundred percent not a gesture of love.It is a gesture of force in which a parent wants their child to listen to them and behave. Light punishment is a tool of teaching and is carried out of love. Punishment itself is not considered as a gesture of love, but may result because of care, a sub-genre of love. Claiming to be loving while behaving abusively is not correct, and is an ironic statement. Parents often do not know the consequences of enigmatical their children by using great words that do not belong in a situation such as abuse. And as the result, it will misunderstand the children and make them difficult to overcome in many years later.

Sunday, May 26, 2019

The Sea and the Fury

The Sea and The Fury Piracy seems more suited to Johnny Depp and Robert Louis Stevenson books, not devastating savage acts that own had an ever-growing fear in the 21st century. southeasterly Asia, or the Arc of Instability (a more appropriate name for this essay), has develop a hot spot for mod day pirates within the last decade. Maritime Terrorism has also become more widespread collectable to several Southeast Asian terrorist groups who have the inclination and capability of waging terror on the high seas. However, single cannot say that plagiarism is a more persistent and significant threat to regional security than outside(a) terrorist networks.In galore(postnominal) cases, plagiarism and terrorism everywherelap, and can therefore be constituted as the same thing. Piracy is defined by the United Nations as power on the high seas, that is, beyond any states territorial wet (Young & Valencia, 269) and to the International Chamber of Commerces International Maritime B ureau as an act of boarding or attempting to board any ship with the intent to commit theft or any other crime and with the intent or capability to riding habit rive in furtherance of that act. (Young & Valencia, 269. Maritime Terrorism is defined as political piracy which is any illegal act directed against ships, their passengers, cargo, crew or against sea ports with the intent of directly or indirectly influencing a government or group of individuals. (Young & Valencia, 270. ) Because these acts atomic number 18 similar in nature and intent, one cannot be said to be more of a threat than the other. This paper will analyze separate cases of piracy and terrorism and cases where the acts overlap, with attention given to the Straits of Malacca, one of the populations busiest waterways and a veritable sitting duck for terrorism and piracy.Piracy has made a remarkable re bite to the new world with hundreds of cases being reported all year. With galore(postnominal) of the surrou nding countries in the South Pacific being economically and politically unstable, and the fact that the seas are some of the most heavily trafficked in the world, piracy has become a viable means of thievery. Reported incidents of piracy worldwide have dramatically increased over the last 5 years, peaking at 469 in 2000. A significant portion of these incidents occurred in Southeast Asian waters, increasing from 22 in 1997 to 164 in 2002.Indonesian waters alone accounted for 119 out of 469 reported worldwide incidents in 2000, 91 out of 335 incidents in 2001, and 103 incidents of a total 370 reported incidents in 2002. (Young & Valencia, 270. ) Piracy is used for financial gain, with different levels of piracy set at common thievery, temporary seizures, long-term seizure and hijacking. The Straits of Malacca saw a cargo ship, the Alondra Rainbow, of aluminum ingots hijacked on its way to Japan. The crew was held hostage for a hebdomad before being set adrift they were later found by a Thai fishing boat.The ship was found weeks later in Indian waters. Terrorism is usually not heard of at sea, but is just as serious as it is on land. Terrorism, and its maritime manifestation, political piracy or maritime terrorism, is motivated by political goals beyond the immediate act of attacking or hijacking a maritime target. (Young & Valencia, 271. ) The Abu Sayyaf Group, the Gerakan Aceh Merdeka and the Jemaah Islamiyah are three terrorist groups with root in the South Pacific that have taken advantage of the high volume of shipping that passes through the waters by perpetrating acts of piracy and terrorism.Al-Qaeda is also apprehension to be an enemy that would terrorize ships traveling through the region. Not only do pirates terrorize ships crews, but terror groups like al-Qaeda could also use pirates methods either to attack ships, or to seize ships to use in terror attacks at mega-ports, much like the Sept. 11 hijackers used planes. A more drab scenario is that a small but lethal biological weapon could be smuggled into a harbor aboard ship and released.Terrorist groups regard seaports and international canvas lines as cunning targets because they lie in the intersection of terrorist intent, capability and opportunity. (Banaloi, 67. ) This has affected Southeast Asia horribly, causing drops in tourism, trade and shipping revenues. Terrorist groups are more rampant in this region because of the great amount of political unrest and are usually able to procure the weapons needed for such activities relatively easily due to the political climate and amount of Black Market substantiallys. This may be only the beginning of Maritime Terrorism.In 1982, the United Nations drew up the Laws of Sea, detailing how many miles offshore nations could call their own and where maritime boundaries were regarding international waters. However, the flaw here lies in the fact that the United Nations did nothing to provide for nations that have conflicting boundaries neglect add an addendum that stated that nations had to peaceably come to a compromise. Conflicts have arisen due to the fact common waterways are narrow, nations have competing claims for boundaries, and an abundance of rich resources have been found in the area. Piracy and terrorism overlap in several ways, particularly in the tactics of ship seizures and hijackings. And some of the conditions which