Thursday, August 27, 2020

Change Management in Health Care

Question: Talk about theChange Management in Health Care. Answer: Change Management in Huntington Memorial Hospital Presentation Huntington Memorial Hospital is among the best wellbeing communities in the US. Exploration recommends that the 500 bed office roughly 27000 confirmations on a yearly premise. Furthermore, its crisis rooms have in excess of 57000 visits every year by and large (Huntington Hospital, 2016). The strategic the emergency clinic is to guarantee that the patients get quality help through ideal usage of the profoundly talented and enthusiastic experts and consolidation of current innovation (Scott, 2012). To guarantee that the office is fully informed regarding the evolving innovation, the administration has introduced a decentralized data framework for each division. Subsequently, the staff individuals have simple access to data identified with the division they work in. The correspondence procedure among the faculty is additionally quicker as the laborers get to either the customized or the authoritative data through their corporate sends (Day Shannon, 2015). In spite of the fact that the decentralized framework has improved the exchange of information among the medicinal services experts, the framework presents various difficulties to accomplishment of the set strategic along these lines there is a need to transform it to a progressively brought together one. In the clinical focus, a helpful master is enriched with the dedication of giving best consideration organizations to the patients. Helpful consideration ought to be without stumbles. Regardless, there are differing frequencies of bungles and lack of regard that are still found in the wellbeing office to the extent arrangement methodologies. Feelings have indicated that slips up happen increasingly a noteworthy piece of the time where the medical caretaker executive intend to help patients instead of naughtiness them. It is clear that no one yet the clinical specialists will be criticized for these slip-ups. These botches are a mix of segments from healing organizations conditions, mis-association of social assurance supplies, correspondence openings among flourishing pros, shortcomings in systematic getting ready and inadequacy in escort's parts. Masters must satisfy their parts with reliability to guarantee patient's security and dependability of human organizations structure. The restorative administrations framework must complete e-answer for avoid any occasion of helpful screws up in the treatment of patients. Authorities must be maintained, excited, and requested to think about the change, best prosperity practices and issue rising in the wellbeing office. A therapeutic manager ought to be able to perceive the possible results of a misstep occurring in the midst of arrangement, movement in helpful systems and comprehension of ace duties (Pdr, Pataki, Sebestyn, 2011) Framework of Change The necessary change inside the medical clinic is centralization of the data framework. The current decentralized one presents the social insurance place with various difficulties, one of them being that an expert from one office faces obstructions while getting to the data from different offices (Como et al., 2014). Every office has a data framework where the pros input clinical information, for example, analysis, treatment, drug of patients, nurture accountable for patients, supplies inside the division. For a specialist in the malignant growth division to get to data from the crisis room, the person would need to request freedom from the ER head of office. The failure to get to pertinent data has brought about expanded clinical mistakes for patients managing more than one office. For instance, a patient experiencing disease and apoplexy and conceded in the malignancy ward, the necessary drug of apoplexy is neglected. This could be either because of absence of information or because of absence of convenient access to data. Thus, there is decreased nature of administrations, danger of the lives of patients, and the clinic faces the danger of claims. Centralization of the data framework would enable the experts to get to the records of patients from various divisions and appoint the best treatment and care in an opportune way (Engineer et al., 2015). Way to deal with be utilized in Managing Change The best model for dealing with the difference in the data framework is the Kotters 8 Step Process of Change Management (Campbell, 2014). In spite of the fact that it is tedious, it would help set up all the staff individuals to grasp change and be a piece of the procedure. The main procedure involves expanding the criticalness of progress through featuring the clinical blunders that have happened because of absence of access of sufficient data. Additionally, calling attention to the wellbeing habitats that have a brought together framework and decreased blunders would empower the individuals from the firm observe the need to change the current framework. Building the directing group is the subsequent advance. Amassing the data framework experts of all offices would ensure a sythesis of individuals with satisfactory information on the activities all things considered. Including the heads of division would build the eagerness and promise to improving the quality guidelines of the medical clinic. The third step is improvement of a dream and a technique that are in accordance with the crucial the emergency clinic of upkeep of top notch principles through consolidation of trend setting innovation. The methodologies would involve sharpening and instructing individuals on the embodiment of improving the correspondence framework and assessing strategies for development. This would give a stage to the fourth step, which is of correspondence of the unified data framework (Dunphy, 2013). Through correspondence, the group head would expand mindfulness on the parts and highlights of the data framework. Some of them are the utilization of one server framework for the entire medical clinic, activity from the various PCs, utilization of passwords for confined reports, and conceding availability for approved people as it were. Showing the colleagues on the need to get to the records, favorable circumstances that the association would have, and the jobs they would play to guarantee fruitful dispatch of an increasingly viable and productive framework would improve the work cooperative energy. Visit discussing change to different representatives would improve their colleague to the new framework (Casali Day, 2015). After correspondence of the change, there would be a need to grasp engaging activities that guide in expelling obstructions of progress. For instance, commitment of laborers would help manage any negative perspectives. Visit correspondence with the administration of the association would build the degree of help of the change (Bartunek Woodman, 2015). Ceaseless evaluation of obstructions and managing them would improve the collaboration level. The 6th step, which includes production of short successes, individuals from the medical clinics would be urged to partake through remunerations (Burke, 2003). For instance, the individuals who give feasible proposals on the most proficient method to join the new data would be perceived and granted. Besides, there could be improvement of a little task of two divisions sharing data to help the laborers partner with the achievement the data framework would bring. It is likewise important to create more change through uniting gains. In this level, it is important to bring together the entire data framework. If there should arise an occurrence of any component that contention against the crucial the human services, it would be rebuilt. Setting reachable destinations would not just assistance in distinguishing proof of territories of progress yet additionally in revelation of new imaginative ideas that would expand the advantages. Revolution of obligations among the colleagues would hoist creativity. The last advance is union of progress as another culture. This would enable the laborers to stop to clutch the ideas of the decentralized framework. A portion of the compelling procedures are visit discussing the new framework, perceiving the donors, and guaranteeing the key heads of progress impact more individuals (Campbell, 2012). Key Elements to be Managed during Change Since change faces various difficulties, it is essential to oversee components that would decrease the boundaries of joining of the new framework. One of the key components is protection from change. Since individuals dread the obscure, their first response to another idea is dismissing it. Rather than concentrating on the advantages, they harp on the weaknesses (Charlesworth et al., 2016). For instance, the administration may dismiss the new framework because of the high usage cost. The raised expense would be because of the costly server that would serve the entire emergency clinic, development of a protected area for the server, and advancement of the program. The laborers, then again, could dismiss change because of dread of losing their positions. For instance, the departmental professionals may believe that the framework would just require one administrator. To deal with this test, it is essential to deal with the correspondence techniques. One of the strategies would be illumination of the administration of the association. Introducing the need to improve the framework considering the advantages and drawbacks would bring about the pioneers making an educated judgment (Booth, Zwar Harris, 2013). Edification of the laborers on the necessity of progress and giving an affirmation of employer stability would decrease the degree of opposition. Another correspondence procedure is disposal of bits of gossip. Individuals inside the association may convey inaccurate data offering ascend to protection from change. To wipe out such an event, all the individuals from the association would be advised about the change through the corporate sends, gatherings, and notice sheets (Allen, 2016). Another critical component that requires the board is the abilities and work (Carter, 2015). The change procedure requires individuals who are equipped for building up a program that bolsters the quantity of

Saturday, August 22, 2020

Spring Break Guide for College Students

Spring Break Guide for College Students Spring break-that last smidgen of downtime before the finish of the scholastic year. Its something everybody anticipates on the grounds that its one of only a handful scarcely any occasions in school you really get a break from the granulate. Simultaneously, seven days passes by quick, and you dont need to go to class feeling youve burned through your extra time. Regardless of what year you are in school, your financial plan or your excursion style, here are a few thoughts for what you can do to make the most out of your spring break. 1. Return Home On the off chance that you go to class away from home, traveling back can be a pleasant difference in pace from school life. Furthermore, if youre one of those understudies who isnt incredible at putting aside time to call Mom and Dad or staying aware of companions at home, this is an extraordinary chance to compensate for it. This can be one of your most reasonable choices, as well, if youre attempting to set aside cash. 2. Volunteer Check whether any help arranged grounds associations are assembling a volunteer-based spring break trip. Administration trips like that offer an incredible chance to see an alternate piece of the nation (or the world) while helping other people. In the event that youre not keen on going far or cant manage the cost of an outing, ask associations in your old neighborhood on the off chance that they could utilize a volunteer for seven days. 3. Remain on Campus Regardless of whether you live extremely far away or youre just dont need to get together for seven days, you might have the option to remain nearby during spring break. (Check your schools arrangements.) With a great many people gone on break, you can appreciate a calmer grounds, rest up, get up to speed with school work or investigate portions of town youve never had the opportunity to visit. 4. Return to Your Hobbies Is there something you appreciate doing that you havent had the option to keep doing at school? Drawing, divider climbing, exploratory writing, cooking, creating, playing computer games, playing music-whatever it is you love to do, set aside a few minutes for it during spring break. 5. Take a Road Trip You dont need to drive the nation over, however consider stacking up your vehicle with snacks and several companions and taking off. You could look at some nearby vacation spots, visit state or national stops or do a voyage through your companions main residences. 6. Visit a Friend On the off chance that your spring splits line up, plan to invest energy with a companion who doesnt go to class with you. In the event that your dampens dont fall simultaneously, check whether you can put in a couple of days where they live or at their school so you can make up for lost time. 7. Accomplish Something You Dont Get to Do at School What dont you possess energy for due to the hecticness of class and extracurricular exercises? Going out to see the films? Outdoors? Perusing for the sake of entertainment? Set aside a few minutes for at least one of those things you love to do. 8. Go on a Group Vacation This is the quintessential spring break. Get along with a lot of your companions or cohorts and plan a major excursion. These get-aways can cost more than numerous other spring break alternatives, so put forth a valiant effort to design ahead of time so you can set aside. In a perfect world youll have the option to spare a great deal via carpooling and sharing housing. 9. Take a Family Trip When was the last time your family got away together? On the off chance that youd like to invest more energy with your family, propose a get-away throughout your spring break. 10. Make Some Extra Cash You presumably cant get another line of work for only seven days, however in the event that you had a mid year work or worked in secondary school, inquire as to whether they could utilize some assistance while youre home. You could likewise inquire as to whether theres any additional work at their occupations that you could help with. 11. Quest for new employment Regardless of whether you need a mid year gig, need a temporary position or are searching for your first post-graduate occupation, spring break is an incredible time to concentrate on your pursuit of employment. In the event that youre applying to or going to graduate school in the fall, spring break is a decent time to get ready. 12. Make up for lost time with Assignments It might feel like youll never make up the work if youve fallen behind in class, yet you may have the option to make up for lost time during spring break. Set objectives for how much time you need to commit to examining, so you dont get as far as possible of break and acknowledge youre more distant behind than you were previously. 13. Unwind The requests of school will heighten after you return from break, so ensure youre prepared to confront them. Get a lot of rest, eat well, invest energy outside, tune in to music-do whatever you can to ensure you return to class invigorated.

