Wednesday, July 31, 2019

Hw Answer Operation Management Heizer Ch 4

4. 9 [pic] (c)? MAD (two-month moving average) = . 075 MAD (three-month moving average) = . 088 |Table for Problem 4. (a, b, c) | | | | |Forecast | ||Error| | | | |Two-Month |Three-Month |Two-Month |Three-Month | | |Price per |Moving |Moving |Moving |Moving | |Month |Chip |Average |Average |Average |Average | |January |$1. 0 | | | | | |February |? 1. 67 | | | | | |March |? 1. 70 |1. 735 | |. 035 | | |April |? 1. 85 |1. 685 |1. 723 |. 165 |. 127 | |May |? 1. 90 |1. 775 |1. 740 |. 125 |. 160 | |June |? 1. 87 |1. 75 |1. 817 |. 005 |. 053 | |July |? 1. 80 |1. 885 |1. 873 |. 085 |. 073 | |August |? 1. 83 |1. 835 |1. 857 |. 005 |. 027 | |September |? 1. 70 |1. 815 |1. 833 |. 115 |. 133 | |October |? 1. 65 |1. 765 |1. 777 |. 115 |. 127 | |November |? 1. 70 |1. 675 |1. 27 |. 025 |. 027 | |December |? 1. 75 |1. 675 |1. 683 |. 075 |. 067 | | | | |Totals |. 750| |. 793| | | | | | | | | | | |4. 9 |(d)? Table for Problem 4. 9(d): | | | | |( = . 1 | | |( = . 3 | | |( = . | |Month |Price per Chip |Forecast ||Error| |Forecast ||Error| |Forecast ||Error| | |January |$1. 80 |$1. 80 |$. 00 |$1. 80 |$. 00 |$1. 80 |$. 00 | |February |1. 67 |1. 80 |. 13 |? 1. 80 | . 13 |? 1. 80 |. 13 | |March |1. 70 |1. 79 |. 09 |? 1. 76 | . 06 |? 1. 74 |. 04 | |April |1. 85 |1. 78 |. 07 |? 1. 74 | . 11 |? 1. 72 |. 13 | |May |1. 0 |1. 79 |. 11 |? 1. 77 | . 13 |? 1. 78 |. 12 | |June |1. 87 |1. 80 |. 07 |? 1. 81 | . 06 |? 1. 84 |. 03 | |July |1. 80 |1. 80 |. 00 |? 1. 83 | . 03 |? 1. 86 |. 06 | |August |1. 83 |1. 80 |. 03 |? 1. 82 | . 01 |? 1. 83 |. 00 | |September |1. 70 |1. 81 |. 11 |? 1. 82 | . 12 |? 1. 83 |. 13 | |October |1. 65 |1. 80 |. 5 |? 1. 79 | . 14 |? 1. 76 |. 11 | |November |1. 70 |1. 78 |. 08 |? 1. 75 | . 05 |? 1. 71 |. 01 | |December |1. 75 |1. 77 |. 02 |? 1. 73 | . 02 |? 1. 70 |. 05 | | | | | 4. 41? (a)? It appears from the following graph that the points do scatter around a straight line. [pic] (b)? Developing the regression relationship, we have: (Summer |Tourists |Ridership | | | | |months) |(Millions) |(1,000,000s) | | | | |Year |(X) |(Y) |X2 |Y2 |XY | |? 1 |? 7 |1. 5 |? 49 |? 2. 25 |10. 5 | |? 2 |? 2 |1. 0 | 4 |? 1. 00 |? 2. 0 | |? 3 |? 6 |1. 3 |? 36 |? 1. 69 |? 7. 8 | |? 4 |? 4 |1. 5 |? 16 |? 2. 25 |? 6. 0 | |? 5 |14 |2. 5 |196 |? 6. 25 |35. 0 | |? |15 |2. 7 |225 |? 7. 29 |40. 5 | |? 7 |16 |2. 4 |256 |? 5. 76 |38. 4 | |? 8 |12 |2. 0 |144 |? 4. 00 |24. 0 | |? 9 |14 |2. 7 |196 |? 7. 29 |37. 8 | |10 |20 |4. 4 |400 |19. 36 |88. 0 | |11 |15 |3. 4 |225 |11. 56 |51. 0 | |12 |? 7 |1. 7 |? 49 |? 2. 89 |11. 9 | and (X = 132, (Y = 27. 1, (XY = 352. 9, (X2 = 1796, (Y2 = 71. 59, [pic] = 11, [pic]= 2. 6. Then: [pic] andY = 0. 511 + 0. 159X (c)? Given a tourist population of 10,000,000, the model predicts a ridership of: Y = 0. 511 + 0. 159 ( 10 = 2. 101, or 2,101,000 persons. (d)? If there are no tourists at all, the model predicts a ridership of 0. 511, or 511,000 persons. One would not place much confidence in this forecast, however, because the number of tourists (ze ro) is outside the range of data used to develop the model. (e)? The standard error of the estimate is given by: (f)? The correlation coefficient and the coefficient of determination are given by: [pic] ———————– [pic][pic] Hw Answer Operation Management Heizer Ch 4 4. 9 [pic] (c)? MAD (two-month moving average) = . 075 MAD (three-month moving average) = . 088 |Table for Problem 4. (a, b, c) | | | | |Forecast | ||Error| | | | |Two-Month |Three-Month |Two-Month |Three-Month | | |Price per |Moving |Moving |Moving |Moving | |Month |Chip |Average |Average |Average |Average | |January |$1. 0 | | | | | |February |? 1. 67 | | | | | |March |? 1. 70 |1. 735 | |. 035 | | |April |? 1. 85 |1. 685 |1. 723 |. 165 |. 127 | |May |? 1. 90 |1. 775 |1. 740 |. 125 |. 160 | |June |? 1. 87 |1. 75 |1. 817 |. 005 |. 053 | |July |? 1. 80 |1. 885 |1. 873 |. 085 |. 073 | |August |? 1. 83 |1. 835 |1. 857 |. 005 |. 027 | |September |? 1. 70 |1. 815 |1. 833 |. 115 |. 133 | |October |? 1. 65 |1. 765 |1. 777 |. 115 |. 127 | |November |? 1. 70 |1. 675 |1. 27 |. 025 |. 027 | |December |? 1. 75 |1. 675 |1. 683 |. 075 |. 067 | | | | |Totals |. 750| |. 793| | | | | | | | | | | |4. 9 |(d)? Table for Problem 4. 9(d): | | | | |( = . 1 | | |( = . 3 | | |( = . | |Month |Price per Chip |Forecast ||Error| |Forecast ||Error| |Forecast ||Error| | |January |$1. 80 |$1. 80 |$. 00 |$1. 80 |$. 00 |$1. 80 |$. 00 | |February |1. 67 |1. 80 |. 13 |? 1. 80 | . 13 |? 1. 80 |. 13 | |March |1. 70 |1. 79 |. 09 |? 1. 76 | . 06 |? 1. 74 |. 04 | |April |1. 85 |1. 78 |. 07 |? 1. 74 | . 11 |? 1. 72 |. 13 | |May |1. 0 |1. 79 |. 11 |? 1. 77 | . 13 |? 1. 78 |. 12 | |June |1. 87 |1. 80 |. 07 |? 1. 81 | . 06 |? 1. 84 |. 03 | |July |1. 80 |1. 80 |. 00 |? 1. 83 | . 03 |? 1. 86 |. 06 | |August |1. 83 |1. 80 |. 03 |? 1. 82 | . 01 |? 1. 83 |. 00 | |September |1. 70 |1. 81 |. 11 |? 1. 82 | . 12 |? 1. 83 |. 13 | |October |1. 65 |1. 80 |. 5 |? 1. 79 | . 14 |? 1. 76 |. 11 | |November |1. 70 |1. 78 |. 08 |? 1. 75 | . 05 |? 1. 71 |. 01 | |December |1. 75 |1. 77 |. 02 |? 1. 73 | . 02 |? 1. 70 |. 05 | | | | | 4. 41? (a)? It appears from the following graph that the points do scatter around a straight line. [pic] (b)? Developing the regression relationship, we have: (Summer |Tourists |Ridership | | | | |months) |(Millions) |(1,000,000s) | | | | |Year |(X) |(Y) |X2 |Y2 |XY | |? 1 |? 7 |1. 5 |? 49 |? 2. 25 |10. 5 | |? 2 |? 2 |1. 0 | 4 |? 1. 00 |? 2. 0 | |? 3 |? 6 |1. 3 |? 36 |? 1. 69 |? 7. 8 | |? 4 |? 4 |1. 5 |? 16 |? 2. 25 |? 6. 0 | |? 5 |14 |2. 5 |196 |? 6. 25 |35. 0 | |? |15 |2. 7 |225 |? 7. 29 |40. 5 | |? 7 |16 |2. 4 |256 |? 5. 76 |38. 4 | |? 8 |12 |2. 0 |144 |? 4. 00 |24. 0 | |? 9 |14 |2. 7 |196 |? 7. 29 |37. 8 | |10 |20 |4. 4 |400 |19. 36 |88. 0 | |11 |15 |3. 4 |225 |11. 56 |51. 0 | |12 |? 7 |1. 7 |? 49 |? 2. 89 |11. 9 | and (X = 132, (Y = 27. 1, (XY = 352. 9, (X2 = 1796, (Y2 = 71. 59, [pic] = 11, [pic]= 2. 6. Then: [pic] andY = 0. 511 + 0. 159X (c)? Given a tourist population of 10,000,000, the model predicts a ridership of: Y = 0. 511 + 0. 159 ( 10 = 2. 101, or 2,101,000 persons. (d)? If there are no tourists at all, the model predicts a ridership of 0. 511, or 511,000 persons. One would not place much confidence in this forecast, however, because the number of tourists (ze ro) is outside the range of data used to develop the model. (e)? The standard error of the estimate is given by: (f)? The correlation coefficient and the coefficient of determination are given by: [pic] ———————– [pic][pic]