allow it to thrive are also similar to the causes of terrorism, for example, poverty, political instability, permeable international boundaries, and ineffective enforcement. (Young & Valencia, 271. ) Indonesia, Malaysia and capital of Singapore all border the Straits of Malacca, one of the busiest shipping areas in the world. Oil has been tapped and wield off the coast of East Timor by Australia.Brunei is rich from oil deposits, as would the Philippines, Vietnam and China be if someone drew up a proper marge and split the territory. All of these claims have led to an am azing amount of unrest in the area, culminating with escalating violence. Because piracy is frequent in Southeast Asia, terrorists have found it an attractive cover for maritime terrorism terrorists could adopt pirate tactics of stealing a ship, which they could then blow up or ram into another vessel or a port facility, to sow fear.Thus, security experts consider the line between piracy and terrorism to have blurred in Southeast Asia. (Banalaoi, 64. ) A narrow waterway linking the Pacific and Indian Oceans, the Straits of Malacca are bordered by Indonesia, Malaysia and Singapore and sees thousands of shipping cargo pass through its ports every year. The Malacca Strait alone carries more than a quarter of the worlds maritime trade to each one year more than fifty thousand large ships pass, including cardinal to fifty tankers.Because the strait is the maritime gateway between the Indian Ocean and the Pacific Ocean, it will remain a world center of maritime activity. It has been argued that it would be difficult for terrorists to disrupt shipping in the strait by sinking a ship in a precise spot. However, were terrorists to hijack one and turn it into a floating bomb to destroy ports or oil refineries, the effect would be catastrophic. Such an attack incident would not only cripple world trade and slow down international shipping but spread fear-more broadly than on 9/11. (Banaloi, 65. The United States has expressed grave fear over the possibility of sinking a tanker in the Straits, and has, along with India, taken to patrolling the waters. Japan has also expressed concern over the refuge of the Strait with good reason Japanese ships were hijacked in 1998, 1999 and 2000, one of which was the infamous Alondra Rainbow. Needless to say, the problem is not going to go away. Piracy has become more rampant in the Straits during the last few years, and is expected to rise even more when China begins using more oil. The number of such attacks has tripled over th e past decade.In the first base week of June, for example, a tug and barge disappeared on their way to Port Klang in Malaysia, armed robbers looted a tanker in Indonesian waters and crews repelled two other attacks in the Strait itself. (www. economist. com. ) Despite the apparent rise of piracy and the serious potential for terrorist acts, all hope should not be lost. A total of 16 countries and one administrative region were represented at the Asian Maritime Security Summit Japan, South Korea, China, Hong Kong, the 10 members of the Association of Southeast Asian Nations, India, Sri Lanka, and Bangladesh.After discussing measures to deal with piracy and maritime terrorism, the participants adopted an Asia Maritime Security Initiative 2004 calling for cooperation among their countries in this area. It seems fair to see this development as an boldness by Japan of its readiness to take the initiative in regional maritime security. (Isami, 49. ) Recently, Japan, no doubt influence d by its hijackings, has spearheaded a campaign to end piracy and terrorism in the Straits and other sea-lanes in the South Pacific.One popular idea raised at the conference was building an Asian Coast Guard, wherein each nation would send people to be trained as officers and be able to patrol and safe guard the waters. The Copenhagen School in Denmark introduced the concept of securitization to gainsay the traditional conception of security. Emmers applies the securitization theory to have a deeper understanding of the securitization of drug trafficking, piracy/maritime terrorism, and people smuggling in Thailand, Singapore and Australia, respectively. (Banaloi, 388. ) Securitization has become a theory used to pinpoint the ways in which regions become securitized and de-securitized. The theory has been met with great fanfare, especially in the South Pacific. Yet another theory to function scholars and government aides with the situation is the Grey Area Theory presented by Pete r Chalk, where threats to the stability of nations are provided by non-nation processes, organizations and people.A review of his theory stated, The piracy chapter touches on important weaknesses in international law, particularly in relation to the sensitive issue of hot pursuit and the problems of seas where there are disputed or no clear maritime boundaries, truly grey-areas. It also raises significant regional examples of active cooperation, such as the joint maritime patrols by the littoral states of the Malacca and Singapore Straits which have helped to reduce incidents of piracy. (Grundy-Warr, 111. ) The Royal Malaysian Navy has stepped up efforts to patrol the Straits, as has the Singaporean Navy. While the navies have reduced some acts of piracy and terrorism, the Straits under the Indonesian zone are largely unguarded due to lack of funds. The United States has offered assistance, but Malaysia, Indonesia and Singapore have declined, preferring advice and equipment rather than substantial presence, which they fear might anger their countrys inhabitants.Piracy and terrorism have been blended together to form a rather extreme form of diabolical action. Terrorism is the expect of global disorder in the coming decade and will need to be prevented in order to ensure a safer world. The war over place a democracy in Iraq may not be the way to staunch the flow of terrorism, but a securitized Straits of Malacca could ensure the safety of people, trade and economic cooperation for years to come.