Friday, August 21, 2020

Blog Archive MBA Admissions Myths Destroyed Its All About My Work Performance

Blog Archive MBA Admissions Myths Destroyed It’s All About My Work Performance Because you spend so many of your waking hours at work, and the MBA is the vehicle you are choosing to use to drive your career forward, you may naturally believe that your professional experiences are all that matter to the admissions committees.  Don’t get us wrong: you need to have strong professional stories to share, but top-tier business schools are looking for much more than just examples of professional excellence. If you discuss only your work experiences in your application, you will present yourself as a one-dimensional character, and today’s managers need to demonstrate that they can handle a multitude of tasks, situations, and personalitiesâ€"both inside and outside the workplace. Once a year, we at mbaMission typically post an offer on our blog to review 20 applications submitted by candidates who did not use our services and who did not receive an offer of admission from a single program of their choice. We find that the most common error committed by these applicants is that they discussed  only  their work accomplishments and gave no sense of who they truly are as well-rounded human beings. Although professional accomplishments definitely have a place in your applications, do not go overboard and focus on this one aspect of your candidacy to the exclusion of all elseâ€"balance is crucial. To the best of your ability, strive to offer a mix of accomplishments from the professional, community, and personal fields. Your goal is to keep the reader learning about you with each essay. A diversity of stories will reveal that you have the skills to accomplish a great deal in many different fields and circumstances, which is the hallmark of a modern general manager. Share ThisTweet Admissions Myths Destroyed Blog Archive MBA Admissions Myths Destroyed It’s All About My Work Performance Because you spend so many of your waking hours at work and because the MBA is the vehicle you are choosing to use to drive your career forward, you may naturally believe that your professional experiences are all that matter to the admissions committees.  Don’t get us wrong: you need to have (and share) strong professional stories, but top-tier business schools are looking for much more than just examples of professional excellence. If you discuss only your work experiences in your application, you will present yourself as a one-dimensional character, and today’s managers need to demonstrate that they can handle a multitude of tasks, situations, and personalitiesâ€"both inside and outside the workplace. At the end of the year, we at mbaMission typically post an offer on our blog to review 20 applications, submitted by candidates who did not use our services and who did not receive an offer of admission from a single program of their choice. We find that the most common error committed by these applicants is that they discussed  only  their work accomplishments and gave no sense of who they truly are as well-rounded human beings. Although professional accomplishments definitely have a place in your applications, do not go overboard and focus on this one aspect of your candidacy to the exclusion of all elseâ€"balance is crucial. To the best of your ability, strive to offer a mix of accomplishments from the professional, community, and personal fields. Your goal is to keep the reader learning about you with each essay. A diversity of stories will reveal that you have the skills to accomplish a great deal in many different fields and circumstances, which is the hallmark of a modern gene ral manager. Share ThisTweet Admissions Myths Destroyed

Monday, May 25, 2020

The Theory Of Leadership Theories - 1483 Words

There are volumes composed on Leadership theories in about every discipline. Bolman and Deal filtered through the puzzling hypotheses of literature and joined with their experience, investigations, observation and experience on four-frame model. Frame can be described as the lens of a glass so that everyone can see the world. Frame are used to through it. Frame gives every individual to establish their own business and to run smoothly. People need these frames because to know the real world and what sense and to experience it, it also helps us to guide our action. Bolman and Deal propose that each individual has individual and favored casings that they use to accumulate data, judgments, focus conduct and clarify conduct. Every frame gives†¦show more content†¦These steps may include: ïÆ'Ëœ Organizational goals should be clarified. ïÆ'Ëœ Taking the external environment under control ïÆ'Ëœ Implementing, designing and developing a clear structure appropriate to task, and environment ïÆ'Ëœ Clarifying lines of authority ïÆ'Ëœ Concentrating on given task, facts, and logic, rather than on personality and feelings. 2. The Human Resource Framework The human resource deals with people’s views as it is the heart of any organization system and it gives supportive responsive to needs and goals to achieve commitment and loyalty. The most important thing on human resource management is to support and liberation. The HR administrator listens well and imparts individual warmth and honesty. The people engages individuals through support and actions to pick up the assets individuals need to carry out work well. HR supervisors go up against when proper yet attempt to do as such in a friendly atmosphere. ïÆ'Ëœ Organization is there to serve the people or human needs, rather than the human existing for organizational needs. ïÆ'Ëœ People and organization both are important to each other. Because organization needs power, talent and ideas to implement and more over people need basic needs like shelter, food and clothes the organization provide these all in the type of salary and opportunities too full their dreams. ïÆ'Ëœ When there is a misunderstanding between the individual and organization both will suffer and when

Thursday, May 14, 2020

Essay on Supply Chain Management at Regal Marine - 673 Words

SUPPLY CHAIN MANAGEMENT AT REGAL MARINE Global firms like Regal Marine know that the basis for an organizations existence is the good or service it provides society. Great products are the keys to success. With hundreds of competitors in the boat business, Regal Marine must work to differentiate itself from the flock. As you read in the Global Company Profile that opened this chapter of your text, Regal continuously introduces innovative, high-quality new boats. Its differentiation strategy is currently reflected in a product line consisting of 22 models. As firms become increasingly focused and specialized, the supply chain performance grows in importance. Money spent with suppliers represents a huge portion of most firms revenues.†¦show more content†¦However, partnering extends from jointly developing components, to modular designs at suppliers and at Regal, to rapid delivery and low inventories. These techniques allow innovative products to be rapidly and economically included in Regal’s boats. Regal has also developed special arrangements with suppliers who maintain shop floor components for Regal. In some instances title transfers when the item is used, and in other cases title transfers when items are delivered to the property. Both approaches help Regal reduce total inventory and the related costs. In this partnering process, Regal Marine partners can expect loyalty from Regal, and the suppliers can gain prestige by representing the high-quality products which Royal Marine produces, which can result in profit margins. Suppliers can also largely benefit from economies of scale and learning curves, reducing the production cost. The â€Å"friendship† and loyalty which arise from partnership gives confidence and stability to the business. Additionally, Regal’s membership in the American Boat Builders Association allows it to participate in lower costs because of the combined purchase strength of the association. Finally, Regal works with an Orlando personnel agency to outsource part of the recruiting and screening process for employees. In all of these cases, Regal is demonstrating creative approaches to supply chain management that help RegalShow MoreRelatedPearlll619 Words   |  3 PagesSupply- Chain Management at Regal Marine Like most manufacturers, Regal Marine finds that it must spend a huge portion of its revenue on purchases. Regal has also found that the better its suppliers understand its end users, the better are both the supplier’s product and Regal’s final product. As one of the 10 largest U.S. power boat manufacturers, Regal is trying to differentiate its products from the vast number of boats supplied by 300 other companies. Thus, the Orlando firm works closely withRead More460 Syllabus KWONG Winter 11 121220855 Words   |  4 PagesSTUDIES IN OPERATIONS MANAGEMENT Winter 2011, SHC C368 Instructor: Kern Kwong, Ph.D. Office: Simpson Tower 805 College of Business and Economics California State University, Los Angeles Office Hours: Tuesday: 2:00-6:00 p.m. Email: kkwong2@calstatela.edu Website: http://instructional1.calstatela.edu/kkwong2/Mgmt460 Office Telephone: 323-343-2899 [Use email if you need a reply quickly.] Course Description Management 460 is a case studies course in the management of manufacturing andRead MoreEssay on Supply Chain Management686 Words   |  3 Pages â€Å"Supply chain management is the flow of goods, services, and information from the initial sources of materials and services to the delivery of products and activities occur in the same organization or in other organizations†(Horngren695). This approach enables Regal Marine (R.M) to be highly effective, efficient, and profitable. More over supply chain management effectively manage your supply chain by synchronizing the demand for your products with your production capabilities, optimizing your resourceRead MoreEssay on The culture of Quality at Arnold Palmer Hospital2902 Words   |  12 Pagesï » ¿Chapter Supply-Chain Management Discussion Questions 1.â€Æ'Supply-chain management is the management of the activities that procure raw materials, transform them into intermediate goods and final products, and deliver the products to customers through a distribution system. 2.â€Æ'The supply-chain function’s role is to help identify the products and services that can best be obtained externally; develop, evaluate, and determine the best supplier, price, and delivery for them. 3.â€Æ'The objective of logisticsRead MoreEssay on Regal Carnation Hotel Case3818 Words   |  16 PagesRegal Carnation Hotel (Guam) Case Analysis Case Introduction The island of Guam is an unincorporated territory of the United States located in the Philippine Sea. Ruled by the Spanish until 1898, Guam was ceded to the United States and briefly occupied by Japan between 1941 and 1944. Of strategic significance during the Second World War, more than 18,000 Japanese and 1,800 U.S. marines died in the U.S. retaking of the island. Following the war, the Guam Organic Act of 1950 provided forRead MoreOperations Management25115 Words   |  101 Pageshospitals, have a production function. True (What is operations management? moderate) 4. Operations management is the set of activities that create value in the form of goods and services by transforming inputs into outputs. True (What is operations management? easy) 5. An example of a hidden production function is money transfers at banks. True (What is operations management? moderate) 6. One reason to study operations management is to learn how people organize themselves for productive enterpriseRead MoreAsian Paints Global Expansion Strategy7628 Words   |  31 PagesStrategy Executive Summary Asian paint is the market leader with 49% of market share in Indian decorative segment and maintains its position among the top ten players in the world. It is only Indian company operating in India having supply chain management supported by i2 technology. The report also talks about the market share of Asian paint in decorative as well as industrial segment and its growth.The report we made for demostration present condition of Asian paint market in India andRead More50 Harmful Effects of Genetically Modified (Gm) Foods14312 Words   |  58 Pagesthe US Patent Office alone, and many more abroad. Furthermore an economic war broke out to own equity in firms that legally claimed such patent rights or the means to control not only genetically modified organisms but vast reaches of human food supplies. This has been the behind-the-scenes and key factor for some of the largest and rapid agri-chemical firm mergers in history. The merger of Pioneer Hi-Bed and Dupont (1997), Novartis AG and AstraZeneca PLC (2000), plus Dow s merger with Rohm andRead MoreFundamentals of Hrm263904 Words   |  1056 Pagescom/college/quickstart Technical Support 24/7 FAQs, online chat, and phone support www.wileyplus.com/support Your WileyPLUS Account Manager Training and implementation support www.wileyplus.com/accountmanager MAKE IT YOURS! Fundamentals of Human Resource Management Tenth Edition David A. DeCenzo Coastal Carolina University Conway, SC Stephen P. Robbins San Diego State University San Diego, CA Tenth Edition Contributor Susan L. Verhulst Des Moines Area Community College Ankeny, IA John WileyRead MoreHemp Cultivation in China42289 Words   |  170 Pagesstrategists on their efforts for 1996. ---In 1995, we supplied six varieties of seed, in small amounts, to IHA members for pilot research projects in Australia, Finland, and South Africa. We are expanding this archive for the 1996 season and hope to supply research quantities of seed for the majority of commercially available hemp varieties from France, Hungary, Poland and Romania. The IHA now has access to a refrigerated room (+3o C) for seed storage. ---The IHA appeared at a natural products exhibition