Tuesday, July 30, 2019

Gamefowl Breeder

The establishment or â€Å"fixing† of such characteristics Is accomplished by repeated Infusions of those heartsickness without concern for genealogical purity or so called breed names. All which follows is merely an expansion and development of those principles. Throughout the following pages you will find the pronoun â€Å"l† used frequently. It Is strictly a style of writing. An informal conversation style, as If we were talking together, which makes for easier reading and clearer understanding.Definitely it is not a â€Å"know it all† attitude or any desire to pose as an authority. Rather it represents an honest expression of opinion based upon my own experiences. – Narragansett Chapter 1 The Uncertainties of Breeding The transmission of hereditary characteristics is beyond the comprehension of mankind. Our greatest scientists have identified, classified, named, and theorized upon the numerous factors involved, yet have never been able to create a livi ng organism or to predict with certainty what the various elements in combination would produce.Accordingly, it is no wonder that the most scientific practices result in failure, whereas an obscure and Improbable combination occasionally produces phenomenal results. An example of the latter comes to mind: (a) The Berg Blue Muffs which first were produced by a 16-year-old boy from a wild combination of game fowl. (b) The world's champion harness horse, Peter Manning, which was sired by an obscure young stallion mated to a slab sided mare which Warren Wright hitched to his wagon while delivering his yeast cakes. C) The Thomas W, Murphy family of â€Å"Abraham† fowl which resulted from a stolen nest mating of an unknown cook and a stray hen which hatched and raised her brood of chicks upon the grounds of Mr.. Murphy's neighbor, Abraham Strauss. Hence the name Abraham. These are but a few examples, no doubt you can enumerate many more. They are what I call â€Å"lottery ticketâ €  mating. You buy a lottery ticket for 50 cents and win a thousand dollars. Occasionally. But it can be done and has been done. It is the breeding practice followed by most cockers.Once in a great while they hit the jackpot, but 99% of the time they have to tear up the ticket and buy another one. From these examples you should recognize that there Is no sure fire formula for producing 100% winners. The most that we can hope to do is present a breeding system which on average will Improve your chances AT ruling above TTT level. 10 want extent you exceed sun bevel depends upon your personal qualifications of observation, selectivity and perseverance, remembering always that there are a hundred requirements for winning a cook fight, and a thousand ways to lose one.Breeding is only one of the many factors involved, but it is an important one, so lets see what we can do to improve our chances in that respect. Chapter 2 Things to Avoid I abhor the term PURE as applied to game fowl. In my 45 years experience I never found such to exist. Not genetically pure. You frequently hear reference to pure Hatch, or pure Keels, or pure Murphy. I knew intimately all three of these men during heir lifetimes yet never once did I ever hear one of them use the term pure when referring to his own or anyone else's fowl.They might say â€Å"this is what I call my number four yard, I've bred them together for several years along with their offspring, but they are coming small now and getting a bit fragile so I think next year I'll put another one of my socks in there to stiffen them up. † Or, â€Å"Walter sent me this cook which I've bred for a couple of years with good success. † But never † my pure No. 4 yard† or a â€Å"pure Keels cook. † They knew that such things did not exist, and never had existed, either on their yards or anyone else's.So many times people get a hen and a cook from a prominent breeder's yards and thereafter refer to them as p ure this, that or the other. That's crazy. The breeder himself, if he were honest, would not describe them in such terms. Just because both sides of the mating came from the same source does not make them pure. Far from it. Chances are that the prominent breeder has a dozen or more breeding yards on his place. Probably many of them are more or less related. Some may be inbred or lingered to a greater extent than the others. But it is a certainty that no two of them are the same, and not one of hem is pure.So how can the fowl you get from him be pure in the genetic sense and thereby be capable of transmitting characteristics with unfailing certainty? My great objection to the word pure is the harm it does to cockers who lean upon such erroneous term and rely upon those MIS-named fowl to transmit consistently the characteristics for which the family is noted. That's bad. Leads to all sorts of disappointments and loss of confidence. Breed Names Breed names are another one of my pet pee ves. People toss them around as if they were talking about some stable uniform substance like salt or sugar or soda.The truth is that such names so inaccurately describe the fowl being discussed as to be practically meaningless. A bird is referred to as being a pure Dad Glenn Whitehall, or a straight Albany, or an old-time Carney. The bird may be a good one, so far as that is concerned, but so far as his being what his name implied, it's dollars to doughnuts that the relationship does not exceed 10%. Here again the harm in using breed names is that it misleads others into thinking that they can procure the same good results as you have experienced simply by using a bird bearing the same breed name.The chances are that the two birds are not 5% related. For 32 years I was state distributor for Dodge automobiles. Upon countless occasions customers would come in and announce There's no need for you to give me a sales pitch, I know all about a Dodge. † So long as he was satisfied t here was no need to say witling, out ten truth was Tanat tender was not a nut, Dolt, Lemons, or engineering principle which was the same in this present Dodge as in the two or three he had owned previously. Only the name remained unchanged. The same situation exists in respect of breed names in game fowl.So, let's forget â€Å"breed names† and â€Å"purity† and examine the essential characteristics our brood fowl must possess, for such characteristics form a basis or foundation for this breeding system. Chapter 3 What to Look For Gameness Proper brood fowl must have many essential characteristics. Chief among them is that which commonly is called gameness. There has been so much written on this subject that I hate to mention it. All these three day tests, punishment tests, descriptive requirements have been worn threadbare. So I'll treat the subject here briefly and then drop it.If fowl do not measure up to my idea of gameness, I simply am not interested in them. Here it is: † An unquenchable determination to kill. † No matter what the conditions– ahead, behind, rattled, blinded, broken leg, no matter what. I want to see my brood cook ever and always trying to kill his opponent. All defensive fighting or â€Å"lying on his side, picking for an hour in a 120 degree sun† does not impress me at all. If he is not trying with all his heart every second to kill his opponent, regardless of all handicaps and circumstances, I Just am not interested. You can continue the discussion as long as you wish, but count me out.Proponents Let's start with the cook. Do you think with the acquisition of an ideal brood cook will be easy? Don't kid yourself. No matter how much money you spend, or how many high class events you attend, or how many top cockers you know, your chances of procuring an ideal brood cook on your first, second, or third attempt is very low. You could strike gold on your first claim, but the chances are that you will no t. But, don't give up. Persistence is one of the prime prerequisites of a successful breeder. In the first place the cook must be proponent. That is, he must be capable of passing along his own excellent qualities to his offspring.There is no way of determining whether or not a cook possesses this quality of proponents other than by trial and experience. No matter how marvelous a performer he is himself, if he does not pass along such qualities to his offspring he is of no value to you. I have seen countless instances, and probably you have too, where a fellow paid a big price for an outstanding performing cook only to have him produce nothing of merit. But because the fellow paid a big price for him he stuck with him year after year, and in the end it cost him many times the original price through using the worthless offspring.So be ever on the alert for this quality of proponents. A cook either has it or he hasn't. But if he does not have it, heave him right now. You can't change the situation, and you will only waste many years and much money by sticking by him, regardless of his source or price. The probabilities, and note that I say probabilities, for there is no certainty about it, are that a cook is more apt to be proponent if he is somewhat lingered or inbred rather tan Delving ten product AT a TLS cross. You wall nave to determine tens Trot ten man who bred him.Also you should ascertain if such cock's brothers, father, uncles on tot sides, etc. , If they did, your chances are improved. But if you find wide variations, where this fellow is merely an outstanding performer in a widely variable and commonplace family, you had better stop right there, for the probability of this guy reproducing himself is dim. Health Health. Robust, vigorous, teeming health. Big appetite. Easy mould. Ever aggressive. â€Å"Spring Busting Out All Over† type of health. It's one of the most important characteristics your brood cook can possess.Without it you are not go ing to be able to go very far in the breeding line before you break down. Peter Horrors use to pay more attention to a fowl's health record and that of his ancestors, and the conditions under which they where raised, than he did any other characteristic when selecting his brood stock. So give this feature great weight when selecting your own brood fowl. If you start out with some spindly, weak, thin feathered inbred â€Å"pure† cook of such and such a â€Å"breed name† you are not going to get very far. And the longer you stick with him the more time and money you are going to waste.Power More or less the same importance attaches to the feature of power. You can improve his quality by breeding to big strong brood hens, but each time you do it you are breeding away from the brood cook, thereby reducing his influence upon the line. Remember, what we are talking about now is the selection of a brood cook whose characteristics you wish to perpetuate. Accordingly, you shoul d start out with power as a prime prerequisite. It is a top requirement for a successful pit cook, so don't handicap yourself from the outset by selecting a brood cook which is deficient in this repeat.Cutting High on the list of priorities for a brood cook is that of cutting. If a cook does not have his quality I simply will not use him in the brood yard no matter how many other desirable qualifications he may possess. He may be healthy, game, strong as a bull, but if he is not a superior cutter I am not interested in using him in the brood yard. Butting is largely a matter of heel pinpointing a manner of striking. It is astonishing how many socks strike on the curve of the blade, or with their hocks or the bottom of their feet. Likewise, many socks never complete their stroke.They don't follow through. In baseball parlance they bunt, instead of swing. Their wings may make a great Mack which gives the erroneous impression of delivering a mighty blow, but their heels are bunting ins tead of swinging. Many times you will here someone say † now he is getting tired he will begin to cut. † And he does. But I always felt that such cutting was more the result of the adversary standing still or being immobile than it was of the first cook cutting better. In other words, he could hit a sitting duck but not one on the fly. I am not impressed by that sort of cutting.Any shooter can hit a tin can setting on a Thence post. I want ten Klan Tanat can â€Å"molten on ten TTYL. † It I for the eye to follow the movements of a cock's heels. At leas it is for me. But almost anyone can see the results of a blow. After each buckle or exchange of blows if you see that one cook appears to have shrunk about a pound, you can be sure that the opposing cook has done some effective cutting. â€Å"Look where he hits. † This is an obsession with me. If a cook does not look were he is hitting and strikes nothing, I want no part of him.So many socks have good leg act ion and strike properly but don't look were they are striking. They fan the air in all directions but hit nothing, wear themselves out and do no damage. On the other hand certain socks â€Å"draw a dead,† as gunners say, with every shot. If you are in the pit with him, or close by, you can see his eyes focus upon a certain portion his opponent's anatomy-head, breast, back- and strike within a quarter inch of where he is looking. It does not take many blows so directed to bring an opponent down. One such crack is more effective than a hundred wild failings in the air.Years ago old M. J. Bowen sent me a stag which had won seven times in short heels in his first season and was up for his eighth fight. I told M. J. To â€Å"cut it out† and send him to me, which he did. When the stag arrived I was gusted with him, long flat body, narrow shoulders, built Just like a duck. Nothing prepossessing about him. But when I sparred him I could see those beady eyes concentrate on a de finite spot every stroke he hit with marksmanship accuracy, and in no time at all he had my prize brood cook on the ropes. He taught me a lesson I have never forgotten.Weaknesses Rare is the cook which does not have a weakness of some sort. He may have a host of grand qualities, but if he has even one pronounced weakness his opponent is almost sure to find it and take advantage of it. The weakness could be any one of many: low- datedness, ducking,etc. You can breed out this weakness in time,but while doing so you are breeding out his good qualities as well. The result is that his influence in the line becomes lost entirely and you might Just as welling have started with him in the first place. You can't breed out the faults and remain the virtues.When one goes they all go. So in selecting your brood cook make sure he has no prominent weakness which you must get rid of. Chapter 4 Fighting Characteristics No two pope agree on how a cook should fight. Even after a fight is over they se ldom agree as to what enabled the one to win and caused the other to lose. One man is impressed by certain characteristics the other man by different ones entirely. The type of heel used causes further differences if opinion. Undoubtedly all of us are influenced by our early teachings. Subconsciously we remember what Uncle Ben or Old Man Smith told us years ago.Their teachings could be right or might well be wrong. I've seen men who've been fighting chickens for 60 years who were the poorest Judges of a cock's fighting form of anyone at pit side. Many times a man's wife sees more, is more realistic and factual, and is a far better Judge than the cocker himself. The latter is handicapped by prejudices and early teachings. The wife is not. She sees things as they are. Accordingly, it is vitally important for the cocker-breeder to develop a correct standard of fighting counterblasts AT Nils own. I T en does not ay tens – Tree Trot prejudice or sentiment- he is not going to get f ar.We have already discussed the important fighting characteristics of gameness, cutting, power, deliberate accurate striking, ability to remain punch, balance and the absence of any pronounced fighting weakness or fault. There are numerous features to be considered and evaluated. I call them my â€Å"check sit. † Before every mating season I go over them as they apply to each individual in the brood pens. They serve as reminders, for it is so easy to forget or overlook important requirements. 