Saturday, May 25, 2019

Chilhood Memory

My Childhood Memory Have you ever had a flashback of a memory from when you were an infant? Or deal you ever sat there and wished you were a little kid again? Well that happens to me all the time, and even it you dont remember it probably has happened to you. well Im going to attest you virtually a childhood memory that Ive had I remember every Sunday would sit there with my father In the living room and take hold of scxcer, I was only about 6 years old, and I sat there for hours and watched team after team play.I never knew what was going on, but in some way tound it fascinating. Atter very goal, Id scream at the top of my lungs out of excitement whoever my dad said was behind I would root for, I dont make out why, but ceaselessly liked the underdog. My father would always order pizza and wings after the first game ended. I was a little girlfriend but that never stopped me from eating about wings and at least two slices of pilla, that was so much I felt Ilke my stomach was ab out to explode then had to clean up the mess me and my dad made. ould then go into the living room to watch the end ot the second game. We then would always go get ice cream afterwards always got a chocolate milkshake, my dad got a scoop of vanilla on a ugar cone,

Friday, May 24, 2019

Advantages and Disadvantages of Historical Cost Accounting Essay

Historical approach be has been a controversial method that experienced many criticisms over a tip of time, especially since it considers the acquisition cost of an asset and does not recognize the current grocery value. Merits and demerits of this method are as follows.The most obvious advantage of HC accounting is objectivity. It is a predominantly objective system, which records the original cost of an item when it was purchased. Under historical cost accounting there is no room for manipulation and the selective information is supported by independent documentary evidence, such as invoice, statement, cheque counterfoil, receipt or voucher.Elliott and Elliott43 Any early(a) method for recording proceeding would be less objectives since the amount being recorded would depend on individual point of view and is various from different people.Secondly, being compared with most other methods, historical cost is an easier and cheaper way of valuation. In respect that the original co st is one that already existed and could not be amended, which is easy to determine and can be verified. Therefore, it requires less estimation for accountants to record the data and easier for auditor to inspect them subsequently. In addition, as a basis of fact, it is verifiable and to that extent is beyond dispute. (Alexander and Nobes 180) other significant advantage of it is reliability, which is one of the key characteristics of financial reporting, as examined in the IASBs Framework. As a past value, for most assets historical cost is more reliably determined than other current valuation such as fair value. This measurement can ensure that there are not nimiety benefits to users. (Alexander and Nobes181)Unfortunately, as every coin has two sides, HC accounting also can not avoid having drawbacks. The main disadvantage exists in the subsequent days afterward acquisition. The continued reporting of historical cost based values does not reflect any changes in market value. Therefore either IASB rules or US GAAP are not based on the HC principle univocally. Actually, the measurement model used by these standards, like IFRS, is a mixture of historical cost,market values, bread realizable values and discounted present values. Walton and Aerts76Moreover, although HC accounting method is reliable, the problem mentioned above lead to another disadvantagelack of relevance, which is also a vital characteristic of financial reporting for decisions makers. As we know, making decisions normally requires estimation of the future, particularly the prediction of cash flows. (Alexander and Nobes181). However HC method is based on the past values, and therefore can not provide the most relevant information for the future. It may not be the best guide to the future performance, financial status and investment potential. (Alexander, Britton and Jorissen867)In addition, although this method is predominantly objective, it can be broke by some special situations, owing t o alternative definitions of revenue and costs and the need for estimates. Revenue and cost could be determined according to a choice of criteria. For instance, although inventories are valued at the lower of cost or net realizable value, the cost will differ depending upon the definition adopted, like first-in-first-out or last-in-first-out cost.Assets are often subjected to revaluation. In an economy of changing price levels, the historical cost system has been compromised by a perceived need to restate the carrying value of those assets that comprise a large proportion of a companys corking employed such as land and buildings.Elliott and Elliott44ReferenceB. Elliott and J. Elliott, 2009, Financial Accounting and describe ,13rd edition, FT apprentice Hall , Essex D. Alexander, A. Britton and A. Jorissen, 2007, International Financial Reporting and Analysis, 3rd edition , Thompson Learning , London. P. Walton and W. Aerts, 2006, Global Financial Accounting and Reporting Principl es and Analysis, Thomson Learning, London D. Alexander and C. Nobes, 2004, Financial Accounting An International Introduction, 2nd edition, FT Prentice Hall , Essex

Thursday, May 23, 2019

African American Stereotypes Essay

A stereotype is a popular belief about specific types of individuals. Stereotypes are govern and simplified conceptions of groups based on some prior assumptions. African Americans stupefy been perceived to be some unrivaled they are not in the media, history, and in quotidian life. Although some stereotypes are true, many are harmful and inaccurate. African American stereotypes are generalizations about the behavior of African Americans originated mainly in American close and derived from how slave owners employd to view slaves.African American stereotypes allow someone from getting to know a somebody their self. If someone has one bad funda handstal interaction with an African American, they result desexualise their selves from getting to know how African Americans truly are. They will base every other African American off of that one bad altercation. The some damaging features of African American stereotypes are the influence they have on young African Americans. Young peo ple tend to limit them selves because of stereotypes. African Americans are unaware that they play into and help to reinforce the African American stereotype.They believe that the African American stereotypes imposed upon them, will limit them in life. The stereotype that African Americans will complain that the system is set up to prevent vague people from attaining certain positions, is very frequent. If they accept these stereotypes and believe them they will limit them selves. Barack Obama who holds the highest office in America is a good example of how this stereotype is false. Some stereotypes are set up to be positive, this does not make out the practice of perpetuating these African American stereotypes right.At A & N University students (African Americans and Caucasians) were asked to give some stereotypes of African Americans. The current African American stereotypes are thought to be criminal, poor, athletic, religious, musically gifted, loud, dumb, lazy, simple-minded , obnoxious, talk with slang, opinionated, and dress urban, wear baggy pants, and have cornrows. Kool Aid , Chicken, and watermelon was also thought to be a specialty meal in their household. They were thought to live in the lower class neighbor hoods, have one parent, multiple siblings, be rather street smart versus ook smart, involved in gangs.When a group of African American children were asked in a local Baltimore elementary school what they wanted to become when they grow up they had many common answers. some boys wanted to be a professional basketball player, football player, and become a rapper. Few wanted to be doctors, police officers, fire fighters, entrepreneurs, and nurses. Many African American males are thought to be thugs, drug dealers, high school dropouts, deadbeat fathers, janitors, trash man. A thug is someone who is going by struggles, has gone through struggles, and continues to live day by day with nothing for them. (Tupac Shakur)No young man wants to grow u p and become a thug. Tupac Shakur express that the African American trend of sagging pants is an un organized protest. The sagging pants is a part of someone attitude. It is their way to relate. It is a form of character. A young mans father may not sag his pants but, he may see his idol sagging his pants and want to relate to or admire him.Morehouse professor Bryan T. Marks held a panel at Morehouse College about African American stereotypes. He said that there are more black men enrolled in jail rather than jail. He also stated that African Americans are the most religious, but most likely to get a divorce. There are more black men in jail and prison than in college, but there are more college-age black men in college than in jail and prison. Statistics show that there were an estimated 791,600 black men in jail and prison in 2000 and a count of 603,032 in college in 1999.The more reliable U. S. Census Bureau reports were that 816,000 black men in college in 2000. When people th ink of black men in jail they use the entire age range of black males when making these comparisons. The age range for college-going males is generally 18 to 24, not the 18 to 55 (and up) range of the jail and prison population. Viewed this way, the ratio of black men in college compared with jail and prison is 4-to-1. Black slang is a form of informal spoken language whose origins are most often associated with African Americas.Slang is a way for young African Americans to express themselves. Many other races copy their expressions because they think it is cool. Some commonly utilise terms are words such as gangsta, bling, grills, hang, hood, benjamins, dopes, aight, holla, crib, playa, roll up, straight, yo, and shawty. The Stereotype that Black women have bad attitudes is very common. In fact, its been around so long that it has earned the name, Angry Black Women Syndrome. Do Black women have attitudes? My guess is that most black women would fall into the unique personality typ e.That is a person characterized as quiet, determined, independent, serious, and interested in trying to better her self. The idea that Black women are a species of neck rolling, lip smacking, finger snapping, ball busting sub-humans come from? People, who have no contact with Black women outside of retail shopping, see Black women going off on their husbands, boyfriends, kids, co-workers, even bosses with no constraint, remorse, or respect for situation and societal norms on sitcoms, talk shows, reality shows, news clips and even commercials.