Wednesday, May 6, 2020

Reconstruction During The Civil War - 1892 Words

Reconstruction Over the course of America’s existence, it has acquired many successes and failures. Over time there have been a large number of accomplishments that have made the world a greater good, but there have also been phases of turmoil and tragedy. The Reconstruction period after the Civil War is a prime example of a complete failure. The Reconstruction period consisted of many goals and ideas that Americans planned to achieve in their country after being torn apart from the Civil War. One of the main objectives was to rejoin all of the states to the union to help rebuild the South and help African Americans come back into society. It soon came to an end and was a complete failure since Southerners would not abide by the laws of rights to former slaves and the introduction of segregation soon began. The 13th, 14th, and 15th amendments were passed to protect feed people’s natural rights. This process of protecting was the whole concept of â€Å"reconstructing America†. At first a majority of the states did not agree with these new laws, but by 1870, all of the former Confederate states had accepted them and were admitted into the union once again. Once Reconstruction ended in 1877, society slowly went back to a strong racist background and former slaves were once again in servitude. This time, even harsher discrimination against the Blacks were introduced by enforcing state segregation. Reconstruction only caused the nation to become worse. When Reconstruction began,Show MoreRelatedReconstruction Of Reconstruction During The Civil War883 Words   |  4 Pages Describe and analyze Reconstruction. Did Reconstruction have any successes? The end of civil war in the United States of America brought about many problems, in particular for the South. Some of the problems were political, economic decay and social disorder. The war destroyed the plantations and crops thus causing many to starve to death while others became homeless. The reconstruction became the only hope for the people. Radical reconstruction began in 1867, which enabled the freed black menRead MoreReconstruction During The Civil War Essay1676 Words   |  7 PagesReconstruction The United States went through many changes after the Civil War and during the Reconstruction period of 1866-1877. Before Abraham Lincoln was assassinated on December, 1863, by John Wilkes, Lincoln announced the first Reconstruction plan a year before the Civil War had ended and Lincoln offered general amnesty to white southerners who would pledge an oath of loyalty to the government and accept the abolition of slavery. During the summer of 1865, Johnson not long after he took officeRead MoreReconstruction During The Civil War966 Words   |  4 Pages Reconstruction is a time period after the Civil War ended in 1877. We view it as something that resembles a transformation, shifts in the southern U.S. after the Civil War. This was when slavery inequality, some political, economic, and social issues were, in some ways, balanced. The categories of issues that arose throughout this â€Å"restoration† were aspects such as involving the Confederacy into the Union, abolishing along with figuring out what to do with our free blacks, and addressing conflictRead MoreReconstruction During The Civil War972 Words   |  4 PagesThere was a transformation period after the Civil War called the reconstruction during the years 1863 to 1877. The reconstruction was the rebuilding of the United States, mainly in the South. There were three major types of reconstruction, which were political, physical, and social. The political reconstruction allowed some African Americans to vote; however, they had to be literate in order to take the Oath tes t. Not many African Americans knew how to read and write, because they were slaves andRead MoreReconstruction During The Civil War1487 Words   |  6 PagesReconstruction was the period when America was figuring out on issues pertaining to who was an American, what rights an American should enjoy and what rights other Americans were exercising. The post bellum period was a period after the civil war that had affected the United States of America. This conflict had mostly taken place in the south and therefore the people there were the for the most part affected by this warfare. After the civil war, racism was still a threat and a struggle for the nationRead MoreReconstruction During The Civil War864 Words   |  4 PagesIn hindsight it is sometimes claimed that Reconstruction was a failure. Although there was some good that came out of the Reconstruction it was mostly just a relentless uphill battle against Southerners and immoral politicians that were here to delay change and kee p racism alive. Reconstruction brought the Ku Klux Klan who displayed great resistance, and poverty that swept the South once the blacks were freed. The freedom of these black slaves led to discriminatory legislatures such as the BlackRead MoreEducation During Reconstruction During The Civil War918 Words   |  4 Pagesâ€Å"Education during Reconstruction† In the south before during and after the reconstruction was a time for educational growth. Many states were just beginning to provide public education. The education system was trialed and errored to become the system that we know today during this era. The civil war brought separation of races but also families, the radical republicans stressed education during the reconstruction to avert the attention of the people from the war and racial issues. BeforeRead MoreThe Reconstruction Era During The Civil War1370 Words   |  6 PagesThe Reconstruction Era beginning in 1865 marked the period where white men and recently freed African Americans quarreled over the concept of equality on the basis of race as well as where freedom extended to. After the Civil War, there was a power struggle between the Republican and Democratic parties as they had extremely distinct ideas on whether African Americans should be free and hold citizen rights. African Americans were able to achieve citizenship as well as have equality through the 14thRead MoreThe Era Of Reconstruction During The Civil War1630 Words   |  7 Pageswas imposed by the white people. This contradiction is emblematic of the African-American experience. The era of reconstruction was a short-term success, a medium-term failure, and a foundation for the long-term successes of the civil rights movement in terms of black freedom. The era of reconstruction exposed the radical limits of freedom for natural born citizens in the post-civil war United States. The idea of freedom changed in a tremendous way for the blacks. I would like to begin by askingRead MoreThe Legacy Of Reconstruction During The Civil War Essay1254 Words   |  6 Pageshistory. These â€Å"revolutionary movements† have created lasting impressions on the United States that helped mold the nation that it is today. One such movement was Reconstruction. Reconstruction was a time in America consisting of reuniting the country and pulling it from the economic catastrophe that stemmed from the Civil War. The reconstruction era had dealt with three separate plans: the Lincoln Plan, the Johnson Plan and the congressional Plan. These plans, each with their own unique way of unifying