1 . Quickness. I emphasize quickness as opposed to reckless and purposeless speed.Quickness takes a variety of forms: (a) Quick to take advantage of an opening or opportunity. (b) Quick to beat opponent to the punch and keep him off balance. (c) Quick to get a second lick in the same buckle. What boxers term the 1-2 punch Many times it is this second lick, delivered when the opponent is off balance or motionless, which does he damage. (d) Quick to kick instantly on both his own and his opponent's bill hold. This is both an offensive and defensive move. All long heel men are acutely aware of the importance of this characteristic, since a single failure could bring disaster. E) Quickness is largely a matter of reflexes which can be sharpened by conditioning, but it is also inherited, so be mindful of is existence. 2. Fight High. It is an advantage of a cook to fight over on top of his adversary rather than being underneath him at all times. This refers not merely to the opening break but throughout the battle. Some socks naturally fight high, others tend to fight low. The style is largely inherited, so watch out for it when selecting your brood cook. 3. Reaching Out. Some socks reach out in front of them with their blows much farther than others. Hose are usually the ones which are â€Å"in† first. At present I am breeding a cook, in preference to one of his many brothers, solely because he reaches out so far with his blows. I first noticed this while catchin g him when he was still ugly and wild. Overtime I attempted to grab him he hit me not on my hand but on my elbow. He really reached out every shot. He did the same thing in his battle. Dropped his man the first shot. One time I was fighting a main against Tom Murphy who was the finest judge of a cock's fighting style I ever knew.After the main (which I won 5-4) he said to me, â€Å"l thought that second cook you fought was the best bird of the day. † I felt complimented but at that time was in the prejudiced â€Å"beauty† stage and replied,†Ã¢â‚¬Ëœ rather preferred my fourth cook. † He cast a withering eye at me such as a school teacher might use upon a second grader, and said,† You did! Well I didn't That second cook of yours broke high, head back, feet way out front. That's the kind that an kill you with one lick and that's Just what happened. † It occurred years ago, but it was a lesson I never forgot. I hope to pass it along to you.It's what I mean when I said â€Å"you must develop a standard of fighting characteristics of your own, free from prejudice and sentiment. † 4. Finishing. Some socks tend to loaf once they get in front. That's bad. It gives the opponent a chance to recuperate and to even up the battle with an effective blow of Nils own. Once a cook gets out Toronto en snouts Tallow up to Nils advantage. Nils Is t e time for him to show his killer instinct and put his opponent away then and there. One well known cocker put it this way,†Any cook which knocks his opponent down then lets him get away is no cook at all. That is the time for the top cook to become doubly bitter and revengeful. If he doesn't, well, you heard what the man said. 5. High Head Years ago low-headiness was a common fault among shorten socks of the northeast. The advent of fast heels and greater acquaintanceship with long heel fighting was pretty well eradicated that defect though you still see occasional evidence of its exis tence. It is a serious fault. Avoid it. 6. Fight. Tom Foley who ran the famous pit at 7 SST. Marry Eave. , Troy, N,Y. Use to wrap up all these qualifications by using a single word. â€Å"Dimmit all,† he would say,† they can FIGHT. By that he meant that the cook was pushing the battle all the way, aggressive at all times, lashing out with straight line shots, landing in perfect balance, ready instantly to shoot again, cutting every fly, â€Å"sharpshooters† he used to call them, constantly moving about , never allowing himself to be a standing target. â€Å"l want to see him be doing something all the time,† he used to say,† I don't care what it is, but I want to see him be doing something and not Just standing around waiting to get killed. Tom didn't give one whoop for pedigrees, breed names, color, conformation, or anything else. He wasn't even too fussy about gameness.He wanted a cook that could FIGHT. 7. See For Yourself. Before concluding this c hapter on Fighting Characteristics, let's go back to the initial statement which said,†No two people seem to agree as to how a cook should fight. † You are the breeder. You are the open who must make the initial selection of brood stock and likewise all the subsequent selections which equally careful discrimination. How skillfully you do this depends upon your own personal observations and judgment. But one thing is certain: you must absolutely see the fowl fight yourself. You can,t depend upon others. No two of them will see the bird or the fight the same way.If you accept the Judgment of everyone, Dick, and Harry you will end up with a Hodge-podgy which can't lick anything. You, yourself must be consistent and persevering in what you are trying to accomplish in the brood yard. In order for you to do this you must absolutely see the individuals perform yourself and pass judgment on their qualifications for fitting into your line. Time after time I have visited a breeder who pointed with pride to a certain cook and said,†Ã¢â‚¬Ëœ am setting side this cook to breed then he would go on and on as to the marvelous qualities the cook has exhibited the battle as described by the trainer or handler.The breeder has not seen the fight. I had. I would not have accepted the cook as a gift; for breeding, fighting, or anything else. Wouldn't have him on the place. Yet the breeder, accepting someone else's word, was going to breed him! The breeder did not know that I had seen the fight, nor did I tell him. Why start an argument and lose friends? But it does show the absolute necessity for you yourself to see the cook in action and appraise his qualities according to your own standards. Deliberate Striking This is closely related to â€Å"Look where he hits. How many times have you been miles out In Toronto, to 20, Ana all Tanat when, Dang! Ana well -Loretta alternate snot NAS dropped you cold? This was no accident, it happens all the time. It shows the val ue of deliberate striking. Pay attention to it when selecting your brood cook. Holding His Punch In all probability you have seen a great big fine looking cook, shoulders on him like an All American tackle, legs as big as a turkey, strong enough to pull a plough, yet at the ND of a few fittings could not lift his legs two inches from the ground, let alone cut or strike anything. No condition† some peptides comments. That's not it at all. Chances are that his inferior looking opponent who is whaling the daylights out of him is not in nearly as good physical shape. The difference between the two is a matter of back muscles. The homely looking bird has them. The big fine looking cook which is built like Apollo does not. The latter may well be able to pull a plough, but if he does not have well developed back muscles he is not going to kick very long. Which reminds me of the All Pro football player who went to a dude ranch.At the end of a four hour horseback ride the little scrawn y wrangler hopped off as spry as could be. The football player Just sat there. He was so sore and tired that he could not dismount, and would have been unable to stand if he had. The difference between the two men was that the alternating had saddle muscles and the football player did not. He was helpless even though he could have squashed the wrangler with one hand. This matter of back muscles seems to be a hereditary trait. You can't develop them a great deal through exercise or feeding. A cook either has them or he doesn't.You may be able to improve the deficiency by breeding the cook to hens which are well endowed in this respect, but it is much better to start off with a cook which does not have such a deficiency. The only sure way to determine this important characteristic is to see him or his brothers in action. The trait seems to run in families. If one brother is good or bad in such respect, the other brothers are apt to be the same. Where this appears to be a hereditary tr ait it is especially important for you to be sure that your brood cook is well developed in this respect. Balance Proper balance is another characteristic of great importance.It, too, is hereditary. A cook must be a great cutter and all that even though ill balanced, but he could do the job a lot easier if he were balanced properly. Besides, his sons very probably would inherit the bad balance without the old man's skill in cutting. Proper balance's difficult to describe in words. It has to do with the position of the bird's legs with respect to his body, the shape of the body and it's weight distribution, and a lot of other things. A duck's legs are set on ideally for swimming, but not for walking or striking. That gives you an exaggerated example.You look at enough game socks long enough with this thought in mind and pretty soon you'll be able to see which ones are well balanced and which ones are not. Some families are far better balanced than others. A poorly balanced bird is ap t to fall on his tail or his nose after delivering a blow, or land in a heap which is worse. He is a sitting duck for a well- balanced bird. On the other hand a properly balanced bird will deliver his blow, land in perfect balance ready instantly to strike again or avoid his opponent's blow. One of ten greatest Dressers I ever Knew placed great store on tens Pensacola centralists.He call it â€Å"balance† and was ever and always referring to it. We use to poke fun at him by saying â€Å"balance† when he was not around, but he impressed the importance of this feature upon me, and I hope I can do the same for you. The only way you can procure â€Å"balance† is to breed for it. You can't change it by feed or exercise. A bird either has it or doesn't have it from day one for as long as he lives. So start out by seeing that your brood cook is properly balanced, for a deficiency in this respect is difficult to breed out of a family, Just as it is difficult to breed ou t low headiness or ducking. Size I don't like to breed from a big cook.About 5-4 for a cook in fighting trim or 4-14 for a stag is as large as I care to go. This matter of size is different for hens, bought we will go into that later. I want the cook to be full of action, cutting ability, and all the other pit qualities to be described later. But size is not a primary factor provided he is solidly built. As an example, right now I am breeding a cook which fought at 4-4 as a stag. He was full of action and cut. But I would not think of breeding his sister who was proportionally as small for a female. Youth vs. Age Especially in the brood yard. I am a great believer in youth.You hear about the â€Å"grand old hen† and the â€Å"great $10,000 cook,† but most of the time your best performers will come from young stock. Some people term it in the percentage. I have the utmost respect for proven old producers, but most of the time age is a handicap. Certain mating of cook an d hen will turn out phenomenal offspring. But even in this case I would rather have the produce of their early years than after they were â€Å"getting along. † I have had a few such mating myself which I kept together for several years. Probably longer than I should. But in every case the quality of their offspring dropped noticeably with each passing year.In my opinion more good families have been â€Å"lost' through endeavoring to perpetuate them through the use of old parents than from any other reason. Accordingly, if you are fortunate enough to locate a truly superior combination, plan to carry them on through the use of vigorous offspring of their earlier years rather than â€Å"breeding back† to the original individuals after they have gone by. This is particularly true of the hen. She may look and act like a pullet, but her reproductive apparatus has deteriorated, even though you can't see it. For some reason or another the cook seems to last longer so far as reproductive qualities are concerned.Many times he turns out good ones as long as he remains vigorous and fertile. But such is not the case with the hen. My grand mentor,old Balance, absolutely refused to breed a hen after her fourth year. This theory or practice will offend many old timers, and they can hurl a barrage of evidence at me. But you can believe them or believe me. This has been my experience. Many times in the past I have tried to â€Å"revive† famous old families by breeding to the Queen Bee of the dynasty. The grand old hen who was now a eager. One time Lenin Law sent me such a hen.Many of her sons had won at Orlando which at that time conducted the premier cocking event in America. I could scarcely believe my good fortune. Bred her the finest young cook that I owned. What GE A Duncan AT weaklings! I guess Law Knew want en was long when en gave her to me. Hopefully in time you will have occasion to do a certain amount of inbreeding or line breeding. I endeavor to avoid intensive consanguineous mating as far as possible, but in time it catches up with you. Under such circumstances carry on with the best specimens of your young stock in the family. The younger the better. Don't â€Å"go back† to your old worn out originals.This is contrary to general practice, but it is definitely my recommendation. Chapter 5 Physical Characteristics Many writings on breeding game socks begin, and end, with a description of the physical characteristics a good brood cook should possess. These writers consider such requirements of primary importance. In their opinion they rank first. With me they rank last. Championship performers in all sports come in a variety of shapes, sizes, and colors. With me it is only the performance which counts. Physical heartsickness are important only insofar as they enable the individual to perform more easily and effectively.We are not breeding fowl for beauty contests or to win a ribbon at the County fair, we are breed ing them to win in the pit. There are certain physical characteristics, however, which enable a cook to perform more easily and effectively. They are no guarantee that the cook will do the Job, but only that he is not handicapped physically in such effort. We will discuss them here briefly in order that you may be on the lookout for them. Body Personally I prefer a well-rounded body, where the keel bone is relatively short from rent to back, and also short from top to bottom.Such confirmation usually makes for good balance, the value of which has been discussed previously. I don't go for these excessively broad shouldered heavy breasted type with all the weight out front. The â€Å"flat iron† type. Such confirmation is a handicap to a cock's ability to cut. He is apt to straddle with his blows, since he can't â€Å"close in† with his shots due to that heavy breast getting in his way. Rather, I prefer for him to be built like a football-more or less pointed at both ends . Station I like for a cook to be above average station, but not excessively so.The length should be in the thigh bone, not in the shank or scaly part. Length in the thigh enables him to â€Å"reach out† farther. Likewise a pronounced bend at the hock Joint is essential. Somehow or another it seems to help in the cutting department. I never saw a cook whose legs were straight up and down like a stork's which could cut much. If a cook is somewhat knock-kneed that is alright too. It's not pretty to look at, but nearly every knock-kneed cook is a cutter. Some people are real fussy about having a cock's heels set down close to his feet. Probably that is O. K. But I never paid much attention to it.Other things were more important. One thing which is essential is for his legs to be set on him properly so that he is in perfect balance. This usually means that his legs are set pretty well forward. One good Judge expressed the same thing in reverse by saying, â€Å"l like to see plen ty of body behind his legs. † The old guy got me to start looking at a cook in the same way. Actually it is easier to see the amount of body behind the body than it is to see if the hip Joint is set well to the front. At least it is for me. Another thing which you might look for is the way he walks. If he puts one foot