Wednesday, May 22, 2019

Whether the Construction Industry Is the ‘Pillar’ Industry in Hong Kong?

BRE216ECONOMICS FOR CONSTRUCTION AND REAL ESTATE Kwan Tsz Him (11168188D) Kwan Cheuk Pui (11055717D) Cheng Ming Xian (11704592D) Introduction Although Hong Kong has less land, there argon always complex body part projects happening entirely over in Hong Kong, for example, West Kowloon Cultural District development, Kwun Tong redevelopment project, etc. However, workers and capital involved in the reflexion intentness have been decreasing.In this report, we exit discuss whether the device industriousness is the pillar persistence in Hong Kong and we disagree with it. Focused industries As proposed by the Government decades ago, there are four pillar industries in Hong Kong, namely, fiscal services, trading and logistics, tourism and producer and professional services. They account for active 60% of GDP and nearly half of the original workforce, in which construction industry is counted in the producer and professional services.In the 21st century, the Government wants to look forward and follow the trend of technological and advanced world, they proposed another six new pillar industries, concerning examination and certification, medical services, innovation technology, culture and creative industries, environmental industry and education services, in which construction industry is not counted in any pillar industry and no longer treated as important by the Government. Features of local construction industry There are several features for local construction industry in Hong Kong, with dangerous working environment being the major one.Without doubt, accidents happen all the time in Hong Kong when you simply flip through the newspaper. Some of the accidents are inevitable while some happened due to carelessness. For example, the workers may not be aware of the safety regulations, accidents always happen while the workers do not adjust the safety regulations as well as not to follow the working regulations. Besides, competition between overseas contr actors is keen. Nowadays, a lot of construction projects in Hong Kong are outsourced to overseas contractors. It is because the technology is more advanced in overseas countries such as in Germany, the United States, France, etc.With reasonable price and advanced technology, the other countries sometimes are more competitive. Moreover, labor intensive is also the label of construction industry in Hong Kong. Limited land with high universe is a feature article for Hong Kong. Labor can be easily found, however, is only applicable in the past. This will be examined in the report later. Concerning the environment, pollution is in line with the construction industry to a bad extent. Since construction work will inevitably pose noise, air and sometimes water pollution.The pollution extent depends on the ordered series of the project. Basically, the larger scale of a construction project, the greater the pollution will be pass oned. Reasons of excluding construction industry as pillar an industry in Hong Kong As mentioned before, the feature of labor intensive can only be described in old years due to the transformation of economy. In late 80s, the HKSAR has been transforming the full economy from labor intensive industry to commercial industry which is defined as tertiary services as finance and accounting, investing, banking and so on.In such knowledge-based society, the unemployment respect for those with low education level could be especially higher. Also, there is no new blood to enter such industry. This can actually be explained by the above phenomenon. Nowadays, some of the workers are 50 years old or above and the industry faces the aging problem. As this cannot be fixed, construction industry will decline gradually. Nowadays, the opportunity of receiving proper education is higher, thus the citizens do not willing to enter to an industry with gloomy future. Diagram showing the percentage of population distribution in diametrical working sectorsAs f or the construction industry, we may see that the percentages are actually fluctuating throughout the years and increased from 5. 4% to 6. 8% in 1971 and 2006 respectively. Only a light increase in population is resulted and also, it just accounts for a little percentage. Frankly speaking, a lot of buildings are, nowadays, built for different uses for economic development and social settlement. However, the problem of aging of such industry is becoming more serious and we can barely see how the government has utilise any scheme to cope with such problem.Total building and construction output and annual percentage change (Census and Statistics Department) Total construction as % of GNP live value 2006 25. 1 14. 2 2007 23. 7 -0. 1 2008 21. 1 -15. 6 2009 13. 8 -44. 6 2010 9. 2 -35. 0 Direct and indirect employment construction (Census and Statistics Department) As the diagram above suggests that the direct and indirect employment in construction is shrinking from 2004 to 2010. Also, the total output as well as the total construction as percentage of GNP is decreasing from 25. 1% to 9. 2% in 2004 and 2010 respectively.This data has indicated that the economic return and contribution to Hong Kong is contracting to a large extent. pull distribution to GDP Gross Domestic Product (GDP) by Economic Activity Percentage Contribution to GDP at Basic Prices (Census and Statistics Department) 2006 2007 2008 2009 2010 bend 2. 7 2. 6 3. 0 3. 2 3. 3 Services 91. 7 92. 8 92. 5 92. 6 92. 9 GDP refers to the market value of all final goods and services produced within a country in a given period. From the table above, we can find that from 2006 to 2010, the construction industry only contributed about 3% to GDP.To compare with other industries, construction industry seems has not reach the standard of becoming a pillar in Hong Kong. The problem of construction industry in Hong Kong Building contractors in Hong Kong are usually small. The competition between domestic and fo reign building contractors is keen, because our building technology is labor-intensive and traditional. They compete on price, and cut costs, and sometimes, very unfortunately, corner as well. Consequently, the problems of safety and lack of technology development happened. Besides, the building cost in Hong Kong is among the highest in advanced economies.As a result of low profitability, most industry participants adopt a short-term view on business development. Complex infrastructure projects have been undertaken by international contractors most of the time. According to Labour Department accident statistics for 2005, the accident rates per 1,000 workers in the construction industry is 59. 9, these figures were higher than the overall accident rate of 30. 6 per 1,000 workers in all industries. Due to the risk is higher than other industries, lack of graduates over the next two/three years will associate with construction.The potential danger has reduced the possibility to attract leaving certificate students into the construction professions, it increases the difficulty to continue and expand the construction industry. Number distribution of workers in construction industry (Labour Department) End of 2000 Beginning of 2009 Total workers 83924 51944 Public 44355 20825 Private 32704 31119 Building 61676 40772 Civil 22248 11172 Conclusion To conclude, we do agree that construction is very important in Hong Kong. veridical estate is closely linked with the economy and it creates many job opportunities.During the financial tsunami, government even earmarked large amounts of public money on construction projects to dumbfound the economy. However, the distribution from construction industry to GDP becomes less and less while compare with the past, it only holds about 3% of GDP every year. Besides, with many problems in this industries, it is not easy for the Government to make it as a pillar industry. We suggest that the Government still need to put focus on co nstruction industry but it need not to be the pillar industry in Hong Kong. Reference 1.Census and Statistics Department Report on the suckly Survey of Construction Output, 3rd Quarter 2011 http//www. censtatd. gov. hk/freedownload. jsp? file=publication/stat_report/commerce/B10900022011QQ03B0100. pdf&title=Report+on+the+Quarterly+Survey+of+Construction+Output&issue=Third+Quarter+2011&lang=1 2. Census and Statistics Department Real Estate Project Statistics http//www. censtatd. gov. hk/hong_kong_statistics/statistical_tables/index. jsp? tableID=119 3. Census and Statistics Department Statistics in the industry section of construction http//www. enstatd. gov. hk/hong_kong_statistics/statistical_tables/index. jsp? tableID=116 4. HK Job News http//www. hkjobnews. com/2010/03/7. hypertext markup language 5. Construction Workers Registration Authority. Annual report http//www. cwra. org. hk/information/AnnualReport/report11/index. htm 6. Shair W, Bright horizon for Hong Kongs constructi on sector Recruiting newcomers. http//www. careertimes. com. hk/english/article/show_article. asp? category_id=1037article_id=14111title=bright-horizon-for-hong-kong-s-construction-sectorlistby=datelistby_id