Tuesday, May 5, 2020

Chinese Book Report Essay Example For Students

Chinese Book Report Essay China Book ReportBook: China Since 1945Author: Stewart Ross(Note: This book is not described in full depth and detail but is just explained in a very general way, therefore Mahmoud Abdelkader uses The Modernization of China by Gilbert Rozman (Editor) excerpts to support his views)Type of Book: Illustrated Pages: 64China Book ReportThe book China Since 1945, written by author Stewart Ross, opens in a description of the Chinese Empire in the 1900s. There it describes the terrain of the Chinese lands and thoroughly states the fact of having the Great Wall of China to keep out the barbarians at 221 B.C. The author uses a very admiring tone of the Chinese Empire and seems to think its one of the very few best empires that have ever formed. In fact, Rozman states, the cultural and scientific achievements of the Chinese had been immense, including the invention of paper, printing and gunpowder, and the creation of the most exquisite paintings and by most Empire Critics China was one of the best Civilizations around. The author starts the book by Revolution and disintegration incident that happened in 1911, where the British and Japanese fought over control of China. Chinese prisoners were being led away for execution during the revolution where they would be beheaded with swords, which the author states is very popular. It mentions the presidency of Sun Yatsen and his reforms which he could not control that he made himself in 1912. Around this time, warlords took over China controlling it and ruining its economy. The author moves on to war that involved China and its neighbors. It describes the Communist Revolution and Mao Zedong, an the Autumn Harvest. The author then relates to Maos victory in 1945-1949 and the Japanese forces pulling out. The authors view toward Chinese views is very critical and then goes to analysis of the book, but supports China. In fact, the way that this was looked upon, is that this is actually a bunch of essays that were put together by the author thats why his mood changes. The only way of finding out what the author really thinks is the way of his introduction. The author, actually, does support China and doesnt take a prejudice side to it. Rozman says, Although critics sometimes critique China and its imperialistic ways, I find it most innovating that China is superior in many of its way and its technologies that keep us alive today are immense and should be recognized as an act of a strong economic nation, not as a communist death hole. He completely wants the reader to understand that he has no offense on China, but China has an effect on itself from many other critics. Stewart Ross on the other hand, uses China in a horrible sense or criticism. He critiques China after 1945 in almost any way he can. His tone doesnt sound biased, but after the first 10 pages, the book starts taking a negative effect towards China. He starts the book as if it is the most intriguing country in the world, but soon it his enthusiasm descends to a lower degree. The conclusion that the reader would be able to see is that the actual author isnt biased about China but about Communism, since it affected China in every way after 1945. The writing of the book looks as if it is directed to any American who is interested in Chinas modern history. The book is written by an American author who directs his views to another American. He directs China from Chinese eyes. He doesnt exactly point it out that there is conflict and doesnt show any biased thoughts or actions. He simply just states facts and doesnt try to criticize it through Chinese eyes, but directs his views as if his research team was the one that was having trouble figuring something out. This may be unclear but Ill state an example. Th e team didnt know how many millions of people died in the Land Reform, but were pretty sure its around 35%. It is explained that the cruelty of the Chinese during land reforms are extremely harsh, for the landlords were taken from their lands, leaving the warlords to take the peons and control the economy. Not 35% died, but about 20% did, by the Grolier Encyclopedia (2000). The author extremely exaggerated the number too highly to show cruelty but obviously and neutral or un-biased person will bluntly state the real fact, so that leaves us with one thing, the author obviously is biased. The authors work on this book is extremely beneficial and has a lot of effort in it. He completely parallels himself to the study of China going on in Dulaney. He starts with the Tang Dynasty to the Manchu Dynasty. He tells us that the Manchus were the highest point in the history of its great landmass. The books theme is that China has changed after 1945 and it will never return to its original ways . Indeed, the Chinese Empire fell within the Communist rise of Mao Zedong and it will never re-establish. In class, the study of China after 1945 parallels directly with the books theme and it shows that this major move of Communism has changed the world. The United States was quite shocked and developed a kind of hatred for the Chinese, but would not show it. The unit next that will be studied is how the United States was so shocked when Mao Zedong declared the Peoples Republic of China and reacted in a very immature way. The theme also parallels to the Chinese as a once superior race to the disgrace of turning into Communists. It shows the decline and fall of the Empire and many of its disadvantages and advantages. Ross describes the Chinese as a race once full of nothing but resources and was heavily dependent on to almost how is it to acquire the pure hatred that we have for Russians to the Chinese. In other words, this book was overall good but it would have been better to comp are a book of un-biased views to this book. The author hides his biased views very good, but using many simple techniques and other sources, it was obvious that hes biased. The book gives no accurate description of Chinas past, but it does give a clear overview. After that, Ross starts to take sides with Communism. The book is written all about a negative view of Communism and maybe thats why he has a biased overview. The other book, The Modernization of China by Rozman is extremely useful to compare a biased view to a neutral view. It points out much other information that the Ross left out. Overall, I though both books were great and I have learned a lot. .uee14d76cb8fbe35193a04fcdc42b7ec1 , .uee14d76cb8fbe35193a04fcdc42b7ec1 .postImageUrl , .uee14d76cb8fbe35193a04fcdc42b7ec1 .centered-text-area { min-height: 80px; position: relative; } .uee14d76cb8fbe35193a04fcdc42b7ec1 , .uee14d76cb8fbe35193a04fcdc42b7ec1:hover , .uee14d76cb8fbe35193a04fcdc42b7ec1:visited , .uee14d76cb8fbe35193a04fcdc42b7ec1:active { border:0!important; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .clearfix:after { content: ""; display: table; clear: both; } .uee14d76cb8fbe35193a04fcdc42b7ec1 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .uee14d76cb8fbe35193a04fcdc42b7ec1:active , .uee14d76cb8fbe35193a04fcdc42b7ec1:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .centered-text-area { width: 100%; position: relative ; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .uee14d76cb8fbe35193a04fcdc42b7ec1:hover .ctaButton { background-color: #34495E!important; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .uee14d76cb8fbe35193a04fcdc42b7ec1 .uee14d76cb8fbe35193a04fcdc42b7ec1-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .uee14d76cb8fbe35193a04fcdc42b7ec1:after { content: ""; display: block; clear: both; } READ: Character Trait - The Necklace EssayHistory Essays

Friday, April 10, 2020

About Sir Clough Williams-Ellis and Portmeirion, Wales

About Sir Clough Williams-Ellis and Portmeirion, Wales Architect Clough Williams-Ellis (born May 28, 1883 in Gayton, Northamptonshire, England) is best-known as the creator of Portmeirion, a village in Wales, yet as an environmentalist he also helped establish the British National Parks system and became knighted for his services to architecture and the environment. Son of the Reverand John Clough Williams-Ellis, young Bertram Clough first moved to Wales with his family when he was only four. He went back to England to study mathematics at Trinity College in Cambridge, but he never graduated. From 1902 to 1903 he trained at the Architectural Association in London. The budding designer had deep Welsh and English connections, being related to the medieval entrepreneur Sir Richard Clough (1530–1570) and the Victorian poet Arthur Hugh Clough (1819-1861). His first designs were numerous parsonages and regional cottages in England and Northern Ireland. He inherited some property in Wales in 1908, married in 1915, and raised a family there. After serving in World War I, he designed a number of war memorials and travelled to architecturally rich countries like Italy, an experience that informed his sense of what he wanted to build in his homeland. In 1925 Clough Williams-Ellis began building in Portmeirion in northern Wales, and he didnt finish until 1976. Located on Sir Cloughs private peninsula on the coast of Snowdonia, Portmeirion first opened in 1926. That year, Sir Clough also founded the CPRE (Council for the Protection of Rural England). He established the CPRW (now Campaign for the Protection of Rural Wales) in 1928. Portmeirion was not a continuous project, however. He continued to design residences and in 1935 he designed the original summit building on Snowdon, which became the highest building in Wales. Forever the conservationist and environmentalist, Sir Clough helped establish the British National Parks in 1945, and in 1947 he penned On Trust for the Nation for the National Trust. He was knighted in 1972 for services to architecture and the environment.   