Social relations

Technological advancements in recent times has actually brought the world closer, the use of internet and communication technologies has closed the large geographic gap between the people. Use of social networking sites, forums and portals has facilitated and addressed the common feelings, issues and concerns. The messages of people can be made public with minimal effort. Technology has made our life easier and faster, saving considerable amount of our valuable time, thereby easing the burden of manual task.Be it marketing or availing other useful online services, technology has provided a solution to every human need. Biotechnology and nanotechnology have added value to human life, in terms of medical treatment and opened the door of new possibilities. However, misuse of technology has posed a larger threat than ever expected. A lot of abuse cases are being increasingly reported.Threats like phishing and malicious e-mails containing viruses and Trojans have led to loss of data and p ersonal details. Due to use of communication and computer technologies, personal information flow comes into a network of marketers very easily. Once your personal details are divulged to a particular agency in the web loop, it is circulated incessantly. It hurts the privacy of innocent customers. Sometimes, culture and traditions are compromised in the name of technology.Social relations are hurt because of excessive use of technology; socializing has taken a back seat with most of the youth stay engulfed with short-cuts provided by technology. It also brings a social divide between â€Å"haves† and â€Å"have-nots†, as technology usage is mostly concentrated with the higher income group folks. Unfortunately, technology also makes the people lethargic and easy-going, thereby roping in increasing health related complications.