Tuesday, May 21, 2019

Business: Public Relations and Press Release

The website is http//www.jpmorganchase.com/corporate/About-JPMC/about-us.htm. The sender is JPMorgan Chases public dealing and communications department. Looking at the variety and fetidness of messages heralding the successes and profitability of the bank, it is obvious that the message is intended for a variety of stakeholders like investors, potential investors, shareholders, customers and potential customers, employees and fifty-fifty its competitors. Analyze the integrated business communication.Integrated business communication is defined as the process of planning, executing and evaluating unified messages that create stakeholder bloods and build brand recognition. (Stuart, Sarow, and Stuart, 2007,p.14) The press force out section uses information from public relations, management, organizational changes, marketing and incorporate these into a series of dynamic message that paints a picture of the companion as a whole making it possible for stake holders to form a compre hensively positive image of the company. For example, if unmatchable looks at the press loosen of April 25th of 2013, one realizes it heralds through its title Chase Ranks 1 in Mobile Banking Functionality a technological milestone that not only places the company ahead of its competitors, but likewise entices prospective customers who might see this as a plus.In this particular press release,many stakeholders are targeted at the same time. In another press release dated April 17th 2013 titled 100.000 Jobs mission Announces 64,628 U. S Veterans hired Through First Quarter2013, the company uses public relations technique to announce its position as an outstanding responsible corporate citizen through offering employment to a target under-privileged group. This particular release serves also as a public relationship announcement to prospective veterans that employment is done on the spot. This is an image building and publicity stunt that also targets a wide variety of stakeholders . Assess the media richness of the section.To achieve its communication strategy, the company uses both audio and video presentations, emails, news feeds, downloadable data and links to other pertinent information that may be of the essence(p) sources of enrichment to its readers or stakeholders. Of particular interest is its use of webcasts and live feeds or reproduced information that can be viewed live or at the stakeholders convenience by flair of archived presentations. Describe how the message is framed.Framing according to Robert Entman is selecting, and highlighting some facets of events or issues, and making connections among them so as to promote a particular interpretation, evaluation and /or beginning, (Stuart, Sarow, and Stuart, 2007,p.18). This is exemplified in the very setup of the website and the various breakdown of the message into sections, topics, dates in a coherent and easily attackible way through internet access and other communication tools. For example , the topics are arranged beginning with investor relations, financial information, CIO reports, annual report and proxy, shareholder presentations, corporate responsibility to feedback link in frequently asked questions. A cursory look at the table of contents shows that there is a deliberate attempt at presenting a unified message about the company to its stakeholders that paints a bright light, vision and growth with special attention to the shareholders.Identify opinion leaders.Opinion leaders that are targeted by the communication are shareholders, prospective employees, employees, customers, prospective customers, presidential term regulators, generally known as stakeholders. Make barrackationsfor improving word choice.The choice of words while technically appropriate to its audience, may be confusing to the social status and file customer and investor who may not understand the use of technical words. This is seen in the earnings reports, and other communiqus in the websit e. I would also recommend that concrete words be used to avoid ambiguity. A more simple but concise language devoid of ambiguity, double meaning loaded with cramped up facts and data is recommended considering the targeted audience and general public to whom the message is addressed.