He died at his home in Plas Brondanw on April 8, 1978. Portmerion: A Lifelong Project The flamboyant and largely self-taught Bertram Clough Williams-Ellis devoted his life to the cause of environmental preservation. His work on the resort village of Portmeirion, Wales represented his efforts to prove that it was possible to build beautiful - and colorful - housing without defiling the natural landscape. Sir Clough was 90 years old when  Portmeirion was completed. Portmeirion is riddled with anachronisms. Greek gods mingle with gilded figures of Burmese dancers. Modest stucco bungalows are decked with arcaded porches, balustraded balconies, and Corinthian columns. Its as though the designer tossed 5,000 years of architectural history along the shore, without a care for symmetry, accuracy, or continuity. Even American architect Frank Lloyd Wright paid a visit in 1956, just to see what Clough was up to. Wright, who also boasted a Welsh heritage and a concern for conservation, praised the innovative combinations of architectural styles. Portmeirion became an exercise in historic restoration. Many of the structures were pieced together from buildings destined for demolition. The village became known as a repository for fallen architecture. Portmeirion designer Sir Clough Williams-Ellis didnt mind when visitors called his quirky village Home for Fallen Buildings. Architect Clough Williams-Ellis moved amongst artists and artisans. He married the writer Amabel Strachey and fathered the artist/potter Susan Williams-Ellis, originator of Portmeirion Botanic Garden dinnerware. An Italian Resort in Northern Wales Viewers of the 1960s television series The Prisoner will find some of the landscapes eerily familiar. The bizarre prison kingdom where actor Patrick McGoohan encountered surreal adventures was, in fact, Portmeirion. The vacation village of Portmeirion nestles on the northern coast of Wales, but theres nothing Welsh in the flavor of its architecture. No stone cottages here. Instead, the hillside overlooking the bay is dotted with candy-colored houses which suggest sunny Mediterranean landscapes. There are even swaying palm trees around the tinkling fountains. Portmeirion village in Minffordd has become a destination vacation and event venue in northern Wales. It has accommodations, cafes, and weddings all within a Disneyesque community. Vacationing within a fanciful, planned community was big business in the 1960s, after the success of Californias Disneyland in 1955 and before the 1971 opening of Floridas Walt Disney World Resort. Sir Cloughs idea of fantasy, however, took on more Italianate tone than Disneys mousechitecture. The Unicorn Cottage, for example, was a British-Italian experience in the Welsh countryside. Since 2012, Portmeierion has been the site of an arts and music festival called Festival No6 - named after the main character in The Prisoner. For one long, exhausting weekend in early September, Sir Cloughs village is home to the quirky fringe who seek poetry, harmony, and a Mediterranean refuge in northern Wales. Festival No6 is billed as a festival unlike any other  - no doubt because the fanciful Welsh village is itself a fantasy. In the TV show, the sense of geographical and temporal displacement suggests that this village was created by a madman. But there was nothing crazy about Portmeirions designer, Sir Clough Williams-Ellis. His lifelong concern was with environmental preservation. By building Portmeirion on his private peninsula in Snowdonia, Wales, Sir Clough hoped to show that architecture can be beautiful and fun...without defacing the landscape. Despite these high-minded intentions, however, Portmeirion is, most of all, entertaining. Clough Williams-Ellis was a master of illusion, and his designs confuse, delight, and deceive. Highlights of Portmeirion The Piazza Originally the Piazza was a tennis court, but since 1966 the area has been a quiet paved area with a blue tiled pond, a fountain, and lavish flower beds. Along the southern edge of the Piazza, two columns support gilded figures of Burmese dancers. A low stone stairway climbs to the Gloriette - a playful structure named after the grand monument at the Schà ¶nbrunn Palace near Vienna. Built in the mid-1960s, Portmeirions garden room or gloriette is not a building, but a decorative facade. Five trompe loeil windows surround the open doorway. The four columns are the work of 18th century architect Samuael Wyatt, salvaged from the colonnade of Hooton Hall, Cheshire. The Bridge House Built between 1958 and 1959, Bridge House seems larger than it really is because of its tapering walls. When visitors pass through the archway from the parking area, they encounter their first breathtaking view of the village. Bristol Colonnade Built in about 1760, the Colonnade stood in front of a Bristol bathhouse in England. It was falling into decay when Portmeirions creator moved the structure to Portmeirion - piece by piece.in 1959. Several hundred tons of delicate masonry were disassembled and transported to the Welsh village. Every stone was numbered, and replaced according to precise measurements. Promenade Sir Clough Williams-Ellis, today recognized as one of the United Kingdoms first conservationists, wanted to show that the development of a naturally beautiful site need not lead to its defilement. An assortment of urns and columns line the flower strewn Promenade atop the Bristol Colonnade - rebuilt in the Welsh hillside, overlooking The Piazza and the village. The integration of walkways atop, over, through, and into Sir Cloughs designed village ties together the themes of community and harmony within an Italian Renaissance architecture. The dome at the Promenades end replicates the famous Brunelleschi dome in Florence, Italy. Unicorn Cottage In this miniature of a stately Chatsworth home, architect and Portmeirion master planner Sir Clough Williams-Ellis creates the illusion of a classic Georgian estate. Elongated windows, long pillars, and an undersized gate make the Unicorn seem tall, but in fact it is a dressed-up bungalow built in the mid-1960s...and only one story high. Hercules Gazebo Several cast iron mermaid panels, salvaged from the Old Seamans Home in Liverpool, form the sides of the Hercules Gazebo, built in 1961-1962. For many years, the Hercules Gazebo was painted shocking pink. The structure is now a more subtle terra-cotta shade. But this playful facade is yet another example of architectural illusion - as a space to house mechanical equipment, the Gazebo disguises a generator. Cottages Hotels and cottages dot the planned landscape of Portmeirion, just as they would in any village. Chantry Cottage, with its red-clay tile Italiante roof, sits high atop the hill, above the Bristol Colonnade and Promenade below. Built in 1937 for the Welsh painter Augustus John, Chantry Cottage is one of the earliest structures built by Sir Clough Williams-Ellis and today is a self-catering cottage sleeping nine. But it all began with legendary mermaids, real or not. Dating from the 1850s, the Mermaid house was present on the peninsula when building began at Portmeirion. For many years it was used to house village staff. Sir Clough dressed up the cottage with an imposing metal canopy and the welcoming palm trees sprinkled throughout the village. Landscape design and Italianate architecture is how Sir Clough created the illusion that we are in sunny Italy...not in wet and windy North Wales. And it works. Visual Elements for Portmeirion The Piazza Village Center - VisitBritain/Britain on View/Getty Images Bridge House - Martin Leigh/Getty Image (cropped) Bristol Colonnade Bathhouse from Bristol, England - John Freeman/Getty Images (cropped) Promenade - Charles Bowman/Getty Images (cropped) Unicorn Cottage Behind Colorful Iron Gate  - Paul Thompson/Getty Images (cropped) Hercules Gazebo on Day 2 of Festival No6  - Andrew Benge/Getty Images Bristol Colonnade Beneath Chantry Row  - John Freeman/Getty Images (cropped) Sources Chronology, https://www.portmeirion-village.com/visit/clough-williams-ellis/chronology/ [accessed March 17, 2018]ocal Legends, BBC, bbc.co.uk/legacies/myths_legends/wales/w_ne/article_7.shtml [accessed March 17, 2018]Snowdon summit centre hits the peak of success, WalesOnline, https://www.walesonline.co.uk/news/local-news/snowdon-summit-centre-hits-peak-1913101 [accessed March 17, 2018]Photo credits: The Resort Village of Portmeirion, Wales by Martin Leigh/Photolibrary Collection/Getty Images (cropped); Bridge House by John Freeman/Getty Images (cropped); The Colonnade by Ben Pipe Photography/Getty Images (cropped); Promenade atop the Bristol Colonnade by John Freeman/Getty Images (cropped); Unicorn Cottage by Paul Thompson/Getty Images (cropped); Cast Iron Mermaid Panel by Scott Wylie, scotbot via flckr.com, Creative Commons 2.0 Generic (CC BY 2.0)