Monday, July 29, 2019

Article Review-how Collectivism affect management(International Essay

Article Review-how Collectivism affect management(International Management) - Essay Example Firstly, the majority of existing inquiries studied the issue within formal organizational setting while Van Dyne and colleagues examined organizational citizenship of residents in a housing cooperative setting where roles were not influenced by traditional employee-employer work relationships. Secondly, the study not only looked at the mere relationship between collectivism and propensity to trust and OC, but also explored the process that links the antecedents to OC. Van Dyne identified one mediator (Organization-based self-esteem) and one moderator (organizational tenure) to provide insight into the process that links these antecedents with organizational citizenship. The study involved almost 1500 participants, was conducted in two stages with 6 months between them. During the first stage the authors measured collectivism, propensity to trust, organization-based self-esteem, and the control variables using specific questionnaires. The second stage was dedicated to measuring the dependent variable, organizational citizenship. The results largely supported Van Dyne’s hypotheses and demonstrated that in non-formal organizational setting individual differences between participants (collectivism and propensity to trust) have substantial influence on OC. In particular, the authors discovered that after accounting for the effects of the main control variables including national citizenship, cooperative, and in-role behavior, both hypothesized antecedents positively correlated with subsequent OCB measured six months later. Besides, the role of organizational-based self-esteem (OBSE) as valid mediator of the effects of collectivism and propensity to trust on OC was confirmed, while organizational tenure moderated the relationship between the propensity to trust and self-esteem. Interestingly, tenure was not found to moderate the relationship between collectivism and OBSE. Usefulness analysis carried

Sunday, July 28, 2019

EVALUATING USE OF E-COMMERCE IN A BRICK AND CLICK ORGANIZATION THAT Essay

EVALUATING USE OF E-COMMERCE IN A BRICK AND CLICK ORGANIZATION THAT BALANCES ECOMMERCE WITH A CONTINUED HIGH STREET PRESENCE - Essay Example Virtual organizations conduct all their business operations on the internet. On the other hand, brick and click organizations rely on e-commerce to carry out some business activities although this is only adopted as an additional marketing channel. As more and more businesses target at increasing their potential buyers and sales bases, they are making migration from brick-to-click technology. According to Hensman et al., (2001, p. 237), the most important development that has occurred recently in the business world is the adoption of e-commerce. E-commerce refers to a process of selling, buying, exchanging or transferring products and services through computer networks. E-commerce has revolutionized the way organizations conduct business and opened up new opportunities. E-commerce is used by businesses for electronically processing orders, dealing with customer service and enhancing the relationship with distributors and suppliers. Businesses that are not seeking to adopt e-commerce risk of being overtaken by competitors that utilize such technology (Hensman et al., 2001, p. 237). E-commerce is conducted using intranets, internet or extranets and other support technologies. Nevertheless, e-commerce comes with security risks which organizations should understand and manage them. The paper will evaluate the use of e-commerce by Tesco Company which is an example of a brick and click organization to improve business operations. ... Some of the nonfood products sold by the Tesco Company include clothing and electronics (De Toni and Tonchia, 2003, p. 947). The retail also offers various services such as entertainment and insurance. Tesco also has branches in other different countries such as China, Hungary, US and Thailand and employs more than 440,000 people globally. The company has been able to remain ahead of its competitors by employing different strategies such as mergers, acquisitions, expansion and reliance on technology. The success of the company may also be attributable to strong leadership and innovation (De Toni and Tonchia, 2003, p. 950). One of the most notable developments by Tesco happened in 2000 when Tesco.com was launched. In 2001, the Chief Executive of the Tesco acknowledged that e-commerce is a major development to the company which helped change the relationship between the company and its customers. Tesco.com is among the best online shopping systems globally as the website is able to tak e more than 70, 000 orders weekly. The websites helped change the purchasing behaviors of customers as they do not have to physically get to the stores to buy their groceries. The website essentially offers customers the benefit of shopping from the convenience of their homes and to have their products delivered there (Palmer, 2004, p. 1075). When ordering online, customers can have their products delivered the next day or they can even order 28 days prior to the delivery. Tesco has further developed an online system to allow customers to make purchase from their Smart-phones. This is a form of e-commerce known referred as the mobile commerce

Saturday, July 27, 2019

Business Law Essay Example | Topics and Well Written Essays - 1250 words - 3

Business Law - Essay Example FMLA is focused at addressing five major issues. First, the Act covers the birth of the employee’s child and the care of the child. Secondly, the Act caters for the placement of an employee’s child for foster care or adoption. Thirdly, family and medical leave Act of 1993 caters for the care of the employee’s parent as well as the child either a daughter or a son with serious health problems (Family and Medical Leave Act Regulations.1990). Fourthly, the FMLA caters for the serious health condition of the workers that makes them not to perform their duties as required by their employers. Fifthly, it caters for any qualifying exigencies that may arise due to the deployment of the employee’s family member. Upon returning from their leave, FMLA requires that the employers must provide the employees with protection and benefits that they may have received if they were working. Most notably, the act covers 4 aspects that the employers must provide to the eligibl e employees who return from their leave (Galinsky et al, 2008). First, employees must be provided with the health benefits that they would receive if they were working. Secondly, upon returning from the leave, the FMLA requires that the employees must be restored to the same position. ... alth condition or that of a family member must be allowed to have a leave to attend doctor’s appointments for such cases as chemotherapy and psychological counseling among others. Family and medical leave Act of 1993 requires that an employee must provide an employer with a 30 days notice of his or her intention to take a leave (Family and Medical Leave Act Regulations.1990). In cases the leave comes due to emergency, it is the responsibility of the employees to notify the employers as soon as possible. Similarly, the Act maintains that an employer may request for a medical certification in case the employer is taking a leave due to serious health problem related to him or her or a family member. In situation A, employee A was eligible for the 11 weeks leave since he had worked in company X for 12 years. On his part, the new manager reinstated the employee to his previous job at the previous rate of pay. This indicates that even if the manager was new, he acted within the requ irements of Family and medical leave Act of 1993. As indicated earlier, the FMLA indicates that the leave must be unpaid, implying that employee A was not eligible for the salary from his 11 week leave. This indicates that by denying the employee the salary, the manager did not violate the law and as such there was no violation that occurred in this situation A. Situation B Age Discrimination in Employment Act of 1967 (ADEA) gives protection to the employees who are 40 years and above from been discriminated by their employers (Age Discrimination in Employment Act of 1967). According to this Act, that covers both the job applicant and the existing employees, it is unlawful for any employer to discriminate a worker based on his or her old age in respect to the employment benefits that includes

Friday, July 26, 2019

Communications 215 Essay Example | Topics and Well Written Essays - 750 words

Communications 215 - Essay Example I agree with Ezenberger that the media has industrialized the human mind in the way that it has now come to influence our thoughts (Berger, n.d). In my own experience, whatever opinions I have on what is the best brand of toothpaste to use, or which shampoo gives the most silky hair, all come from what I have seen on television; without having access to a television, I would not have had these ideas at all. Moving onto how the media is "amusing" us to death, Postman believes that the main focus of television is to fill the human life with "triviality and incoherence," and to instill in us the belief that life is like some kind of circus show where the point is just to be entertained (Berger, n.d). For Postman, television is only instructing us what products to buy in order to bring excitement into our lives (Berger, n.d). While there are many television programs that try to educate viewers, I believe that most television channels have an agenda to simply amuse the audience and keep t hem in a sedated state where they do not care about the more important things in life. (A2) For Jameson, postmodernism entails a blurring of the lines between what is regarded as high culture and mass culture in modernism (Berger, n.d). Since postmodernism does not believe in metanarratives and is eclectic in the way it defines things, for Jameson postmodern art maintains no division between elite and popular culture, and that "anything goes," (Berger, n.d). The postmodern landscape is "degraded" in the way that it is composed of "schlock art" (Berger, n.d). I do agree that in the postmodern era there is a kind of art that eliminates the previous boundaries between elite and popular culture; for example, Marcel Duchamp constructed a ceramic urinal and passed this off as postmodern art, thereby blurring the lines between high and low art. (A3) Baudrillard's theory on the effects of media is influenced by the notion of simulacra; he claimed that in today's postmodern era which is domi nated by the media, there are not true copies of something, there are only "simulations of reality which aren't any more or less "real" than the reality they simulate," (Mann, n.d). For Baudrillard whatever we see in the media becomes our reality, and seems more real than what is actually real. These simulacras, these images of things that do not exist in reality, become part of hyperreality. As Baudrillard rightly states, postmodernism entails " the death of the real," since we are connecting more and more with media where the content "merely simulate reality," and thus living in a kind of hyperreality that is not real (Mann, n.d). I can see this in the way that we relate to actors on TV; I myself have spent hours with my friends discussing Blair and Chuck's relationship in the TV serial Gossip Girl, as if we personally know them. There are often times when I feel I can connect to people from TV shows more than I can relate to my own family. This all shows that media has created a hyperreality with simulacras that we are now relating to more than we relate to real life. (A4) For Rheingold, a smart mob has emerged from the onset of mobile phone technology (Berger, n.d). Smart mobs are characterized as groups of people who can be rallied for social and political campaigning though the use of mobile