Monday, May 20, 2019

Balance School and Social Life Essay

School and social life are like oil and piddle they dont mix. You absolutely want to go hang out with your friends, but you need to try for that rivulet the next day Dear teens, heres how to balance your social life and give lessons Steps Do your home break as soon as you get home. Its tough, and you want to relax. further this is a great strategy to use if you do your home represent the second you get home, you have the lie of the night to relax. Do this even on Friday. Make it a habit. Listen to music age doing homework.This helps you work at a faster speed and seems to make beat go by quickly. How incessantly, not everyone stand work while listening to music, so if you happen to be one of these people, then you can work in an environment without music its perfectly fine. Turn off your cellphone and television while doing your homework. Distractions are the number one reason why you take five hours instead of one to masterful your homework. Have a lot of homework? Then maybe do some on the deal ride home.This wont work if you walk home from school, though. What you can do is try not to burn the midnight oil or do your homework at the eleventh hour. During lunch break, try to do at least some homework given to you earlier in the day. Dont ever be afraid of being made fun of. If you really have no time to thoroughgoing(a) your homework, try explaining it to your teacher. She or he will understand, because teachers used to be students, and after all, theyve gone through what youre going through now, right?If your teacher announces theres going to be a test the following week on Friday, dont study for it on Thursday. Slowly take your time to study a few chapters a day in the afternoon so that you have piles of free time to socialize after that. Now youre free to hang out with your friends. I know youre thinking, None of these steps will work Well, youll never know unless you try. After all, if break out with your friends is really that important to you, you would take any option you have.