Tuesday, March 10, 2020

Rfid Based Attendance System Essays

Rfid Based Attendance System Essays Rfid Based Attendance System Paper Rfid Based Attendance System Paper The attendance system is basically an embedded one. Embedded stands for ‘hardware controlled by software’. Here, the software using a microcontroller controls all the hardware components. The microcontroller plays an important role in the system. The main objective of the system is to uniquely identify and to make attendance for a person. This requires a unique product, which has the capability of distinguishing different person. This is possible by the new emerging technology RFID (Radio Frequency Identification). The main parts of an RFID system are RFID tag (with unique ID number) and RFID reader (for reading the RFID tag). In this system, RFID tag and RFID reader used are operating at 125 KHz. The EEPROM used for storing the details has the capability of storing 256 person details at a time. The PC can be used for restoring all the details of attendance made. 1. 2 WHAT IS RFID? RFID stands for Radio-Frequency Identification. The acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information. The object of any RFID system is to carry data in suitable transponders, generally known as tags, and to retrieve data, by machine-readable means, at a suitable time and place to satisfy particular application needs. Data within a tag may provide identification for an item in manufacture, goods in transit, a location, the identity of a vehicle, an animal or individual. A system requires, in addition to tags, a means of reading or interrogating the tags and some means of communicating the data to a host computer or information management system. A system will also include a facility for entering or programming data into the tags, if this is not undertaken at source by the manufacturer. Quite often an antenna is distinguished as if it were a separate part of an RFID system. While its importance justifies the attention it must be seen as a feature that is present in both readers and tags, essential for the communication between the two. ?What is the purpose of RFID? RFID allows data to be transmitted by a product containing an RFID tag microchip, which is read by an RFID reader. The data transmitted can provide identification or location information about the product, or specifics such as date of purchase or price 1. 2. 1 Data Flow in RFID: To understand and appreciate the capabilities of RFID systems it is necessary to consider their constituent parts. It is also necessary to consider the data flow requirements that influence the choice of systems and the practicalities of communicating across the air interface. By considering the system components and their function within the data flow chain it is possible to grasp most of the important issues that influence the effective application of RFID. However, it is useful to begin by briefly considering the manner in which wireless communication is achieved, as the techniques involved have an important bearing upon the design of the system components. . 2. 1. 1 Wireless communication and the air interface Communication of data between tags and a reader is by wireless communication. Two methods distinguish and categories RFID systems, one based upon close proximity electromagnetic or inductive coupling and one based upon propagating electromagnetic waves. Coupling is via ‘antenna’ structures forming an integral feature in both tags and readers. While the term antenna is gener ally considered more appropriate for propagating systems it is also loosely applied to inductive systems. To transfer data efficiently via the air interface or space that separates the two communicating components requires the data to be superimposed upon a rhythmically varying (sinusoidal) field or carrier wave. This process of superimposition is referred to as modulation, and various schemes are available for this purpose, each having particular attributes that favour their use. They are essentially based upon changing the value of one of the primary features of an alternating sinusoidal source, its amplitude, frequency or phase in accordance with the data carrying bit stream. On this basis one can distinguish amplitude shift keying (ASK), frequency shift keying (FSK) and phase shift keying (PSK). In addition to non-contact data transfer, wireless communication can also allow non-line-of-sight communication. 1. 2. 2 RFID Operating Frequencies ?Low Frequency (125 kHz) Applications: Access control, livestock, race timing, pallet tracking, automotive immobilizers, pet identification Inductively coupled devices, electro-mechanical field Antenna coil has many turns Read range (near contact to 1 meter) Limited data rate due to a lower bandwidth ?High Frequency (13. 56 MHz) Applications: Supply chain, wireless commerce, ticketing, product authentication, clothing identification, library book identification, smart cards Inductively coupled devices Fewer antenna turns than LF device Read range is from 1 to 1. 5 meters Higher data transfer rate than LF ?Ultra-High Frequency (860-960 MHz) Applications: Supply chain, tool tags, RTLS, EPC case and pallet RF communication uses propagation coupling Smaller reader antenna design than LF or HF Read distance (1 m to 10 m) High data transfer rate More complex reader electronic components 1. 2. 3 Data transfer rate and bandwidth Choice of field or carrier wave frequency is of primary importance in determining data transfer rates. In practical terms the rate of data transfer is influenced primarily by the frequency of the carrier wave or varying field used to carry the data between the tag and its reader. Generally speaking the higher the frequency the higher the data transfer or throughput rates that can be achieved. This is intimately linked to bandwidth or range available within the frequency spectrum for the communication process. The channel bandwidth needs to be at least twice the bit rate required for the application in mind. Where narrow band allocations are involved the limitation on data rate can be an important consideration. It is clearly less of an issue where wide bandwidths are involved. Using the 2. 4 2. 5 GHz spread spectrum band, for example, 2 megabits per second data rates may be achieved, with added noise immunity provided by the spread spectrum modulation approach. Spread spectrum apart, increasing the bandwidth allows an increase noise level and a reduction in signal-to-noise ratio. 1. 2. 4 Range: The range that can be achieved in an RFID system is essentially determined by: ? The power available at the reader/interrogator to communicate with the tag(s) ? The power available within the tag to respond ?The environmental conditions and structures, the former being more significant at higher frequencies including signal to noise ratio 1. 3 RFID SYSTEM AND COMPONENTS: 1. 3. 1 TRANSPONDER/TAG RFID tags are tiny microchips with memory and an antenna coil, thinner than paper and some only 0. 3 mm across. RFID tags listen for a radio signal sent by a RFID reader. When a RFID tag receives a query, it responds by transmitting its unique ID code and other data back to the reader. ?Tag Types Active Tags:Battery powered, long read range Semi-active:Battery power to preserve memory Passive Tags: Low-cost, no battery required, medium read range ?Active RFID Tags Active RFID tags, are called transponders because they contain a transmitter that is always, are powered by a batter, about the size of a coin, and are designed for communications up to 100 feet from RFID reade r. They are larger and more expensive than passive tags, but can hold more data about the product and are commonly used for high-value asset tracking. Active tags may be read-write, meaning data they contain can be written over. Semi-Active RFID Tags Semi-active tags contain a small battery that boosts the range and preserves memory. ? Passive RFID Tags Passive tags can be as small s 0. 3 mm and dont require batteries. Rather, they are powered by the radio signal of a RFID reader, which ? Â §wakes them up to request a reply. Passive RFID tags can be read from a distance of about 20 feet. They are generally reads ?32 mm and 23 mm capsule transponder inch key head transponder ?Smart Labels (Clear and Adhesive) ?Circular transponders 1. 3. 2 RFID READERS Readers are radio frequency devices that: ?Transmit and receive RF signals ?Contain a control unit to execute commands ?Incorporate an interface to transfer data ?Receives commands from a Host computer ?Passes data back to the Host RFID readers, also called interrogators, first and foremost are used to query RFID tags in order to obtain identification, location, and other information about the device or product the tag is embedded in. The RF energy from the reader antenna is collected by the RFID tag antenna and used to power up the microchip. READER CHARACTERISTICS: Stationary or handheld (different RFID Reader Modules) Weather-proof or industrialized Typical read ranges vary from a few centimeters to a few meters Read range is dependent upon: Broadcast signal strength Size of broadcast antenna Size of transponder antenna The environment Metallic, Liquid -Multi-frequency readers ?RFID read-only readers These devices can only query or read information from a nearby RFID tag. These readers are found in fixed, stationary applications as well as portable, handheld varieties. ?RFID read-write readers Also known as encoders, these devices read and also write (change) information in an RFID tag. Such RFID encoders can be used to program information into a ? Â §blank RFID tag. A common application is to combine such a RFID reader with a barcode printer to print. Smart labels contain a UPC bar code on the front with an RFID tag embedded on the back. 1. 3. 3 ANTENNAS: Antenna Characteristics: Transmits and receives RF signals Typically made of copper or aluminum, new technologies for printed antennas Stationary or handheld Weather-proof/industrialized Fixed or tunable 1. 3. 4 RFID System Considerations ?Read distance requirements Long read range Short read range ?Frequency All frequencies have their pros and cons ?ISO standards Proprietary or standards-based ?Government regulations Varies from country to country ?Multiple Tag Reading in Same Field Anti -collision ?Sensitivity to Orientation A single orientation or omni-directional ?Hardware Set-up Environment can affect performance Bonding ability Bonding surface Substrate Interference Historical reasons Security Reliability 1. 4 AREAS OF APPLICATION FOR RFID: Livestock tracking Automotive immobilizer Contact less payment Anti-theft Library books Speed pass Control Access Production/Inventory tracking A range of miscellaneous applications may also be distinguished, some of which are steadily growing in terms of application numbers. They include: -Animal tagging -Waste management -Time and attendance -Postal tracking -Airline baggage reconciliation -Road toll management 1. WHAT IS THE ADVANTAGE OF USING RFID TECHNOLOGY? No contact or even line-of-sight is needed to read data from a product that contains an RFID tag. This means no more checkout scanners at grocery stores, no more unpacking shipping boxes, and no more getting keys out of your pocket to start your car. RFID technology also works in rain, snow and other environments where bar code or optical scan technology would be useless. Contact le ss Credit Card Advantages Credit card companies are claiming the following advantages for contact less credit cards: The card is faster to use. To make a purchase, the card owner just waves his card over the RFID reader, waits for the acceptance indicator and goes on his way. American Express, Visa and MasterCard have all agreed to waive the signature requirement for contactless credit card transactions under $25. Looking at the numbers, here is where this technology is taking us in our need for speed (average transaction speeds): 1. Contact less credit card transaction: 15 seconds 2. Magnetic strip card transaction: 25 seconds 3. Cash transaction: 34 seconds The contact less card never transmits your card number. Instead, the RFID chip within the card creates a unique number for the transaction; if a criminal intercepted the number, it would be useless even if successfully decrypted. Contact less cards probably use other measures although this is just speculation, there are certainly other ways to secure the data on the card. For example, the RFID reader that sits on the merchants counter may use some sort of special signal, or offer a special set of frequencies, that would be difficult for a thief with an off-the-shelf reader to duplicate. 1. 6 COMMON PROBLEMS WITH RFID Some common problems with RFID are reader collision and tag collision. Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem. Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. ?Problems with RFID Standards Different manufacturers have implemented RFID in different ways; global standards are still being worked on. It should be noted that some RFID devices are never meant to leave their network (as in the case of RFID tags used for inventory control within a company). This can cause problems for companies. Consumers may also have problems with RFID standards. For example, Exxon Mobil’s Speed Pass system is a proprietary RFID system; if another company wanted to use the convenient Speed Pass (say, at the drive-in window of your favorite fast food restaurant) they would have to pay to access it . On the other hand, if every company had their own Speed Pass system, a consumer would need to carry many different devices with them. RFID systems can be easily disrupted Since RFID systems make use of the electromagnetic spectrum (like WiFi networks or cell phones), they are relatively easy to jam using energy at the right frequency. Although this would only be an inconvenience for consumers in stores (longer waits at the checkout), it could be disastrous in other environments where RFID is incre asingly used, like hospitals or in the military in the field. Also, active RFID tags (those that use a battery to increase the range of the system) can be repeatedly interrogated to wear the battery down, disrupting the system. ?RFID Reader Collision Reader collision occurs when the signals from two or more readers overlap. The tag is unable to respond to simultaneous queries. Systems must be carefully set up to avoid this problem; many systems use an anti-collision protocol (also called a singulation protocol. Anti-collision protocols enable the tags to take turns in transmitting to a reader. ?RFID Tag Collision Tag collision occurs when many tags are present in a small area; but since the read time is very fast, it is easier for vendors to develop systems that ensure that tags respond one at a time. ?Security privacy problems with RFID An RFID tag cannot tell the difference between one reader and another. RFID scanners are very portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone to see the contents of your purse or pocket as you walk down the street. . ?RFID tags are difficult to remove RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter square, and as thin as a sheet of paper) others may be hidden or embedded inside a product where consumers cannot see them. New technologies allow RFID tags to be printed right on a product and may not be removable at all. RFID tags can be read without your knowledge Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and other consumer products without your knowledge. For example, you could be scanned before you enter the store, just to see wh at you are carrying. ?RFID tags can be read a greater distance with a high-gain antenna For various reasons, RFID reader/tag systems are designed so that distance between the tag and the reader is kept to a minimum. However, a high-gain antenna can be used to read the tags from much further away, leading to privacy problems. RFID tags with unique serial numbers could be linked to an individual credit card number. At present, the Universal Product Code (UPC) implemented with barcodes allows each product sold in a store to have a unique number that identifies that product. Work is proceeding on a global system of product identification that would allow each individual item to have its own number. When the item is scanned for purchase and is paid for, the RFID tag number for a particular item can be associated with a credit card number. . 7 WILL RFID REPLCE THE UPC BARCODE TECHNOLOGY? Probably not, at least not soon. Besides the fact that RFID tags still cost more than UPC labels, different data capture and tracking technologies offer different capabilities. Many businesses will likely combine RFID with existing technologies such as barcode readers or digital cameras to achieve expanded data captur e and tracking capabilities that meet their specific business needs. ?Advantages of RFID Versus Barcodes RFID tags and barcodes both carry information about products. However, there are important differences between these two technologies: Barcode readers require a direct line of sight to the printed barcode; RFID readers do not require a direct line of sight to either active RFID tags or passive RFID tags. RFID tags can be read at much greater distances; an RFID reader can pull information from a tag at distances up to 300 feet. The range to read a barcode is much less, typically no more than fifteen feet. RFID readers can read, RFID tags much faster; read rates of forty or more tags per second are possible. Reading barcodes is much more time-consuming; due to the fact that a direct line of sight is required, if the items are not properly oriented to the reader it may take seconds to read an individual tag. Barcode readers usually take a half-second or more to successfully complete a read. Line of sight requirements also limit the ruggedness of barcodes as well as the reusability of barcodes. (Since line of sight is required for barcodes, the printed barcode must be exposed on the outside of the product, where it is subject to greater wear and tear. RFID tags are typically more rugged, since the electronic components are better protected in a plastic cover. RFID tags can also be implanted within the product itself, guaranteeing greater ruggedness and reusability. Barcodes have no read/write capability; that is, one cannot add to the information written on a printed barcode. RFID tags, however, can be read/write devices; the RFID reader can communicate with the tag, and alter as much of t he information as the tag design will allow. RFID tags are typically more expensive than barcodes, in some cases. BLOCK DIAGRAM 2. 1 GNERAL BLOCK DIAGRAM (POWER SUPPLY+CONTROLLER SECTION+RFID) Figure 2. 1 General Block Diagram POWER SUPPLY: This block provides 5V and 9V DC supply to controller and RFID section respectively. It simply consists of a bridge rectifier along with a step down transformer of 230/0-12v, which converts 230v to 12v. The capacitor provide smoothing to the DC voltage. The regulator IC 7805 provides regulation by eliminating the ripples by setting DC output to fixed voltage. CONTROLLER SECTION: It is a main section of the project which consists of microcontroller AT89S52, RTC DS1307, E2PROM AT24C08, 16X2 LCD and all the necessary components to control the data flow, to display the data and provide the serial data to the RFID section. This section is the main interface between power supply and RFID section. RFID SECTION: This section is the heart of the project. The entire module includes RFID tag for marking attendance, RFID reader to detect the tag and an antenna coil which allows the reception of EM waves. 2. 2 BLOCK DIAGRAM SHOWING THE INSIDE VIEW OF THE CONTROLLER SECTION Figure 2. 2- Block Diagram Showing Inside View of Controller Section POWER SUPPLY 1: This block provides 5V supply to Microcontroller, RTC, E2PROM, MAX232, and DISPLAY. It simply consists of a bridge rectifier along with a step down transformer and also 7805. It uses capacitor for filtering when bridge rectifier converts 230V AC to 12V pulsating DC. It makes partial smooth dc that is given to 7805 and give an out put of 5V DC. MICROCONTROLLER: This section controls the functioning of the whole system and is interfaced with RTC, E2PROM, MAX232, and DISPLAY. RTC: It is DS1307 RTC. This section is interfaced with microcontroller . This RTC will display date and time when nothing is detected. It gives information about seconds, minutes, hours, days, weeks, months, POWER SUPPLY 2: This section is the backup supply voltage for RTC it is the 3v dc battery. It will provide voltage during the low power supply or power supply failure. With the help of this power supply RTC can keep track on its real time working. E2PROM: It is AT24C08. This section is external ROM to store the student data when internal ROM is full. Due to the extra storage requirement to store the student information it is require to extend the storage capacity of microcontroller that’s why EEPROM is connected in this section. It will store the data of around 256 students. MAX232: It is dual driver-receiver IC. This section helps to communicate with computer. It is required for transferring data of student from internal and external ROM. It is used to collect the daily data of student and keeps the record of the attendance saved in the computer. DISPLAY: It is 162 LCD display. This section display date and time when nothing is detected at reader side and shows student information when tag is detected at reader. POWER SUPPLY 3: It is inbuilt in the RFID module and provides 9v DC supply to the section. RFID MODULE: It is a ready-made module that contain ANTENNA coil, RFID READER and TAG shown in block diagram 3. 2. 3 RFID MODULE Figure 2. 3-RFID Module RFID READER: This block is heart of this module that read the tag with the help of antenna coil. It requires 5V DC supply for it’s functioning that is provided by 7805 mounted on RFID module PCB. ANTENNA: This helps the reader to detect the tag and provide the range of about 8 centimeters. It is an inductive coil of low impedance. It’s a loop antenna. BUZZER AND LED: This block gives indication about the tag reading. When tag comes in the range of reader the LED will glow and buzzer will generate a sound. 3 CIRCUIT DIAGRAM 3. 1 ENTIRE CIRCUIT DIAGRAM Figure 3. 1-Entire Circuit Diagram Entire Circuit Diagram: The entire circuit diagram includes all the three sections that is controller, power supply and the RFID section. AT89S52 is 8-bit microcontroller with 8k bytes of in-system programmable flash memory. LCD, RTC, EEPROM and MAX232 all are interfaced with the microcontroller. The reader gives the serial data of the ID it reads to the microcontroller. A 5v DC supply is required by the entire circuit except the RFID section. The reader section is a 28-pin IC. Pin 27 28 are for connection to the antenna. A buzzer is connected across the pins 3 12. Pin 6 gives the serial data to the microcontroller. A 9v DC supply is required for RFID section which is provided separately in the module. AT24C08 is the EEPROM which is used for storing details of the student’s data. It has the capability of storing 256 person details at a time. It enhances the data storing capability of the system. 162 LCD will initially display date and time, and when a TAG is showed it will display the username of the TAG. MAX232 is dual driver-receiver that is used for communication with a PC. DS1307 is a serial real time clock (RTC). It provides 2-wire serial interface nad is used for low power applications. 3V supply is needed for DS1307. In actual the connection between microcontroller and RFID module is not single wired connection. It is RS232 connection. The module having female RS232 connector and microcontroller having male RS232 connector. . 2 CONTROLLER SECTION CIRCUIT DIAGRAM: Figure 3. 2-Controller Section Circuit Diagram Controller Section Circuit Diagram: The controller section contain AT89S52 (Micro controller), AT24C08 (EEPROM), MAX 232 (Dual driver), 16X2 LCD,DS1307 (RTC). Microcontroller is the heart of entire section that controls all operation. Microcontroller is interfaced with EEPROM. It is external ROM provided to e xtend the data storage capacity of the system. When internal ROM memory become full the extra data then store to this EEPROM. It will store around 256 student data. Pin 21 and 22 of microcontroller is connected to pin 5 and 6 of EEPROM respectively pin 1, 2, 3, 4, 7 are connected to the ground and pin 8 is connected to Vcc. For real time operation microcontroller is connected to RTC DS1307. It provides information about second, minutes, hours, days, weeks, months, years. It has information up to year 2100. It automatically sets the days in particular month. Microcontroller is interfaced with RTC to show date and time when card is not detected at reader side. It connected to RTC through pin 5(serial clock), pin 6(serial data), pin 7(square wave/output driver) via pin 3(P1. 2), pin2(P1. ), pin1(P1. 0) of microcontroller. A crystal of 32. 768 Khz is connected across to provide the required baud rate. It is connected to 3V battery to maintain the real time operation when power is OFF. Microcontroller is interfaced with LCD which display’s the information when the tag is detected. When no Tag is detected at reader side it display date and time . Whenever Tag is detected it shows the Tag related data on display. Four switches are provided to scroll the menus in LCD. Microcontroller is connected to MAX232 to communicate between system and computer. It communicates via RS232 connector. 3. 3 READER CIRCUIT DIAGRAM Figure 3. 3-RFID Circuit Diagram RFID Reader: RFID is an acronym for Radio Frequency Identification. RFID is one member in the family of Automatic Identification and Data Capture (AIDC) technologies and is a fast and reliable means of identifying just about any material object. There are several characteristics of an RFID reader that determine the types of tags with which it can communicate. The most fundamental characteristic is the frequency or frequencies at which the reader’s radio communicates. Readers and tags must be tune to same frequency in order to communicate. Some RFID readers can communicate at more than one frequency. Some corporation offers a dual-frequency RFID reader and tag product line. Supporting dual-frequency communications enables these types of readers to operate efficiently in changing environments. Most RFID readers communicate exclusively with active tags or exclusively with passive tags. This means that an RFID reader that is manufactured to communicate with passive tags will not be able to communicate with active tags and vice versa. Passive tags are generally smaller, lighter and less expensive than those that are active and can be applied to objects in harsh environments, are maintenance free and will last for years. These transponders are only activated when within the response range of a reader. The RFID reader emits a low-power radio wave field which is used to power up the tag so as to pass on any information that is contained on the chip. A key feature of an RFID reader is the number of tags that it can sample in its tag population. Some readers may be able to sample 10 tags a second while others may be able to sample 100 tags a second. The following items usually influence the number of tags sampled per second: ?The anti-collision algorithm used by the tags The processing capabilities of the reader which usually maps to the type and speed of processor in the reader ? The amount of memory in the reader ?The capabilities of the digital signal processor in the reader’s radio RFID readers come in many sizes, frequencies and with different data processing and reporting capabilities. Understanding these characteristics is important for designing an RFID solution that will function properly and be maintainable. Antenna: The antenna in an RFID tag is a conductive element that permits the tag to exchange data with the reader. Passive RFID tags make use of a coiled antenna that can create a magnetic field using the energy provided by the readers carrier signal. The antenna used for an RFID tag is affected by the intended application and the frequency of operation. Low-frequency (LF) passive tags are normally inductively coupled, and because the voltage induced is proportional to frequency, many coil turns are needed to produce enough voltage to operate an integrated circuit. Compact LF tags, like glass-encapsulated tags used in animal and human identification, use a multilayer coil (3 layers of 100–150 turns each) wrapped around a ferrite core. The scanning antennas can be permanently affixed to a surface; handheld antennas are also available. They can take whatever shape you need; for example, you could build them into a doorframe to accept data from persons or objects passing through. When an RFID tag passes through the field of the scanning antenna, it detects the activation signal from the antenna. That wakes up the RFID chip, and it transmits the information on its microchip to be picked up by the scanning antenna. How RFID Works How does RFID work? A Radio-Frequency Identification system has three parts: A scanning antenna A transceiver with a decoder to interpret the data A transponder the RFID tag that has been programmed with information. The scanning antenna puts out radio-frequency signals in a relatively short range. The RF radiation does two things: It provides a means of communicating with the transponder (the RFID tag) AND It provides the RFID tag with the energy to communicate (in the case of passive R FID tags). 3. 4 POWER SUPPLY Figure 3. 4 Power Supply Circuit Diagram This circuit generates positive 5V DC supply which is given to the controller section. It consists of 230V/0-12V transformer. A bridge rectifier is formed by the bridge connections of four 1N4007 diodes. The output is full wave varying DC since it utilizes the entire AC cycle. Smoothing is performed by a large capacitor connected across the DC supply. It is done by C3 and it smoothes DC to small ripples. LM7805 is the regulator IC which eliminates ripples by setting DC output to fixed voltage. 4 HARDWARE 4. 1 AT89S52 8-bit Microcontroller with 8K Bytes In-System Programmable Flash Features ?Compatible with MCS-51 Products ?8K Bytes of In-System Programmable (ISP) Flash Memory – Endurance: 1000 Write/Erase Cycles ? 4. 0V to 5. 5V Operating Range Fully Static Operation: 0 Hz to 33 MHz ?Three-level Program Memory Lock ?256 x 8-bit Internal RAM ?32 Programmable I/O Lines ?Three 16-bit Timer/Counters ?Eight Interrupt Sources ?Full Duplex UART Serial Channel ?Low-power Idle and Power-down Modes ?Interrupt Recovery from Power-down Mode ?Watchdog Timer ?Dual Data Pointer ?Power-off Flag Description: The AT89 S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pin out. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset. Block diagram: Figure 4. 1-AT89S52 Block Diagram Figure 4. 2-AT89S52 Pin Diagram PIN DESCRIPTION ?VCC Supply voltage (+5V DC). ?GND Ground. ?Port 0 Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 can also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode, P0 has internal pull-ups. ?Port 1: Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. In addition, P1. 0 and P1. 1 can be configured to be the timer/counter 2 external count input (P1. 0/T2) and the timer/counter 2 trigger input (P1. 1/T2EX), ?Port 2: Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @ DPTR). ?Port 3: Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also receives some control signals for Flash programming and verification. RST Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out. ?ALE/PROG: Address Latch Enable (ALE) is an output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programmi ng. In normal operation, ALE is emitted at a constant rate of 1/6 the oscillator frequency and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external data memory. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode. ?PSEN Program Store Enable (PSEN) is the read strobe to external program memory. When the AT89S52 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. ?EA/VPP External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming. ?XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. ?XTAL2: Output from the inverting oscillator amplifier. SPECIAL FUNCTION REGISTERS: A map of the on-chip memory area called the Special Function Register (SFR). Read accesses to these addresses will in general return random data, and write accesses will have an indeterminate effect. ?Timer 2 Registers: Control and status bits are contained in registers T2CON and T2MOD for Timer 2. The register pair are the Capture/Reload registers for Timer 2 in 16-bit capture mode or 16-bit auto-reload mode. ?Interrupt Registers: The individual interrupt enable bits are in the IE register. Two priorities can be set for each of the six interrupt sources in the IP register. Memory Organization: MCS-51 devices have a separate address space for Program and Data Memory. Up to 64K bytes each of external Program and Data Memory can be addressed. ?Program Memory: If the EA pin is connected to GND, all program fetches are directed to external memory. On the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through 1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are to external memory. ?Data Memory: The AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel address space to the Special Function Registers. This means that the upper 128 bytes have the same addresses as the SFR space but are physically separate from SFR space. When an instruction accesses an internal location above address 7FH, the address mode used in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR space. Instructions which use direct addressing access of the SFR space. Instructions that use indirect addressing access the upper 128 bytes of RAM. ?Watchdog Timer (One-time Enabled with Reset-out) The WDT is intended as a recovery method in situations where the CPU may be subjected to software upsets. The WDT consists of a 13-bit counter and the Watchdog Timer Reset (WDTRST) SFR. The WDT is defaulted to disable from exiting reset. To enable the WDT, a user must write 01EH and 0E1H in sequence to the WDTRST register (SFR location 0A6H). When the WDT is enabled, it will increment every machine cycle while the oscillator is running. The WDT timeout period is dependent on the external clock frequency. There is no way to disable the WDT except through reset (either hardware reset or WDT overflow reset). When WDT overflows, it will drive an output RESET HIGH pulse at the RST pin. ?Using the WDT To enable the WDT, a user must write 01EH and 0E1H in sequence to the WDTRST register (SFR location 0A6H). When the WDT is enabled, the user needs to service it by writing 01EH and 0E1H to WDTRST to avoid a WDT overflow. The 13-bit counter overflows when it reaches 8191 (1FFFH), and this will reset the device. When the WDT is enabled, it will increment every machine cycle while the oscillator is running. This means the user must reset the WDT at least every 8191 machine cycles. To reset the WDT the user must write 01EH and 0E1H to WDTRST. WDTRST is a write-only register. The WDT counter cannot be read or written. When WDT overflows, it will generate an output RESET pulse at the RST pin. The RESET pulse duration is 96xTOSC, where TOSC=1/FOSC. To make the best use of the WDT, it should be serviced in those sections of code that will periodically be executed within the time required to prevent a WDT reset. ?WDT during Power-down and Idle In Power-down mode the oscillator stops, which means the WDT also stops. While in Power-down mode, the user does not need to service the WDT. There are two methods of exiting Power-down mode: by a hardware reset or via a level-activated external interrupt which is enabled prior to entering Power-down mode. When Power-down is exited with hardware reset, servicing the WDT should occur as it normally does whenever the AT89S52 is reset. Exiting Power-down with an interrupt is significantly different. The interrupt is held low long enough for the oscillator to stabilize. When the interrupt is brought high, the interrupt is serviced. To prevent the WDT from resetting the device while the interrupt pin is held low, the WDT is not started until the interrupt is pulled high. It is suggested that the WDT be reset during the interrupt service for the interrupt used to exit Power-down mode. To ensure that the WDT does not overflow within a few states of exiting Power-down, it is best to reset the WDT just before entering Power-down mode. Before going into the IDLE mode, the WDIDLE bit in SFR AUXR is used to determine whether the WDT continues to count if enabled. The WDT keeps counting during IDLE (WDIDLE bit = 0) as the default state. To prevent the WDT from resetting the AT89S52 while in IDLE mode, the user should always set up a timer that will periodically exit IDLE, service the WDT, and reenter IDLE mode. With WDIDLE bit enabled, the WDT will stop to count in IDLE mode and resumes the count upon exit from IDLE. ?UART The UART in the AT89S52 operates the same way as the UART in the AT89C51 and AT89C52. For further information on the UART operation, refer to the ATMEL Web site ( atmel. com). From the home page, select ‘Products’, then ‘8051-Architecture Flash Microcontroller’, then ‘Product Overview’. ?Timer 0 and 1 Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the AT89C51 and AT89C52. For further information on the timers’ operation, refer to the ATMEL Web site ( atmel. com). From the home page, select ‘Products’, then ‘8051-Architecture Flash Microcontroller’, then ‘Product Overview’. ?Timer 2 Timer 2 is a selected by bits in T2CON, as shown in Table 3. Timer 2 consists of two 8-bit registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate 16-bit Timer/Counter that can operate as either a timer or an event counter. The type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2). Timer 2 has three operating modes: capture, auto-reload (up or down counting), and baud rate generator. The modes are is 1/12 of the oscillator frequency. 4. 2 AT24C08 2-wire Serial EEPROM Features: ?Low-voltage and Standard-voltage Operation –2. 7 (VCC = 2. 7V to 5. 5V) –1. (VCC = 1. 8V to 5. 5V) ?Internally Organized 128 x 8 (1K), 256 x 8 (2K), 512 x 8 (4K), ? 1024 x 8 (8K) or 2048 x 8 (16K) ?2-wire Serial Interface ?Schmitt Trigger, Filtered Inputs for Noise Suppression ?Bi-directional Data Transfer Protocol ?100 kHz (1. 8V) and 400 kHz (2. 5V, 2. 7V, 5V) Compatibility ? Write Protect Pin for Hardware Data Prote ction ?8-byte Page (1K, 2K), 16-byte Page (4K, 8K, 16K) Write Modes ? Partial Page Writes are Allowed ?Self-timed Write Cycle (5 ms max) ?High-reliability –Endurance: 1 Million Write Cycles –Data Retention: 100 Years ?Automotive Grade, Extended Temperature and Lead-free/Halogen-free Devices ? Available ?8-lead PDIP, 8-lead JEDEC SOIC, 8-lead MAP, 5-lead SOT23, ? 8-lead TSSOP and 8-ball dBGA2â„ ¢ Packages ?Description: The AT24C08 provides 8192 bits of serial electrically erasable and programmable read-only memory (EEPROM) organized as 1024 words of 8 bits each. The device is optimized for use in many industrial and commercial applications where low-power and low-voltage operation are essential. The AT24C08 is available in space-saving 8-lead PDIP, 8-lead JEDEC SOIC, 8-lead MAP, 5-lead SOT23 , 8- lead TSSOP and 8-ball dBGA2 packages and is accessed via a 2-wire serial interface Block diagram: Figure 4. 3-AT24C08 Block Diagram Figure 4. 4-AT24C08 Pin Diagram Pin Description ?SERIAL CLOCK (SCL): The SCL input is used to positive edge clock data into each EEPROM device and negative edge clock data out of each device. ?SERIAL DATA (SDA): The SDA pin is bi-directional for serial data transfer. This pin is open-drain driven and may be wire-ORed with any number of other open-drain or open collector devices. ?DEVICE/PAGE ADDRESSES (A2, A1, A0): The A2, A1 and A0 pins are device address inputs. The A0 pin is a no connect. The AT24C08 only uses the A2 input for hardwire addressing and a total of two 8K devices may be addressed on a single bus system. The A0 and A1 pins are no connects. Memory Organization ?AT24C08, 8K SERIAL EEPROM: Internally organized with 64 pages of 16 bytes each, the 8K requires a 10-bit data word address for random word addressing. Device Operation ?CLOCK and DATA TRANSITIONS: The SDA pin is normally pulled high with an external device. Data on the SDA pin may change only during SCL low time periods. ?START CONDITION: A high-to-low transition of SDA with SCL high is a start condition which must precede any other command STOP CONDITION: A low-to-high transition of SDA with SCL high is a stop condition. After a read sequence, the stop command will place the EEPROM in a standby power mode ? ACKNOWLEDGE: All addresses and data words are serially transmitted to and from the EEPROM in 8-bit words. The EEPROM sends a zero to acknowledge that it has received each word. ?STANDBY MODE: The AT24C08 features a low-power standby mode which is enabled: (a) upon power-up and (b) after the receipt of the STOP bit and the completion of any internal operations. ?MEMORY RESET: After an interruption in protocol, power loss or system eset, any 2- wire part can be reset by following these steps: 1. Clock up to 9 cycles. 2. Look for SDA high in each cycle while SCL is high. 3. Create a start condition. Device Addressing: The 8K EEPROM only uses the A2 device address bit with the next 2 bits being for memory page addressing. The A2 bit must compare to its corresponding hard-wired input pin. The A1 and A0 pins are not connected. Write Operations ?BYTE WRITE: A write operation requires an 8-bit data word address following the device address word and acknowledgment.