Thursday, July 25, 2019

How autonomous are we Essay Example | Topics and Well Written Essays - 1000 words

How autonomous are we - Essay Example On the other hand, ‘Stanford Prison Experiment’ was carried out by Philip Zimbardo during 1971 in Stanford University in order to evaluate the intrinsic personality traits of people due to offensive behavior of higher authority (Zimbardo, â€Å"Terminated on August 20, 1971†). Outcome of these experiments together conform to certain facts which inhibit the very core of political and economic systems of the United States. Thesis Statement With due consideration to the experiments of Milgram and Zimbardo, the essay focuses on how these researches impact on the broader procedure of autonomy. The objective of the essay is to develop a discussion about implication of Milgram and Zimbardo’s work on becoming a moral employee. Implication of Milgram’s and Zimbardo’s Work on Employee Morale Discussion on Milgram’s Work At first, in can be stated that autonomy denotes freedom or independence. It is the capability to make a rational, informed and unforced decision. In political system of the United States, autonomy is frequently used as the foundation for defining the ethical duty for one’s activities. ... On the other hand, obedience happens when a person changes the conduct due to direct command from superior. Through the experiment, Milgram has found high degree of obedience among people (Intercollegiate Studies Institute, â€Å"Milgram's Experimental View of Authority†). Throughout the research, he has depicted that every society where people live has their own accepted manners of performing which are termed as norms. Norms are approved principles of behavior of people in a society. These principles can restrict the behavior of every group of people such as students, patients, employees and business executives among others. In other words, every person must obey the social norms of the group or society where they belong. At times, people adapt to certain behavior of other persons regardless of being individually incompatible with their behavior. In any organization, authority plays a vital role in determining the level of conformity of employees. When employees feel that the y belong to certain organization, they will accept the organizational norms in order to secure their job position. On the other hand, employees at times conform to authority due to lack of confidence and courage. The level of obedience also relies on the cultural aspects. For instance, in collectivist cultures such as China, group achievement is provided more importance than individual employee achievement, conversely in individualistic cultures such as the United States individual employee performance is provided more importance than group performance. As such, it is apparent that activities of any employee in any organization are subjected to the pressure whether it is cultural pressure, group pressure or pressure from authority. Discussion on Zimbardo’s Work The outcome of

Wednesday, July 24, 2019

Does learning to express oneself Dissertation Example | Topics and Well Written Essays - 3750 words

Does learning to express oneself - Dissertation Example This endeavor is undertaken not only to clarify the methodology applied in this study, but it also seeks to establish the steps taken to achieve the purpose of this study. The purpose of this research study is to determine the extent to which learning to express oneself properly (write and recite) has on the number of violent incidents among at-risk inner-city middle and high School male students during a school year. Another purpose explored in this study is to investigate whether or not messages presented to juveniles in a creative format (poetic form) has a positive impact on juvenile behavior. Research Design Research design provided the overall structure of the procedures the researcher follows in the conduct of the study. It involved the data collected and the analysis used in the research. For research, a combination of quantitative and qualitative study had been chosen because it provided the researcher the opportunity to play a vital role in the data collection and analysis, in the gathering of the literary narratives and the inductive logic employed in the study (Creswell, 2007: Hatch, 2002; Patton, 1990; Yin, 2009). Moreover, in the mixed method, the researcher is not only an active participant in the whole inquiry process (Hatch, 2002), but it also enabled the researcher to observe social facts experience by the youth (Crocker & Algina, 1986). In this way, the researcher was not outside looking inside the phenomenon being observed, but was inside the phenomenon together with the participants in constructing meanings and understandings for the articulation of the event being observed, and in this case creative writing and expression of oneself as a viable alternative to counter juvenile violence. The literary narratives provided the framework with which the case was described, and out from the stories, themes that could explain and explore the phenomenon (Hatch, 2002; Shank, 2006). The study was inductive primarily because the â€Å"researcher gathe rs data to build concepts, hypotheses or theories† (Merriam & Associates, 2002, p. 5). As mentioned earlier, the researcher had preferred mixed method because it enabled the researcher to be actively involved in the data collection and analysis, in the collection of literary narratives and in the discharge of the inductive logic used in the study. Furthermore, through a mixed method a holistic picture of the incident was attained since it seeks to understand the phenomenon within the social context or circumstances where it was happening (Janesick, 2004). For the qualitative part of the research, Creswell (2007) noted that there are five different approaches to qualitative research; â€Å"narrative research, phenomenology, grounded theory, ethnography, and case study† (p. 53). In both the narrative research and phenomenology, the focus of attention is the life stories and experiences of the participants (Savin-Badin & Van Neikirk, 2007). It looks into the personal belie fs and attitudes of the participants towards the phenomenon (Creswell, 2007). As such, the personal beliefs of the participants become the focal point with which the phenomenon is to be explained (Yin, 2009). Thus, it demands that the personal beli

Lean Production System-(JIT) Just In Time Inventory Research Paper

Lean Production System-(JIT) Just In Time Inventory - Research Paper Example n.d., par. 1). In HMC’s situation, therefore, JIT inventory is perceived to be a crucial part of the lean production system whereby the identified goals contain the need to focus on maximizing the use of the most appropriate inventory levels which are consistent with the strategies used. Explanation on How JIT would Help HMC’s Subassembly Area The current situation at HMC’s subassembly area is as follows: (1) an increase in outsourcing brought greater demands for assembly operations; (2) management was reported to have been experiencing difficulties in allotting space for assembly operations; (3) there was no permanent and enough space for assembly operations as case facts indicate that management often located the assembly areas in any location where there was open floor space; (4) with anticipated demands for increased assembly operations, HMC finds itself experiencing extreme cases of excess materials or the need to expedite materials from suppliers at the ver y last minute to prevent from missing a customer’s deadline; (5) the original plant layout did not include a space of assembly operations; thereby current assembly layout causes inefficiencies and increases costs and wastes in production time and resources. The JIT would definitely help the sub-assembly area by recommending strategies that would improve sourcing, delivery and level (as well as costs) of inventories and improving the lay-out for production, among others. As emphasized, â€Å"JIT applies primarily to repetitive manufacturing processes in which the same products and components are produced over and over again. The general idea is to establish flow processes (even when the facility uses a jobbing or batch process layout) by linking work centers so that there is an even, balanced flow of materials throughout the entire production process, similar to that found in an assembly line. To accomplish this, an attempt is made to reach the goals of driving all inventory buffers toward zero and achieving the ideal lot size of one unit† (Just-In-Time (JIT) Production, n.d., par. 2). By eliminating the need to movement of people and materials (layout); observing and calculating the most effective inventory level; as well as observing the goals of JIT partnerships (â€Å"elimination of unnecessary activities; elimination of in-plant inventory; elimination of in-transit inventory; and elimination of poor suppliers) (Ahmadi, n.d., p. 13), JIT would have helped HMC in improving the subassembly area. Explanation of Impact These Actions on the Objectives Established As one has explained, the JIT goals are consistent with the goals that were established by HMC, to wit:

Tuesday, July 23, 2019

Misconceptions of Buddhism Research Paper Example | Topics and Well Written Essays - 1500 words

Misconceptions of Buddhism - Research Paper Example When it comes to religions, people are often guided by misconceptions and wrong beliefs. The way in which everybody understands and comprehends religious texts and traditions leads to the movement of all these misconceptions. For many years, Buddhism has suffered a number of misconceptions regarding its traditions, beliefs and practices. Among the misconceptions include the three ways of life, practices and beliefs (Nielsen, 2004). 2.0 Misconceptions of Buddhism. Buddhism is termed to be a pagan religion that involves worship of many gods rather than one accepted Christian God. There is also a misconception that Buddhists believe in reincarnation. It is termed that all Buddhists welcome suffering in their lives; they believe that when one suffers or is poor, then she/ he is regarded as a sincere Buddhist. All Buddhists in the world are to wear robes as part of their clothing. This is a misconception. Another misconception about Buddhism is that Buddhists must endure gruelling meditat ions in their entire life. Majority of people perceive that when Buddhist faithful put their hands together and bow their heads they are praying for a good fortune to come to their lives. It is stated that in America, members of ‘shin Buddhism’ are only Japanese and if not it is for Japanese- American citizens only (Tudge, 2002). Another misconception is a reflection on the appearance of a Buddhist, where a Buddha, is believed to be a Chinese monk who is a fat guy, and are always bald (shaving their heads completely), leaving no sign of any hair on their heads). All Buddhists in the world are said to be vegetarians, taking only vegetables as part of their diets. One of the wide misconceptions about Buddhism among the Buddhists is that all of them meditate more often and always, and they do so while sitting in full lotus. The Buddhists believe that all roads lead to the same mountain tops -but Buddhism is termed as the clear route to the top of the mountain (Nielsen, 200 4). Majority of people think and believe that Buddhists live in monasteries as either monks or lay people who are secluded from the rest of the people. It is believed that one must be a monk or a lay nun to get enlightened. From the strange behaviours, beliefs and dressing, a misconception has been raised that Buddhists are Idol worshippers. The respect that they give Dalai Lama leads to misconception that Dalai Lama is the head of Buddhism. The social and interaction among individuals and Buddhists have led to a misconception that Buddhism is a pessimistic religion, an illusion created, and Buddhist behaviour is a dreadful one; serious individuals who don’t wear any kind of make-up, and in most cases they do not leisure at all. The Buddhism religion is termed as one that is boring and rigid that does not allow its faithful to desire any kind of earthly thing such as engaging in sports. The last misconception is that Buddhism is a reformation or upgrade of Hinduism (Tudge, 20 02). 3.0 Reasons for and against misconceptions of Buddhism Buddhism is not a pagan religion just because Buddhists don’t concern themselves about God or gods; they put their concerns on ‘Dharma’ who is not a god or gods but the truth or reality. Their belief in reincarnation is true as the majority of the sects in Buddhism believe in reincarnation in the same way Christians do in God. The misconceptions of the Buddhism of