Sunday, May 19, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our immaculate make is ground upon Embedded strategys. In this project we be development Micro restrainer which minces all the operations in regarding the level of urine in the dam. For this process we require the comp iodinnts much(prenominal) as small manage condition, GSM modem, apply movery, top executive bring home the bacon and trio sensors. These three sensors ar lay in three different brink levels and ar committed to the govern.If for suppose the level of piss is being increasing in the dam, then immediately when the water level pass over the sensor at level-1, the cultivation is passed to the ascendancy and then the controller checks for the precaution instruction which is devoted a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the energetics for which it is appoint saying that the urine level has crossed the threshold level-1. The controlling part of the water level is overly do by the controller finished the instructions disposed by the developer.This includes the operations much(prenominal) as the f argon of furnishs to be opened, the number of threshold levels that ar crossed. In this process the controller checks the number of threshold levels that atomic number 18 crossed and tally to that the gates be being controlled. 1. 1 Embedded System Embedded corpses be electronic de iniquitys that be microcentral processing units with in their implementations. Embedded transcriptions physical bodyers ordinarily keep up a signifi layab placet grasp of hardw ar technologies. They mathematical function particular proposition designming languages and softwargon to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) s hapless mainframe and small store size to minimize costs. An embedded system is a special-purpose system in which the entropy processor is totally encapsulated by or ded icated to the de fault or system it controls. Un handle a general-purpose computing device, such as a personal computer, an embedded system performs unmatched or a a couple of(prenominal) pre- layd tasks, usually with really specific requirements. Since the system is dedicated to specific tasks, design engineers passel optimize it, trim back the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for rest little Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for busy intercourse) is a digital mobile teleph unrivalled system that is widely use in m whatsoever parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely apply of the three digital wireless teleph champion technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses entropy, then sends it down a channel with twain former(a) streams of user information, from individually i in its own succession s hooking.GSM ope smart set in the 900MHz, 1800MHz, or 1900 MHz relative frequence bands. GSM (Global System for winding colloquys) is the engine room that under freezes most of the worlds mobile ph peerless networks. The GSM platform is a hugely successful wireless technology and an unusual story of global achievement and cooperation. GSM has become the worlds fastest growing communications technology of all eon and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology employ for transmitting mobile vocalisation and info run. GSM operates in the 900MHz and 1. GHz bands GSM sup looks information delegate speeds of up to 9. 6 kbps, allowing the transmission of rudimentary selective information services such as SMS. E rattlingday, millions of people are making phone calls by pressing a a couple of(prenominal) me relytons. Little is cognise about how one persons voice r severallyes the early(a) persons phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin send text cores and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer. on the whole the features and advancements in cell phone technology require a backbone to sup port wine it. When a mobile wedge heelscriber roams into a new(a) localization principle area (new VLR), the VLR machinelikeally determines that it mustiness up find out the HLR with the new localization of function information, which it does development an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through and through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the make suggests are small controllers. They are like single silicon chip computers that are often embedded into separate systems to function as processing/controlling unit. Microcontroller A single chip apply to control different devices. Any microcomputer system requires memory to store a sequence of instructions making up a course of study, parallel port or consequent port for communicating with an out-of-door system, timer / fore stodgy for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the profound process Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and explanation pic framework body 2. 1 Block diagram of dam level warning apply GSM SMS In this block diagram we are development microcontroller, GSM modem, LCD, index bring out, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main lecture is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with all(prenominal) components basic requirement is power issue. pre movely the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too mettlesome to reduce it to instantaneously 5V DC, in that locationfore we motif a step-down transformer that reduces the describe electromotive lastingness to certain fivesomesomeage that go out help us to convert it in to a 5V DC. in that respect are galore(postnominal) fibres of power supply. Most are intentional to convert mettlesome potential difference AC mains electrical energy to a sui t fitted low voltage su pply for electronics circuits and other devices.A power supply chiffonier by broken down into a series of blocks, distributively(prenominal) of which performs a particular function. This power supply is consociateed to the micro controller. In a very simplistic form, a micro-controller system advise be viewed as a system that reads from (monitors) foreplays, performs processing and writes to (controls) railroad sidings. Micro controllers are useful to the extent that they return with other devices, such as sensors, motors, successores, keypads, displays, memory and even other micro-controllers. Next remark should be given to the microcontroller it is through with(p) by the level indicator. train indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile commun ication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is employ. This is use to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as passs, which is an ON OFF switch. Through this put across action the motors work and controlling of the gates evict be done. Hardware components 1. designer supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid watch vitreous silica display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the outp ut voltage constant irrespective of a. c mains fluctuations or load variations is known as Regulated D. C Power Supply. For example a 5V regulated power supply system as shown below pic image 2. 2 5V regulated power supply system The regulated DC output is very smooth with no prance. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to a nonher with little loss of power.Transformers work but with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. note that as voltage is stepped down stream is stepped up. 2. 2. 2 Rectifier A circuit which is employ to convert a. c to dc is known as rectifier. The process of con version a. c to d. is called rectification Types of rectifier Half wave Rectifier Full wave rectifier 1. substance tap full wave rectifier. 2. Bridge shell full bridge rectifier. Bridge Rectifier A bridge rectifier makes use of quaternion diodes in a bridge recording to achieve full-wave rectification. This is a widely use configuration, both with indivi three-fold diodes fit as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. pic Fig 2. 2. 2 Bridge Rectifier arrangement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified out put of one-half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the interest methods of filtering. A capacitor, in parallel to the load, provides an easier by pass for the ripples voltage though it over collectable to low impedance. At ripple frequency and leave the d. c. to appears the load. An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) spell allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage governor ICs is available with unbending (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass withal rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (overload protection) and overheati ng (thermal protection). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You exactly connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input marijuana cigarette, connect the minus lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. pic Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were surely used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In some(prenominal) areas Micro-controllers are now outperforming their analog coun terparts and are cheaper as well.A Micro controller consists of a powerful central processing unit tightly coupled with memory get up, ROM or EPROM), various I / O features such as straight ports, Parallel sorts, timer/Counters, Interrupt Controller, entropy Acquisition interfaces- latitude to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above express features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features contribute in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a course of study, parallel port or serial port for communicating with an away system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Ce ntral Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing ( iodine second Logic) Capabilities. 3. On Chip Flash Program entrepot 4. On Chip Data RAM 5. Bi-directional and independently Addressable I/O Lines 6. Multiple 16-Bit horologe/Counters . Full Duplex UART 8. Multiple Source / transmitter / Priority Interrupt Structure 9. On Chip Oscillator and Clock circuitry. 10. On Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 series 89C51 Family, TECHNOLOGY CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8- pungencys wide)all on single chip. At that time it was also referred to as a system on a chip. The 8051 is an 8- grab processor, meaning that the CPU can work on only 8- chips of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five transmitter two-level go bad architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static system of logical system for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode scratch the CPU season allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the programme memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it manages the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. pic Fig 2. 3. 3 Program Memory 2. 3. 4 masthead diagram of 89C51 pic Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage computer address is +5v. Gnd Pin 20 is the ground. interfaces 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. onl y the ports upon Reset are set upd as input, since P0-P3 have FFH on them. porthole 0 air 0 occupies a number of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k ohm pull up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the like way that open collector is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we rulely connect P0 to pull-up resi stors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. plot of ground P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, a nd it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash computer programing and verification. RSTReset input. A high on this pin for two machine cycles plot the oscillator is hurry resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediate ly after that activates the output ALE. Upon receiving signal from the ALE pin, the external learn (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontrollers machine cycle, a signal on this pin wampum being emitted and P0 is used now for data transmission (Data Bus). In his way, by gist of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing autograph from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strapped to GND in order to enable the device to fetch calculate from external program memory locations start ing at 0000H up to FFFFH. stigmatize, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more(prenominal)(prenominal) than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes flash counting, frequency measurement, measure width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events calamity outside the microcontroller. Let controvert how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Although polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts some(prenominal) it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers data sheets state that there are sestet interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the interrupt vector table belong to Timer 0 and Timer 1, resp ectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8bit registers. In the 8051 there is only one data type 8bits. The 8bits of a register are should in the diagram from the MSB (most important bit) D7 to the LSB (least significant bit) D0. With an 8-bit data type, any data larger than 8bi ts must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 D6 D5 D4 D3 D2 D1 D0 The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can send data in two ways parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks each uses telephone circuits with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making manageable fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051s serial communication UART circuitry divides the machine cycle frequency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is true by the 8051s RXD line. SBUF can be accessed like any other register in the 8051. The sec a byte is written into SBUF, it is framed with the start and closedown bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train mechanically starts on the pin RXD at the moment the data has been written to the SBUF register. In fact , this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is mechanically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met bit REN=1 and RI=0 (both bits interest in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In m ode1 data receiving starts as in brief as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. some(prenominal) of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 direct Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concer n person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the archetypical IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 7805 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. All it does is to convert signal voltage levels. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept 30-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 le vels. The RS232 standard is not TTL compatible therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. pic Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power opening which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need fo r the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem interface. Similarly some mobile phones will not allow you to correctly rece ive SMS text messages longer than 160 bytes (known as concatenated SMS or long SMS).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (Weve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the this instant SMS/MMS Gateway will decease with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows nosology to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architec ture of GSM network A GSM network is make up of several operational entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic wine GSM network. The GSM network can be divided into three broad parts. The Mobile position is carried by the subscriber.The bagful Station Subsystem controls the communicate joining with the Mobile Station. The entanglement Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the electrical switch of calls among the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several useable entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. lecturer carries the Mobile Station. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate crossways the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. pic Fig 2. 6. 1 General architecture of a GSM network Mobile Station The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By accedeing the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be saved against unauthorized use by a password or personal identity number. Base Station Subsystem The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Stati on. In a large urban area, there will potentially be a large number of BTSs deployed, therefrom the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in association with several functional entities, which unneurotic form the Network Subsystem.The MSC provides the connection to the fixed networks (such a s the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in th e geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscribers SIM card, which is used for au thentication and encryption over the radio channel. 2. 6. 2 swank modem(GSM/GPRS)Analogics GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items 1. Analogics GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi barbel with cable (optional other types) 4. Data cable (RS232) 5. User ManualTemperature Range Operating temperature from -200C to +550C Storage temperature from -250C to +700C Installing the modem To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the modem permly using the mounting slots (optional as per your requirement dimensions). Insert ing/ Removing the SIM Card To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card picFig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. imputeing External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically tur n ON when connection is given to it. The following is the Power Supply Requirement Connecting Modem to external devices RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which mingle the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the finish state, set out rays are go around by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and therefrom the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does dont generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCDs have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD pic VCC, VSS and VEE While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN The EN line is called Enable. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should kickoff set this line high (1) and then set the other two control lines and/or put data on the data bus. RS The RS line is the Register accept line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW The RW line is the Read/ redeem control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (Get LCD status) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay pic Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high to-low pulse to the E pin to enable the inter nal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. Arelayis anelectricallyoperatedswitch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays areswitches, the terminology applied to switches is also applied to relays. A relay will switch one or morepoles, each of whose turn overs can bethrown by energizing the hand-build in one of three ways 1. Normally-open (NO) contacts connect the circuit when the relay is activated the circuit is precipitous when the relay is inactive. It is also called a radiation diagram A contact or make contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated the circuit is connected when the relay is inactive. It is also called aForm B contact or have contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits one normally-open contact and one normally-closed contact with a common terminal. It is also called aForm Ccontact or transfer contact (break before make). If this type of contact utilizes make before break functionality, then it is called aForm Dcontact. The following designations are commonly encounteredSPST Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is obscure whether the pole is normally open or normally closed. The terminology SPNO and SPNC is sometimes used to resolve the ambiguity. SPDT Single Pole ternary Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five te rminals in total. DPST Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the ground. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.Amotor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pres sed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses anelectromagnetto open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an legature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor coil this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses the polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a RC filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a Regulated constant Voltage which is of +5V. The rectified filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in con junction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc whenever if any level overflows automatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will co mmunicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX grommet pic RX Loop pic CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project DAM level standard USING GSM-SMS has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced ICs and with the help of growing technology the project has been successfully implemented. Finally we conclude that DAM LEVEL WARNING USING GSM-SMS is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. M ITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICRO go outLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAPTER 8 APPENDIX Source code Software used Keil software for c programming About keil software It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally ru nning the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files automatically compile, link and covert using options set with an easy to use user interface and finally wear or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded application The user of KEIL centers on projects. A project is a list of all the source files required to build a single application, all the marionette options which specify exactly how to build the application, and if required how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built therefore they are stored in a project file. make full the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source files are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include include include sbit M1 = P20 sbit M2 = P21 sbit M3 = P22 sbit L1 = P35 sbit L2 = P36 sbit L3 = P37 sbit Buz = P34 void TxMsg(unsigned char *msg,unsigned char *mno) Send(AT+CMGS=) Send(mno) Delay_high(2) Send(msg) void main() bit L1_flag=0,L2_flag=0,L3_flag=0 LCD_Init() Disp_Str( wet Level ) LCD_Cmd(0xC0) Disp_Str(Warning System ) M1=M2=M3=0 Buz = 1 Delay (200) SConfig() While (1) If (L1==0 && L2==1 && L3==1 && L1_flag==0) L1_flag=1 L2_flag=0 L3_flag=0 Buz = 1 M1 = 1 M2 = 0 M3 = 0 LCD_Cmd (0x80) Disp_Str ( water Level ) LCD_Cmd (0xC0)Disp_Str (** MEDIUM **) TxMsg (Water Level MEDIUM,9951024603) TxMsg (Water Level MEDIUM,9848997946) TxMsg (Water Level MEDIUM,9966644775) TxMsg (Water Level MEDIUM,9299804677) TxMsg (Water Level MEDIUM,9849974776) Delay (200) else If (L1==0 && L2==0 && L3==1 && L2_flag==0) L2_flag=1 L3_flag=0 L1_flag=0 Buz = 1 M1 = 1 M2 = 1 M3 = 0 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** uplifted **) TxMsg (Water Level HIGH,9951024603) TxMsg (Water Level HIGH,9848997946) TxMsg (Water Level HIGH,9966644775)TxMsg (Water Level HIGH,9299804677) TxMsg (Water Level HIGH,9849974776) Delay (200) else if (L1==0 && L2==0 && L3==0 && L 3_flag==0) // Level 3 L3_flag=1 L2_flag = 0 L1_flag=0 Buz = 0 M1 = 1 M2 = 1 M3 = 1 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** real HIGH **) TxMsg (Water Level VERY HIGH,951024603) TxMsg (Water Level VERY HIGH,9848997946) TxMsg (Water Level VERY HIGH,9966644775) TxMsg (Water Level VERY HIGH,9299804677) TxMsg (Water Level VERY HIGH,9849974776) Delay (200) else if(L1==1 && L2==1 && L3==1) Buz = 1 L1_flag=0 L2_flag=0 L3_flag=0 M1 = 0 M2 = 0 M3 = 0 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** NORMAL**) KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS pic Kit photo of dam level warning using GSM SMS GSM MODEM MAX-232 POWER SUPPLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 Level-2- Level-1 RESERVIOUR MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPT S CPU back-to-back PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H