Monday, July 22, 2019

Translation and Interpreting Essay Example for Free

Translation and Interpreting Essay Introduction As I was preparing to put my ideas in order and reflect upon what I was going to write for my essay on International Communication, I suddenly remembered the last lecture on the subject. It was about translating and interpreting, so I figured out that an essay on the translation challenges in todays world would be a great idea to write about. I personally knew Dumitru Toncia, my sister-in-law relative, who had worked in the field for many years, so we had a meeting in which I took some interesting notes. He is specialized in English and French. There are a lot of definitions for International Communication, but I consider it to contain aspects of intercultural understandings, communicaton theory, intercultural communication, croscultural communication, mass communication, intercultural psychology, congnition psychology, area-study like society, culture, constitution, law, education, language etc Proper translation and interpreting has become more and more demanding, and this paper deals with the qualities translators or interpreters should posses in the international environment today. It also outlines some grammar and semantics issues that turn this filed into a real challenge. I hope the examples he drew from his experience in translation will give you an interesting insight into some of the most frustrating problems encountered when transferring ideas from one language to another. Taking part in the selection of candidates for translator jobs in international environments, Toncia has often been amazed by the fact that a number of candidates with a perfect knowledge of both the source and the target languages and an impressive mastery of the relevant field could be very poor translators indeed. Why is that? One of the human factors is the lack of modesty. The translators personality and intelligence interfere with the very humble task he has to perform. Instead of putting aside his own ideas, fantasies and style to follow blindly the authors, he merges, adds or transforms. Anyway, besides humility, candidates must possess two other qualities: judgment and flexibility. Judgment By judgment I mean the ability to solve a problem through wide knowledge of the field, through awareness that a problem exists and through taking into account the various levels of context. Wide knowledge of the field. Lets take the phrase to table a bill. The translator must know that if the original is in British English, it means to submit a bill i. e. a text proposed to become law to the countrys legislative body, in French deposer un projet de loi, but that if the author followed American usage, he meant to shelve, i. e. to adjourn indefinitely the discussion of the text, in French ajourner sine die lexamen du projet de loi Here is another example. The word heure in French can mean hour as well as oclock. To be able to translate correctly the French phrase une messe de neuf heures, you have to know that a Catholic mass lasting nine hours is extremely improbable, so that the translation is a nine oclock mass, and not a nine hour mass. Since the linguistic structure is exactly the same in un voyage de neuf heures, which means a nine hour journey, only knowledge of the average duration of a mass can help the translator decide. Awareness that a problem exists. When you become a professional translator, the chief development that occurs in you during your first three or four years consists in becoming aware of problems that you had no idea could exist. If you are transferred to another organization, the whole process will start anew for a few years because the new field implies new problems that are just as hidden as in your former job. Some people may know that in the history of international communication there was an organization called International Auxiliary Language Association. Well, if you ask people how they understand that title, you will realize that, for a number of them, it means international association dealing with an auxiliary language, whereas for others it means an association studying the question of an international auxiliary language. The interesting point lies not so much in the ambiguity as in the fact that most people are not aware of it. When exposed to the phrase, they immediately understand it in a certain way and they are not at all conscious that the very same words are susceptible to another interpretation and that their immediate comprehension does not necessarily reflect what the author had in mind. Similarly, most junior translators simply do not imagine that the words English teacher usually designate, not a teacher who happens to be a British citizen, but somebody who teaches English and can be Japanese or Brazilian as well from any English speaking country.. Taking into account the various levels of context. The English word repression has two conventional translations in French. In politics, the French equivalent is repression, whereas in psychology, it is refoulement. You might believe at first glance that translating it correctly is simply a matter of knowing to what field your text belongs. If it deals with politics, you use one translation, if with psychology another. Reality is not that simple. Your author may use the psychological sense within a broad political context. For instance, in an article dealing with the Stalin era, you may have a sentence beginning with Repression by the population of its spontaneous critical reactions led to In this case, although the text deals with politics, the sentence deals with psychology. The narrow context is at variance with the broad context. Flexibility Besides judgment, the other quality I mentioned as indispensable to make an acceptable international translator is flexibility. This refers to the gymnastics aspect of translation work. Mastering the specialized field and the two relevant languages is not enough, you have to master the art of constantly jumping from one into the other and back. Languages are more than intellectual structures. They are universes. Each language has a certain atmosphere, a style of its own, that differentiates it from all others. If you compare such English expressions as software and, on a road sign, soft shoulder with their French equivalents, you realize that there is a very definite switch in the approach to communication. The French translations are respectively logiciel and accotements non stabilises. The English phrases are concrete, metaphorical, made up, with a zest of humor, from words used in everyday speech, although this does not contribute to better comprehension: knowing the meaning of soft and of shoulder does not help you to understand what a soft shoulder is. In French, the same meanings are conveyed by abstract and descriptive terms, which do not belong to everyday usage. You dont understand them either, but for a different reason: because they are based on too intellectual, too sophisticated, too unusual morphemes, so that most foreigners have to look up the words in dictionaries. The difficulty lies in the fact that this difference in approach has to be taken into account at the level, not only of words (a good dictionary may often solve that problem), but of sentences. Consider the sentence Private education is in no way under the jurisdiction of the government. It includes mostly English words of French origin, but common etymology does not imply a common way of expressing ones thoughts. In this case, a good French rendering would be Lenseignement libre ne releve en rien de lEtat. You will realize the importance of those differences in the approach to communication if you take the French sentence as the original and translate it literally into English. The result would be Free teaching does not depend in any way from the State, which means something quite different, especially to an American. In order to translate properly, you have to feel when and how to switch from one atmosphere to another. The problem is that with languages, you never know how you know what you know. If, in a text dealing with economic matters, a good translator meets the phrase the life expectancy of those capital goods, he knows because he feels that he has to translate it by la longevite des equipements. He also knows that when that same text mentions the consumers life expectancy, hell have to say, in French, esperance de vie, because the author for a while deals with a demographic concept which is included in his economic reasoning. But how does he know he knows? He doesnt know. This ability to adjust to the various approaches to reality or fantasy embodied in the different languages, linked to an ability to pass constantly back and forth, is what is called flexibility. This is the quality which is the most difficult to find when you recruit translators. We can now approach the same field from a different angle, asking ourselves the question: what are the problems built-in in languages that make judgment and flexibility so important in translation work? They relate to the grammar and the semantics of both the source and the target languages. Grammar The more a language uses precise and clear-cut grammatical devices to express the relationships among words and, within a given word, its constitutive concepts, the easier the task for the translator. The worst source languages for translators are thus English and Chinese. A Chinese sentence like ta shi qunian shengde xiaohair can mean both he (or she) is a child who was born last year and it was last year that she gave birth to a child. In English similar ambiguities are constant. In International Labor Organization, the word international refers to organization, as shown in the official French wording: Organisation internationale du Travail. But in another UN specialized agency, the International Civil Aviation Organization, the word international is to be related with aviation, not with organization, as shown, again, by the French version: Organisation de laviation civile internationale (and not Organisation internationale de laviation civile). This is legally and politically important, because it means that the organization is competent only for flights that cross national boundaries. It is not an international organization that deals with all problems of non-military flying. However, since the linguistic structure is similar in both cases, no text analysis can help the translator; he has no linguistic means to decide which is which. He has to refer to the constitution of the relevant organization. Many mistakes made by professional translators result from the impossibility, in English, to assign an adjective to its noun through grammatical means. When a translator rendered Basic oral health survey methods by Methodologie des enquetes fondamentales sur letat de sante bucco-dentaire, he was mistaken in relating the word basic to survey, whereas it actually relates to methods, but he should be forgiven, because only familiarity with the subject enables the reader to understand what refers to what. The correct translation was Methodologie fondamentale applicable aux enquetes sur letat de sante bucco-dentaire. Toncias wife teaches translation to American students who come to Geneva for one year. A standard translation task she gives them includes the subtitle Short breathing exercises. Every year, half her class understands exercises in short breathing, whereas the real meaning is short exercises in deep breathing. The fact that native speakers of English so consistently make the same mistake, although the context provides all the necessary clues, its still a wonder. The fact that, in English, the endings -s, -ed and -ing have several grammatical functions often complicates matters. In the sentence He was sorting out food rations and chewing gum, it is impossible to know if the concerned individual was chewing gum while sorting out food rations, or if he was sorting out two kinds of supplies: food, and chewing gum. Semantics Problems caused by semantics are particularly difficult for human translators. They are of two kinds: (1) the problem is not apparent; (2) the problem is readily seen, but the solution either requires good judgment or does not exist. An example of the first category is provided by the phrase malaria therapy. Since malaria is a well known disease, and therapy means treatment, a translator not trained in medical matters will think that it means treatment of malaria. But the semantic field of therapy is not identical with that of treatment, although this is not apparent if you simply consult a dictionary (Websters defines therapy as treatment of a disease). It would be too long to explain here the differences, but the fact is that malaria therapy should be rendered, not by traitement du paludisme, but by impaludation therapeutique or paludotherapie , because it means that the malaria parasite is injected into the blood to elicit a febrile reaction designed to cure the attacked disease, which is not malaria. In other words, it means treatment by malaria and not treatment of malaria. In the French version, published by Albin Michel, of Hammond Innes novel Levkas Man, one of the characters complains about les jungles concretes in which an enormous population has to live (Hammond, 1998, p.82). This does not make sense for the French reader. What the author meant by concrete jungles was jungles de beton, i. e. high-rise housing developments made of concrete. This is a case in which the translator was not aware of the existence of a semantic problem, namely that concrete has two completely unrelated meanings: a building material, and the opposite of abstract. An example of a semantic problem requiring good judgment is the word develop. It has such a wide semantic field that it is often a real nightmare for translators. It can mean setting up, creating, designing, establishing and thus refer to something that did not exist before. It can mean intensifying, accelerating, extending, amplifying, and thus express the concept making larger, which implies that the thing being developed has been concretely in existence for some time. But it can also mean tapping the resources, exploiting, in other words making use of something that has been having a latent or potential existence. In all other languages, the translation will vary according to the meaning, i. e.to that particular segment the author had in view within the very wide semantic field covered by the word. To know how to translate to develop such or such an industry, you have to know if the said industry already exists or not in the area your text is covering. In most cases, the text itself gives no clue on that matter. Only the translators general culture or his ability to do appropriate research can lead him to the right translation. Such a simple word as more can pose problems, because its semantic area covers both the concepts of quantity and of qualitative degree. What does more accurate information mean? Does it mean a larger amount of accurate information or information that has greater accuracy? And how can you translate cute into another language? The concept simply does not exist in most. Conversely, the French word frileux has no equivalent in English, so that a simple French sentence like il est frileux cannot be properly translated. Still, you can say he feels the cold terribly or he is very sensitive to cold. Although those are poor renderings, they are acceptable. What most resists translation is the adverbial form: frileusement. How can you translate il ramena frileusement la couverture sur ses genoux? You have to say something like He put the blanket back onto his knees with the kind of shivering movement typical of people particularly sensitive to cold. To those of you who might think that this is literary translation, something outside your field of research, I have to emphasize that descriptions of attitudes and behavior are an integral part of medical and psychological case presentations, so that the above sentence should not be considered unusual in a translators practice. An enormous amount of words, many of them appearing constantly in ordinary texts, present similar difficulties. Such words as commodity, consolidation, core, crop, disposal, to duck, emphasis, estate, evidence, feature, flow, forward, format, insight, issue, joint, junior, kit, maintain, matching, predicament, procurement and hundreds of others are quite easy to understand, but no French word has the same semantic field, so that their translation is always a headache. Dictionaries dont help, because they give you a few translations that never coincide with the concept as actually used in a text; in most cases the translations they suggest do not fit with the given context. Another case in point is provided by the many words that refer to the organization of life. You cannot translate Swiss Government by Gouvernement suisse, because the French word gouvernement has a much narrower meaning than the English one. In French, you have to say le Conseil federal or la Confederation suisse according to the precise meaning. The French word gouvernement designates what in English is often named cabinet. The English word government is one of the frustrating ones. You may render it by lEtat, les pouvoirs publics, les autorites, le regime or similar words, evaluating in each case what is closest to the English meaning, and you have to bear in mind that at times it should be sciences politiques (for instance in the sentence she majored in government, in which the verb major is another headache, because American studies are organized in quite a different way from studies in French speaking countries). The Russian word dispanserizacija illustrates a similar problem. It designates a whole conception of public health services that has no equivalent in Western countries. If you want your reader to understand your translation, you should, rather than translate it (it would be easy enough to say dispensarisation), explain what it means. Conclusion As you see, each one of the problems mentioned in the paper makes the translators task very arduous indeed. Problems caused by ambiguities, unexpressed but implied meanings, and semantic values without equivalent in the target language require a lot of thinking, a special knowledge of the field and a certain amount of research as for instance when you have to find out if an industry being developed already exists or not, or if secretary Tan Buting is a male or a female, which, in many languages, will govern the correct form of the adjectives and even the translation of  secretary (Sekreter? Sekreterin? ) . Such problems take up 80 to 90% of a professional translators time. A translator is essentially a detective, Toncia uses to say, and it is true. He has to make a lot of phone calls, to go from one library to another (not so much to find a technical term as to understand how a process unfolds or to find basic data that are understood, and thus unexpressed, among specialists) and to tap all his resources in deduction. These days we all seem to take the right of being a professional translator, but on closer look things are not so simple. In the international environment today, proper communication has become extremely important, and seemingly insignificant mistakes could cause a lot of trouble for the parties involved. In cases when proficient translation or interpreting is required, saving money by hiring someone from your staff instead of a competent professional is not a choice I would recommend. Bibliography Hammond , I. , 1998 Levkas Man, William Collins Larousse, 1994 Dictionaire de la langue fracaise, Lexis Philip, B. , 2000 Websters Third New International Dictionary, Webster Inc. Websites www. iti. org. uk- Institute or Translating and Interpreting http://www. naati. com. au- National Accreditation Authority for Translators and Interpreters.

Sunday, July 21, 2019

Library Management System Based On Finger Prints And RFID

Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit Library Management System Based On Finger Prints And RFID Library Management System Based On Finger Prints And RFID Chapter 1: Introduction Library management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm. The interrogators or the RFID readers operating on 125KHz are used to read the tag number of the books when brought near to it in order to process its identification number and check for its status. The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing. The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system. The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone. The software part is composed of the database systems and an interfacing tool for database components. The students details are listed in database systems. These are automatically accessed when the student uses the student console feature. The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in order to update the status of the student. An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint rec ognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected. Chapter 2: literature review 2.1 History of RFID A scientist, Là ©on Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID; it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates) 2.2 Background RFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track moving objects. 2.2.1 RFID TAGS The RFID tags are also known as â€Å"transponders†. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders: Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader). 2.2.2 RFID READER A reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing. 2.2.3 WORKING OF RFID Information is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatâ€Å"energizes† the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action. 2.2.4 FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: The commonly used frequencies are: v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted. 2.3 FUTURE OF RFID RFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house. 2.4 APPLICATIONS 2.4.1 Electronic Vehicle Registration In many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also. 2.4.2 Payment by mobile phones Two credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card. 2.4.3 Transportation payments For traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management. 2.4.4 Product tracking RFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers. 2.4.5Animal identification One of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management. 2.4.6 Museums RFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California. 2.4.7 Race timings RFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns 2.5.1 Data flooding Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data. 2.5.2 Global standardization Frequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a tag that is operational within all of the international frequency domains. 2.5.3 Security concerns A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products. 2.5.4 Temperature exposure Currently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit 2.6 FINGERPRINT AUTHENTICATION Fingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different. 2.6.1 Why fingerprint? In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints can take advantage of a solid security system minimal education. Chapter 3: Requirements Specification 3.1 Non-functional Requirements 3.2 External requirements 3.3 Functional Requirements 3.3.1 Category 1 Following requirements should be met under given priorities: 3.3.2 Category 2 3.3.3 Category 3 Chapter 4: Project Design 4.1 Architecture Overview The design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements. 4.2 Required Components Microcontroller PIC18F452 RF transceiver nRF905 Fingerprint module SM630 RFID reader module ID20 RS232 Driver IC MAX232 4.3 MICROCONTROLLER PIC18F452 4.3.1 Description PIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout 4.3.3 Features and specifications Program memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others. 4.4 RF transceiver nRF905 4.4.1 Description The nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows: 4.4.2 Features Data rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630 SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections: 4.5.1 Features High Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage: 4.3V6V v Fingerprint Template: 768 templates v User Flash Memory: 64KByte v Interface Protocol: Standard serial interface TTL level v Communication Baud Rate: 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module. 4.6 RFID reader module ID20 This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol. 4.6.1 Pin description Its pin description is as follows: 4.6.2 Features 5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm 4.7 RS232 Driver IC MAX232 4.7.1 Description MAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output  ±7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as  ±25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V. Chapter 5: Implementation 5.1 Designing the RFID reader module We started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below: 5.1.1 Problems in the design of the reader The main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market. 5.1.2 Antenna design of TRX7960 The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows: v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608  µH This loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna. 5.2 Implementation with the RFID module ID20 Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit. 5.3 Working of the system 5.3.1 Main unit There are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connect ed with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa. 5.3.2 Antitheft Unit This unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit