Thursday, November 28, 2019

Voluntarist and Regulated Approaches to Vocational Education and Training Tend to Embody Opposite Logics

Introduction Meaning and Importance of Vet Human resource development is given impetus by the fact that giving employees knowledge and required skills can completely change organisations and improve lives (Grugulis 2007a, p.1). When skills are well deployed they provide support for national and organisational competitiveness which enables companies to perform better (Grugulis 2007a, p.1).Advertising We will write a custom essay sample on Voluntarist and Regulated Approaches to Vocational Education and Training Tend to Embody Opposite Logics specifically for you for only $16.05 $11/page Learn More Therefore training and development safeguard productivity and supporting it and therefore firms have been able to prepare employees for current and future jobs. Many firms have resulted to training the internal employees on the knowledge and skills relevant to its functions (Grugulis 2007a, p.2). On the other hand educational systems in a place do affect the hum an resource development in any country (Grugulis 2007b, p.58). With the scientific revolution in the workplace calling for higher levels of education; training, greater exercise of intelligence and mental efforts as well as Vocational Education and Training (VET) is an inevitable player in human resource development and management (Ashton 2001, p.165). This is because there is need for a more competent skilled labour workforce for sustainable development, which is established on the idea of keeping in mind the ecological effects by use of suitable technologies. Furthermore, for there to be any growth in the social and economic scene, particular types of human capital and skills are required (CEDEFOP 2010). The issues vocational education and training at workplace are not only the concerns of individual workers and employers but of the whole society. In a larger picture an educated and skilled human resource is the backbone of a well functioning and productive economy which is presum ed competitive, wealthy and nurturing the wellbeing of the whole society (Holden 2001a, p.341). This paper is going to examine the two approaches to vocational education and training: the voluntary and regulated approaches and will show how these approaches employ opposite logics in their application.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Approaches to Vocational Education and Training Vocational education and training is a major stakeholder in preparing and developing human resource which is compatible to the changing demands on the workplace due to technological transformation. However there are different interpretations of the form and nature of what should be an objective Vocational Education and Training (VET) system and because of varied needs of skills at different places there are different approaches to this training and educational discourse (Holden 2004a, p.356; Gruguli s 2007b, p.56). With time, it has been noted that Vocational education and training is important especially due to its recurrence in the agenda of bi- and multilateral donors (CEDEFOP 2010). This is mainly because of three reasons: Firstly, despite the fact that UNESCO Education for all initiative has succeeded in bringing improved enrolment rates and quality of primary education, several concerns arise, particularly with regard to the way in which the employability in secondary education graduates can be promoted. In addition, the worldwide ecological and socioeconomic development patterns have allowed for the principle of Vocational Education and Training as well as the development of human capital (Wallenborn 2010, p.182). With all these proposals needing attention the question remains as to whether the two approaches; voluntary or compulsory [regulated] are compatible (Holden 2001a, p.356). Regulated Approach This approach is also known as compulsory because there is usually a l egislation that requires employers to ensure that their employees are given a specific training and education. Harrison (1995:38, quoted in Holden 2001a, p.356) reports that under this approach, the liberal democrats, the TUC, the commission for social justice and the labour party call for employers’ coercion through legislation to offer training to the employees.Advertising We will write a custom essay sample on Voluntarist and Regulated Approaches to Vocational Education and Training Tend to Embody Opposite Logics specifically for you for only $16.05 $11/page Learn More This regulation usually happens in a number of varied forms (Ashton and Felstead 2001, p.167). For instance, in France, it is a requirement for employers to back up training or otherwise give a certain amount to the state. In Germany, on the other hand, a system of stringent and broad apprenticeship of youths who are prospective members of the labour market is provided. In addit ion, there are ‘licenses to practice’ which are required for different lines of work (Grugulis 2007b, p.54). This approach assumes that vocational Education and Training is beneficial to the entire society and has lifelong benefits to all in order to obtain an extremely competent work force. The compulsory approach gets a lot of backing from the fact that investing in Vocational Education and Training (VET) can be effective in promoting socioeconomic progress, increasing economic competitiveness and reducing poverty in the triangle of productivity, employability and sustainable growth (Wallenborn 2010, p.181). Therefore the assumption created in this approach is that if companies and firms are not forced to train their employees they will only put much emphasis on profits making and therefore the society and individuals will never progress and this will be reflected in the whole economy. Moreover, when left to their own companies concentrate on short term benefits, whic h more often than not, have proved to be of poor quality and do not develop a person as can be seen in the case of United Kingdom (Holden 2001b). Another major outcome of this is that these companies at times tend to enrol workers who have been trained in other places without necessarily training their own workers (Grugulis 2007a, p.2). Through the provision of a suitable base or even the idea of the payable levies and the regulation of this training, a full-bodied development of skills is guaranteed to the state. Voluntarist Approach This approach is the direct opposite of the regulated where the government and other stakeholders have so little to do as far as their influence on the general Vocational Education and Training system in a given nation is concerned (Grugulis 2007a, p.3).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Contrary to what it insisted in the regulated approach labour party for instance has shifted its stand from where the organisation should be compelled to provide training, in what is known as levy system, to this recent proposal which adopts the element of persuasion (Holden 2001a, p.356). In the voluntarist approach the individual or organization is the one to be involved in the choosing of the kind of training and whether to do it or not as in some cases where the trade union have to negotiate with the employer on the kind of training to be accorded to the employee (Boheim and Booth 2004, p.520). The approach assumes that the effectiveness of any given firm is boosted if the firm has little or no bottlenecks that arise from external regulations hence adopting a unitary kind of workplace relationship (Harrison 2002, p.36). Through the market forces, such as the need to stay on the competing edge, production of high quality commodities and the need for smooth and efficient running o f the firms usually see to it that if there is suitable training, the companies will capitalize on it. Since there will be no costly and strict bureaucracy, such an investment will be made in such a manner as to correspond accurately to the demands of the market (Ashton 2004, p.23). Comparison of the Two In comparing the two approaches it is therefore evident that they are opposites in that one adopts a persuasive approach while the other one relies on compulsion. The differences between the two are however much clear in theory than in practice (Grugulis 2007b, p.53). The regulated approach is adopted when a country wants to achieve the level of skills it need thus putting regulations on the Vocational Education and Training (VET) systems (Holden 2001b, p.54). While this is taken as a social justice that would promote good for all, it is looked at as a form of taxation by the antagonists. Regulated approach looks at the society as a whole and a company welfare whereby when skills ar e requires, there is no need of it searching for them from outside but source them from within (Grugulis 2007a, p.2). The voluntary approach on the other hand considers that there should be liberal kind of operation in the workplace where freedom is given for the firm to determine whether to train or not and for that case workers have limited rights but more responsibilities (Rainbird 2002). Here the government do not coerce individuals or companies but appeal to their good will to adopt the Vocational Education and Training (VET) system for their good as in the United Kingdom (CEDEFOP 2009). This is also driven by the market needs where in case a certain skill is lacking in the market, firms can train their employees but if the skill is there in abundance they do not invest much in training. In summary the two can be contrasted in that first while regulated approach recognise the importance of skills at work voluntarist approach do not develop value or develop skills. In addition, Voluntarist approach’s training is very narrow while regulated approach is broad and much focused. In a regulated approach there is employee input and investment facilitation but voluntary approach only favours the employer by limiting employees input and thus becomes a disincentive to investment (Rainbird 2002). Case Studies A case study on the VET systems of different nations reveals that very different policies that govern the same are employed and as a result leading to several varied impacts (Grugulis 2007a). We are going to look at the cases of United Kingdom and Germany and it is also quite clear that for the two countries, there are a number of itineraries that are traversed in Vocational Education and Training, which range from comparatively low degree strategies such as Training for Work in Germany to higher ones such as university graduate and postgraduate degrees (Westwood 2004, p.45). It is worth noting that institutional uniqueness in different countries makes i t impossible for systems to be compatible and this is actually the major reasons as to why there are different approaches to Vocational Education and Training in different countries. The United Kingdom In the United Kingdom, the voluntarist approach to Vocational Education and Training (VET) is used and traditionally companies are given the lee way to allow for training and development to their various employees. Vocational Education and Training (VET) was in essence introduced in the United Kingdom to develop the youth into practicable members of society rather than being just mere workers (Harrison Kessels 2004, p.36). Due to the comparative decline in the economy in the United Kingdom several issues have popped up to establish what education can do in either stopping or turning around this pattern (Heyes and Stuart 1996). A rather apparent fact is that the employers on their own are not in a position to meet the cost of gaining the overall objective required by the nation for in vestment in training, education and development and hence trade union’s involvement (Sutherland Rainbird 2000, p.197). This emanates from the fact that employers only work to achieve the goals of their establishments rather than those of the nation at large. It is also worth noting that they work in a jumble of complicated and low quality Vocational Education and Training courses, touchstones and makings (Grugulis 2007a, p.3). That is why one time the French government altered its voluntarist approach so as to deal with the country’s deficit of skills in a schematic manner. Nevertheless, there is still a raging argument on whether or not the voluntarist approach should be done away with (Rubery Grimshaw 2003). In line with this, the Labour government in the year 2000 made it clear that it was not going to take on a training levy any soon, which only points to only one thing; the voluntarist approach will also not be discarded any soon (Holden 2001b). In the United Ki ngdom there is less state intervention in giving directives for training of staff and the major targets are short term benefits (Harrison 2002). Due to the practical experience of the businesses, which have very much boosted their carrying out of activities through investment in people, IIP provides a nation level benchmark which determines the rationales that bond training and development action directly to the objectives of the business so as to ensure there is effective and sustainable use of the resources provided for training and development (Boheim and Booth 2004, p.538). Through this, all classes of organizations are in a position to gauge their progress as far as performance in their businesses is concerned (Lloyd Payne 2004). In the last month of the year 1999, a total of 16454 firms including units within them had already obtained national standards as Investors to people and about twenty two thousand were already committed in arriving at the reward. This reward in turn g ives the organizations significant gains that help them to work for, and achieve that standard. From research it was concluded that the benefits are accrued from the ensuring that strategy is used in the training and that the needs of the business are met through the same. Particularly, the firms assert that when working towards IIP, it assists them to elucidate and put across the objectives of the business and speeding up continuous advancement go-aheads (Ashton 2004, p.27). There is also marked participation of managers in the development of individuals hence uniting rather unrelated action (Heyes 2000, p.150). As a result, the administrative staff members obtain the attention that may have been overlooked in the past. Other firms conceive the idea that IIP will enable them to increase their profitability, efficiency in sales as well as incomes while at the same time operating at a reduced cost (Ashton 2004, p.28). Other studies reveal that discrepancies may arise in recognition e specially when a firm is aiming at retaining the reward after a period of three years. As such, individuals may underperform and only up their game after three years when they need to be recognized. To achieve this reward, significant endeavour has been established. However, the gains will only be achieved through the underlying logistics and reflexive activities that are used in the training (Grugulis 2007a). Germany In Germany the vet system is usually regulated where Occupational Labour Market system is mainly used and there are strong establishments for employers. There is also a dual VET system which emanates from the unanimity and the sundry workplace and school based system which has been cited as a perfect example of top-drawer pattern (Brown et al. 2008). The system may be seen as if it sources financing from the state the state but the truth is that a bigger percentage of the Vocational Solid co-operation emanates from among the employers, state as well as the trade unions (Harrison 2002). In Germany Vocational Education and Training is therefore financed by the employers who, together with the trade unions, back the central and local government in the running of the same (Ashton and Felstead 2001, p.185). To ensure that the VET system is made compulsory, there are laws and guidelines that have been established to ensure that the employers are obliged to fund as well as set aside resources necessary for the training purposes (Sutherland Rainbird 2000). The structures, processes and establishments that run the system are collectively administered by the employers, unions and the state (Ashton and Felstead 2001, p.185). The two-fold arrangement is classified into three stages whereby the very inaugural phase starts in the terminal years of being in school (Ashton and Felstead 2001, p.169). In this phrase a lot of emphasis is put on the high level education for every individual because of a great realization that a beneficial general education gives a firm foundation for learning in the future (Harrison 2002). A great percentage of young school leavers begin apprenticeship as well as other young people who have qualifications that are in one way or another equivalent to A-levels. The others are absorbed into the tertiary educational institutions. This dual system puts much emphasis on the substantial relationship theory and practice when it comes to training (Boheim and Booth 2004, p.526). The apprentice devotes a fraction of his or her time in attending the vocational college while another part of the same is spent obtaining integrated training from a skilled workman within the apprentice’s working environment (Sutherland Rainbird 2000). It is a strict requirement that the skilled workman (otherwise known as a meisterwerker) is well equipped with instruction techniques (Ashton 2001). Both instructions given on and out of the job usually undergo cautious co-ordination so as to ensure the resultant vocational course covers all the details concerning the trade of the given apprentice and the skills required therein. This is widely accepted in the entire labour market in Germany (Lloyd Payne 2004) because it saves the employer the task of going outside the company to poach those workers who are already trained by other organizations (NATFE and Youthaid quoted by Felstead Green 1994, p.199). The state agencies, establishments and the youth jointly meet the costs of the dual system. This is in the sense that the firms commit themselves to the payment of on-the-job training while the youths have to do with comparatively meagre pays and the public funds are used to pay for the vocational institutions. Despite the fact that Germany offers a great number of apprenticeship places, only a fraction of them are taken especially ever since the year 1986, mainly due to the fact that the 1990s ushered a new era of unmanageable times (Harrison 2002). Compared to the United Kingdom, Germany boasts of thrice their w orkforce despite their labour forces being equal (Wallenborn 2010). It is however worth noting that much as the vocational Education and Training policies in Germany are very much regulated they may no longer be in a position to reduce the number of unemployed individuals in the present days (Brown et al. 2008, p.46). There is however problems which relate to the fitting and structure and capacity when compared to the ever fluctuating demand and supply of trained human resources in the job market (Ashton 2004, p.25). Germany has also experienced far much more mutual reciprocal action between education and training as compared to several other countries which adopt the regulated VET system. Conclusion Human resource development is so indispensable that the way of developing it has been theorized in varied models and each is aimed at its best. VET system is an objective model that enables organizations and firms to have knowledgeable and skilled manpower which can enable them achieve their goals in operation. On the other hand there is a concern in socioeconomic welfare in impacting knowledge on individuals as this enables them to be compatible and ensure continuity even when recession comes. That is why some countries like Germany create regulations to force firms to offer training to their employees because this training has an impact on a person and society at large. This regulated kind of vocational education and training is where the organizations and firms are obliged to invest in training in their employees and liable to law incase that is not done. On the other hand some countries do not believe that this control is important and they prefer leaving the options to individuals and firms to do it their fashion like the case of United Kingdom. A close examination of the VET systems in the UK and Germany proves that voluntary and the regulated approaches are direct opposites and they embody dissent logics. While regulated approach presumes that, when left a lone, most firms will concentrate on making profit and forget training employees, the voluntarist approach believes that when left at their discretion firms can perform better than when they operate under control. Moreover, regulated approach takes into account the good of the whole society starting with the worker because when a worker is skilled, he or she can deploy the skills elsewhere therefore as firms get profits the employee can get skills but voluntarist approach seems to favor the employer. This society cooperation and concern is seen in Germany where a culture is created for all stakeholders; parents, state, employers and training institutions work together towards a common goal. In the case of UK the voluntarist approach reveal a lot of employer laxity in employees and that is why any slight recession would lead to employers retrenching workers and poaching for those who have experiences without incurring the cost of training them when the economy recovers. With these di rect opposing logics, expectations and outcomes the voluntary and regulated approaches to VET are two opposing approaches to a single policy. In short the two are aimed at opposing goals, means and ends. References Ashton, D., 2004. The political economy of workplace learning. In H. Rainbird, A. Fuller and A. Munro, ed. Workplace Learning in Context. London: Routledge, pp.21-37. Ashton, D., 2001, From training to lifelong learning: the birth of the knowledge society?’ In: J. Storey, Human Resource Management; A critical Text. 2nd ed. London: Thompson learning, pp.165-189. Ashton, D. and Felstead, A., 2001. From training to lifelong learning: the birth of the knowledge society? In: J. Storey. 2nd ed. Human Resource Management: A Critical Text. London: Thompson Learning, pp.165-189. Boheim, R. and Booth, A., 2004. Trade union presence and employer-provided training in Great Britain. Industrial Relations, 43(3), pp.52-545. Brown, P., Ashton, D., Lauder, H. and Tholen, G., 2008. Towards a High-Skilled Low-Waged Workforce? A Review of Global Trends in Education, Employment and the Labour Market. Cardiff: SKOPE Monograph 10. Cardiff: SKOPE, Cardiff University. CEDEFOP, 2009. Contribution of Collective Bargaining to Continuing Vocational Training. Dublin: European foundation for the improvement of living and working condition. CEDEFOP, 2010, Employer-Provided Vocational Training in Europe. Research Paper No.2. Luxembourg: Publications Office of the European Union. Felstead, A. and Green, F., 1994. Training During Work Employment Society. Work, Employment and Society, 8(2), pp. 199-219. Grugulis, I., 2007a. Skills, training and human resource development. Hampshire: Palgrave Macmillan, pp.1-11. Grugulis, I., 2007b, Vocational Education and Training in Britain. In: Skills, Training and Human Resource Development. Houndmills: Palgrave, pp. 54-70. Harrison, R., 2002. Learning and Development. 2nd ed. London: CIPD, pp. 60-77. Harrison, R. and Kessels, J., 2004. Hum an Resource Development in a Knowledge  Economy. Basingstoke: Palgrave, pp.35-37. Heyes, J., 2000, Workplace Industrial Relations and Training In: H. Rainbird, ed, Training in The Workplace. Houndmills: Macmillan, pp.148-162. Heyes, and Stuart, M., 1996. Does training matter? Employee experiences and attitudes. Human Resource Management Journal, 6(3): pp.7-21. Holden, l., 2001a, Human Resource Development: The Organisational and The National Framework. In: I.B holden. Human Resource Management: A Contemporary Approach. 3rd ed. Essex pearson, pp.349-360. Holden, l., 2001b. Human Resource Development:The Organisational And The National Framework. In: I.B Holden, T. Claydon, eds. 2004. Human Resource Management: A Contemporary Approach. 4th ed. Essex: Pearson, pp.341-367. Lloyd, C. and Payne, J., 2004. The Political Economy of Skill: A Theoretical Approach to Developing a High Skills Strategy in the UK. In: C. Warhurst, I. Grugulis, and E. Keep, ed. The Skills that Matter. Basingstok e: Palgrave, pp. 207-224. Rainbird, H., 2002. No rights, just responsibilities: Individual demand for continuing training. In: K. Evans, P. Hodkinson, and L. Unwin, ed. Working to Learn: Transforming Learning in the Workplace. London: Kogan, chapter 12: pp.23-33. Rubery, G. and Grimshaw, D., 2003. The Organisation of Employment: An International Perspective. Hampshire: Palgrave, Chapter 5: Skilling the labour force, pp.106- 137. Sutherland, J. and Rainbird, H., 2000. Unions and workplace learning: Conflict or cooperation with the employer? In: H. Rainbird, ed. 2000. Training in the Workplace. Houndmills: Macmillan, pp. 189-209. Wallenborn, M., 2010. Vocational Education and training and human capital development: Current practice and future options. European Journal of Education, 45 (2) p.181-198. Westwood, A., 2004. Skills that matter and shortages that don’t. In: C. Warhurst, I. Grugulis and E. Keep, ed. The Skills that Matter. Basingstoke: Palgrave, chapter 3: pp. 38-39, 4 2-53. This essay on Voluntarist and Regulated Approaches to Vocational Education and Training Tend to Embody Opposite Logics was written and submitted by user Kimber A. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

my part Essays

my part Essays my part Essay my part Essay Name: Instructor: Course: Date: Managing the Job Evaluation Process A job evaluation can be defined as a methodical approach to establishing the value of an occupation in relation to other posts within the organization. Job evaluation processes attempt to build a systematic contrast between tasks to evaluate their relative value for the reason of establishing a balanced pay structure. Job evaluation needs to be distinguished from job analysis that refers to an organized way of collecting information about a profession. Therefore, job evaluation starts with job analysis and concludes when the value of an occupation is determined for attaining pay equity between different professions. Typically, the process of job evaluation follows the following fundamental phases with unique cases having a different approach. As an employer, it is imperative to gain the acceptance of the trade unions and the employees themselves through explaining the objectives and functions of the program. This could be done through oral presentations, internal memos, and brochures to categorize all significant elements of the job evaluation program. The next step involves creating a job evaluation commission. It is impractical for a single individual to assess all the vital posts in an organization. Frequently, a job evaluation commission comprising of knowledgeable personnel, union delegates and human resource professionals is formed to initiate the process. The third phase involves determining the posts to be appraised. It is not mandatory that -very job need not be evaluated as this may be too demanding and expensive. Certain vital jobs in each division may be selected. While selecting the jobs, caution must be taken to ascertain that they are a representative of the type of work done in that sector. This phase should be followed by an analysis and preparation of the job description. These are lists developed to outline the general tasks, functions and duties of a position. Components of a job description include qualifications, salary and other competencies. After this, the method of evaluation is selected. The most relevant method of assessing the positions must be identified, considering the work factors as well as organizational needs. The last phase involves categorizing the jobs. The relative value of different posts in an organization may be discovered after organizing jobs in order of significance using standards such as expertise requirements, experience desired, specific conditions under which tasks are carried out, type of duties to be borne, degree of supervision and the amount of pressure caused by the position. By assigning the weights to each factor, the final value of a position can determined by adding the total of all the weights for each category. These awarded points can then be changed into monetary functions. Several methods of job evaluation have been devised but most of these have been proved to be inefficient and flawed. The ranking method is the most popular and involves categorizing positions from the highest to the lowest as well as using their difficulty as the criterion. The downside to this approach is that it encourages subjectivity and creates conflict. The classification method is more scientific and creates a prearranged number of positions groups where each post is allocated for example executives, skilled, semi-skilled and unskilled workers. The problem with this approach is that it oversimplifies the precise differences between different positions and different grades. The most elaborate and systematic method, the factor comparison method, uses a series of factors to rank each position. Examples of these factors include physical and mental effort, duties, working conditions and skill required. The overall process of job evaluation has its own limitations in that it is not completely scientific. The formulas for most of its techniques are also highly questionable and difficult to understand. Lastly, the stakeholders including trade unions representatives, employees and program administrators award different weights to each factor and this creates conflicts.

Thursday, November 21, 2019

Investment Data Essay Example | Topics and Well Written Essays - 500 words

Investment Data - Essay Example It came into existence as a result of several mergers and acquisitions. Based on the latest Annual Report of the company, it has not issued shares of common stock using investment bankers or a syndicate of investment bankers, or at least there is no mention of any from accessible official documents ; in fact, it has been known to be buying back its shares. The only reference which could give one an inkling of common stocks being handled is this excerpt from its Notes to Financial Statements: â€Å"The merger was accounted for using the purchase method in accordance with SFAS No. 141, and the aggregate transaction value was $6,890 million, consisting of $5,829 million of cash and common stock issued at closing, $973 million of consideration for the shares acquired from . . . .† One major investment bank, Morgan Stanley, has probably handled some negotiations leading to some acquisitions. However, there is no explicit mention of Morgan Stanley anywhere in the companys most recent Annual Report, although the investment company has on several occasions made evaluative comments concerning Verizon. If anything, there seems to be a close relationship between the firm and Morgan Stanley. One of its Directors has had former ties with the investment bank: â€Å"Mr. Nicolaisen, 63, . . . has been a Director since 2005. He is also a director of MGIC Investment Corporation, Morgan Stanley and Zurich Financial Services.† (Annual Report 2007) Investment Dictionary defines Financial Intermediary as an institution that acts as the middleman between investors and firms raising funds. Often referred to as financial institutions. Investopedia states that it can include chartered banks, insurance companies, investment dealers, mutual funds, and pension funds. building societies, credit unions and financial advisers or brokers. Evidently, the investment banker also serves as financial adviser and broker/dealer for

Wednesday, November 20, 2019

State Sovereighty Essay Example | Topics and Well Written Essays - 1250 words

State Sovereighty - Essay Example However, the more powerful territorial states repeatedly violated the national jurisdiction of the weaker ones and were legally free to â€Å"make war, violate human rights, neglect the welfare of citizens, and damage the ecology†. (Weiss, 2007, p. xiv) This classical definition of sovereignty eventually came to an end as effected by the two Hague Peace Conferences of 1899 and 1907. The result of the conference was the foundation of three conventions and three declarations which stipulated the laws that would govern international attitude towards land warfare, sea warfare, and peaceful settlement of disputes. Sovereignty in the classical sense was challenged by economic globalization and the development of alliances, regional coalitions, and shared currency. It was imposed upon by victors and the emerging community of nations clamoring for a secure and peaceful co-existence. Furthermore, it was realized that respect for human rights were equally important as territorial integrity and that states have a dual responsibility; internal respect for the well being of its people and external respect for the sovereignty of other states. Bodin first introduced the modern meaning of sovereignty during the sixteenth century. Through him, we are able to identify the modern definition of a sovereign state as a group of people living in a community, organized under a sovereign government which exercises the power of making and enforcing laws within the community, and is not itself subject to any superior government. The modern meaning of sovereignty is anchored on a people’s ability to adopt its own basic law, and to propose and adopt amendments to the basic law by directly deciding on all issues, instead of delegating decisions to national legislatures, and a duty to protect human rights. According to Daniel Philpott (2001), sovereignty has come closer to enjoying universal explicit assent than any other principle of political organization. (p. 3) The United Nations

Sunday, November 17, 2019

Viruses vs. Windows Essay Example | Topics and Well Written Essays - 250 words - 3

Viruses vs. Windows - Essay Example I would also turn on the windows update option in order to receive security updates for his/her windows. I would recommend my neighbor to install an antivirus application and update it on a regular basis. I would not recommend him/her to use a free version of the above-mentioned antivirus applications because they are sometimes unable to deal with dangerous viruses. Licensed applications provide reliable security to the files stored in any machine. I would recommend my neighbor to use Avast antivirus application because it has eight effective real-time shields that protect the system from viruses, as well as consumes fewer system resources as compared to other antivirus applications. My last recommendation for him/her would be to avoid opening junk emails and suspicious internet links because they are likely to contain viruses. Both of these antivirus applications run very well on the Windows XP. I would also turn on the windows update option in order to receive security updates for his/her windows. I would recommend my neighbor to install an antivirus application and update it on a regular basis. I would not recommend him/her to use a free version of the above-mentioned antivirus applications because they are sometimes unable to deal with dangerous viruses. Licensed applications provide reliable security to the files stored in any machine.

Friday, November 15, 2019

Impact of Diseases on Population Health

Impact of Diseases on Population Health Contents Introduction Different Diseases their Impact on Health Status of Population Diabetes Cholera Diphtheria Malaria Measles Arthritis Influence of various factors on Public Health Policies Efficacy of the Various Factors Involved Alternative Approaches to Address the Different Health Problems Conclusion References: Introduction Each and every year there are many chronic or non-infectious as well as infectious diseases that claim the lives of a great number of people all over the world (Vries, Cohen Rood, 1990). In America, this number is more than one and a half million. Every seven out of ten deaths occur in America due to such diseases and thus it is but more than important to prevent them in one way or the other. There are many rules, regulations and policies made each and every year in order to overcome these diseases but they are not enough as long as they are not properly executed in real life. Moreover, a lot of awareness needs to be brought in the mind of the general population so that they can take a greater level of precaution and thereby prevent the diseases from happening or nipping them in the bud at a very early stage (Kradin, 2010). Government also has a major role to play in this context as different campaigns can be done in different populations to highlight the diseases and their effects and thereby grow the eagerness in them to take precaution before as well as after the disease. The burden of non-infectious diseases is preventable to a great extent. This is because of the fact that non-infectious diseases like that of heart disease, stroke, cancer and diabetes occur in individuals as a reflection of how they lead their lives or how they respond to the physical as well as social environments that they work under. With the advancement of the technological as well as industrial aspects, people have had much less need to be dependent on their own physical activities as most of the work are done by the everyday machines that surround us. Intake of unhealthy meals is also a reason for the occurrence of these kinds of diseases. Physical inactivity, use of tobacco, consumption of alcohol in an unhealthy manner and poor nutrition are the main reason why an individual become the victim of heart diseases, stroke, asthma, diabetes, arthritis and other such non-communicable or non-infectious diseases (Buchan Cathrall, 1797). Thus it can be said that the choice of a poor or unhealthy lifestyle is the main reason why these kinds of diseases happen to people. Thus if a proper and appropriate awareness is developed in the population about the way in which a healthy lifestyle can be lead, these diseases can be controlled to a great extent. Thus along with the other social, political factors that matter in this context, the individual’s own consciousness regarding himself and the people around him or her is also very much required (Bunch, 1997). Different Diseases their Impact on Health Status of Population Each and every population is in one way or the other affected by a wide range of diseases. The following list gives a brief description of the different kinds of diseases that the human population has to deal with and how they are intensely affected by them. Diabetes Diabetes mellitus or better known as diabetes is the disease where the individual is affected with high blood sugar level. The common symptoms of this disease are that of urination in a very frequent manner, increase in the thirst of the person and also a great increase in the hunger of the person (Stehouwer Schaper, 2009). In case of diabetes too, the factors of overweight and physical inactivity play a major role in developing risk factors in the individuals for this particular disease. Thus it can be prevented by taking a little care. Source: Stehouwer Schaper, 2009. The conversion of sugar into energy is very essential in our body and that is done by the hormone insulin which converts glucose into energy. When sufficient amount of insulin in not produced in our body, the level of glucose rises in the body and hence, it shows abnormality in the daily proceeding in that particular human being and causes diabetes. The complications of diabetes involves feeling tired, feeling constantly thirsty, passing urine frequently, slow healing infections, blurred vision, itching in the skin or genital area, tingling and numbness in the feet or in the hands, unexplained weakness and fatigue, weight loss, vomiting and nausea. There are mainly two types of diabetes occurring in the society and they are Type 1 or insulin dependent diabetes that is also called Juvenile Diabetes and Type 2 or non insulin dependent diabetes that is also called Adult onset diabetes (Jackman, et. al., 2015). Source: Buschard, 2011. The Type 1 diabetes usually causes to children like young adults and teenagers and they require regular injections of insulin. The Type 2 diabetes usually affects to people above the age of 45 years and they are treated with regular exercise and healthy eating. Insulin tablets and injections are also needed sometimes. However, if Type 1 diabetes is left untreated, the person having type 1 diabetes accumulates dangerous chemical substances that have produced from burning of fat and this condition is known as keto acidosis. Genetic susceptibility is also a factor causing diabetes. The genes of an individual carry proteins and instructions that are need for the functioning of the body. Hence, if anyone parent of an individual is affected with diabetes, then the chances of that individual of having diabetes is higher. Thus, is could be said that the origin of diabetes disease in an individual comes from its heredity. The diagnosis of diabetes disease could be done by the Fasting Plasma G lucose Test and the Oral Glucose Tolerance Test. The Fasting Plasma Glucose Test is done after fasting for at least 8 hours and the Oral Glucose Tolerance Test is also done after 8 hours fasting as well as 2 hours after the person drinks 75 grams of glucose water. There are certain proportions of blood glucose level that determines that the person is suffering from diabetes or not (Buschard, 2011). Source: Jackman, et. al., 2015. Cholera The main reason for the occurrence of Cholera is because of a bacterial infection in the intestine of an individual (Barua Burrows, 1974). The infection in many of the cases can be very mild and thus no proper symptoms can be detected at the beginning. The symptoms of cholera are that of intense diarrhea, vomiting and cramps in the leg. Not each and every patient of cholera will be affected in a major way. Statistics show, that approximately one out of twenty patients of cholera suffer in an intense manner. Since the symptoms of cholera include diarrhea and vomiting, the body of the patient gets easily dehydrated and the person can also go into a state of shock. Thus in an intense case of Cholera, the patient can even die in a matter of a few hours if the person is not provided with proper treatment at the very earliest. The main reason behind a person becoming a victim of the disease of cholera is the intake of contaminated or infected food and water. The areas or locality where there sewage system and provision of drinking water is treated in a poor manner, there is a greater possibility of the people of those areas getting affected with this particular disease (Hayhurst, 2001). And if the feces of the people suffering from cholera get mixed with the system of water supply then the disease can spread in the entire locality at the blink of an eye and thus create an epidemic. The bacterium that causes cholera may live in the environment in some coastal areas. Thus if a person consumes shellfish in a raw manner, then he or she too has the chances of getting affected by the disease as the shellfish may contain that particular bacterium. During the 1800s this disease was very much common in America. The main reason behind it being that of industrialization and thus other industrialized nations were also affected. But the modern systems in which the sewage and water is treated has been able to almost wipe out this disease. Moreover, if tourists go to a place which is affected by cholera, they may even carry the bacterium being exposed to it and as a result bring it back in their native land. Thus simple but effective precautions need to be taken by outside travellers as well the people who live in the region in order to get rid of such a dangerous disease. Diphtheria Diphtheria is the serious disease caused by the infection of a bacterium which ultimately affects the respiratory system or the skin (Guilfoile, 2009). The symptoms of respiratory diphtheria are that of sore throat, fever and in some cases the neck also gets swollen up. In intense or sever cases of diphtheria a layer of membrane gets formed over the throat and for this reason the patient suffers from breathing problems. The kind of diphtheria affecting the skin is known as cutaneous diphtheria and the symptoms of it is that lesions are formed on the skin. If a person affected from this disease is not treated in a proper way then he or she can go to coma or even die. Thus the severity of this disease can very well be understood and thus precaution should be taken at any cost. This disease can be spread by an infected person by the acts of coughing or sneezing. This happens due to the fact that the person actually expels the drops which contain the bacterium of diphtheria and thus the other person coming in contact with it inhales it and thereby becomes a victim of it (Margulies, 2005). The treatment of this disease is mainly done by hospitalizing the patient and giving him or her antibiotics. America has a history of suffering from Diphtheria before 1920s but after that with the introduction of the vaccine – this disease has taken a backseat. Malaria The reason that a person gets affected with malaria is because a person gets affected with the parasite transmitted by the infected mosquitoes (Isle, 2001). The symptoms of this disease can be observed within ten day to four weeks after the individual has been bitten by the infected mosquito. The symptoms of malaria are as follows: chills, fever, sweating, muscle pain and headache. When this disease occurs in a serious or sever manner, then the patient may vomit a lot, suffer from iron deficiency (anemia), kidneys can fail to work properly, can go to coma or even die. The anti-malarial drugs help in curing the disease in the infected patients but there are also many ways in which this particular disease can be prevented to happen. No open fresh waters should be kept in one’s household or neighborhood as that is best breeding place for mosquitoes. Precautions against getting bitten can be taken by igniting mosquito killing coils, covering the windows with nets etc. Each and every individual should avoid getting bitten by mosquitos where the malaria infection is either quite common or if there is already an individual affected with the disease. Since the parasite causing malaria needs warm temperature in order to grow and survive, this disease is mainly found in tropical and sub-tropical countries (Marcus, 2004). Measles This disease is caused by a virus and is highly contagious in nature. The very early symptoms of this disease which can noticed are that of fever, cough, the eyes turn red, and the patient suffers from a runny nose (Rosaler, 2005). Initially, a type of rash appears on the skin where white spots can be noticed around the mouth and a red rash covers the whole body. The longevity of this rash is about four to seven days. In cases where the disease of very severe and intense nature, the patient can also suffer from diarrhea, the ear can get infected, occurrence of pneumonia is also a possibility, the brain can get swelled up (encephalitis) and also death. The measles virus can be transmitted from one person to another by the act of simple sneezing or coughing. The virus has the capability to stay in the air for about two long hours even after the person infected with the virus has left the place. There is no particular remedy or instant treatment for such a disease. The patients are mainly advised to take complete bed rest. Around the world, more than 20 million people are affected with this in each and every year and thus this disease can be said to be very common. But with an effective immunization campaign, this disease can be controlled and thus the population can be kept safe. Arthritis This is a kind or type of the disorder of joints for which the joints gets swollen up. This is a common disease in adults who lead a very unhealthy lifestyle and do not give much importance their own health and eating habits. Arthritis occurs mainly as a result of continuous physical inactivity and a poor nutrition of the individual under consideration. The people who have a greater chance of getting affected by this particular disease are those suffering from the following factors: Obesity, Joint Injuries etc. If a person endeavors to manage his weight and thereby decrease it to a proper limit, then the risk of the person getting affected by arthritis is much lowered. Thus doing physical activity on a regular basis can be considered as a precautionary measurement to such a disease. There are many different kinds of arthritis but the most common of them in existence is that of osteoarthritis. Influence of various factors on Public Health Policies In the United States, the threats due to the environmental health are always increasing and are much more observable in the populations having low income and also in that of the communities where colored people belong (Perrin, Durch Skillman, 1999). The environmental science researchers have always endeavored to find a correlation or association between the environment in which human beings are existing and the condition of health of those people. Thus, the role and responsibility of the primary care physicians as well as that of the other health providers are always in a state of flux as they have to act according to the environment itself. Thus they have an influence on the health policies that are being constructed for the general population to follow. The health of the general population is also one of the responsibilities of an efficient government and thus a governmental body would try to use its resources in order to understand and thereby develop public health policies which will prove to enrich and enhance the lives of the general population (Holland, 1999). Scientific and technological advancement has made a lot of things easier for the general population. Through scientific research work, a lot of effective medicines have been created which helps to treat patients and the basic precautionary medicines are mentioned in the health policies. Through the technological advancement, many devices have been created which helps in the detection as well as cure of many diseases at a very early stage. Thus in a way, the scientific and technical factors also have an influence on the public health policies that are made for the general population. Efficacy of the Various Factors Involved The current public health policies are quite efficient as a lot of diseases have been able to be prevented through the proper execution of these policies. The primary policy of creating awareness regarding the different diseases and their effects is the first step towards preventing and mitigating the various kinds of infectious as well as non-infectious diseases. Through awareness the possibility of the disease occurring will be lowered and thus care and treatment can be done in a proper way. Secondly, as the development in the field of medicine due to the extensive scientific researches done has happened in a great manner, so it has a positive effect on the public health policies (Brownson, 2003). Through governmental endeavor different campaigns are conducted over different regions and places in order to provide with medicinal equipment, giving a clinical check up to the individuals of the area in order of find out if anyone is suffering from any diseases. The policy which states that each individual is needed to go through a medical checkup within time to time actually helps individuals to identify if they are having any health problems at a very early stage. Thus is can be said in a way that the efficacy of the policies and practices are positive in the lives of the general population. Alternative Approaches to Address the Different Health Problems The alternative way in which different diseases can be controlled can be through the process of vaccination. For example, rotavirus, pneumococcal and HPV vaccines can be considered as significant and very important new interventions which can be used to reduce the different diarrheal diseases, infections relating to the respiratory tract or respiration and cervical cancer respectively. Diarrhea can also be controlled with the treatment of zinc, ORS and antibiotics amongst others. Conclusion Thus it can be observed that the human life is vulnerable to the human life but at the same time can be controlled by taking some simple precautionary measures. A lot of factors influence the construction of the public health policies which are helpful for the general population. But it is also the responsibility of the health providers to take care of some ethical issue while doing their job. For example, no care provider should work is he or she is sick as that would increase the opportunity of the disease getting spread. Thus it can very well be understood that the diseases can be ridden off only by the joint effort of both the patient and the care giver. There is not perfect treatment for diabetes but could be controlled by leading a healthy life style along with regular exercise and healthy eating. References: Barua, D., Burrows, W. (1974). Cholera. Philadelphia: Saunders. Brownson, R. (2003). Evidence-based public health. Oxford: Oxford University Press. Buchan, W., Cathrall, I. (1797). Domestic medicine: or, A treatise on the prevention and cure of diseases, by regimen and simple medicines. Philadelphia: Printed by Richard Folwell. For John Low, no. 132, Water-Street, New-York. Bunch, B. (1997). Diseases. Danbury, CT: Grolier Educational. Buschard, K. (2011). What causes type 1 diabetes? Lessons from animal models. APMIS, 119, pp.1-19. Guilfoile, P. (2009). Diphtheria. New York: Chelsea House. Hayhurst, C. (2001). Cholera. New York: Rosen. Holland, W. (1999). Public health policies in the European Union. Aldershot: Ashgate. Isle, M. (2001). Malaria. New York: Rosen Pub. Group. Jackman, J., Chafe, R., Albrechtsons, D., Porter, R., Nugent, C., Waheed, S. and Newhook, L. (2015). Delayed diagnosis and issues with pump usage are the leading causes of diabetic ketoacidosis in children with diabetes living in Newfoundland and Labrador, Canada. BMC Kradin, R. (2010). Diagnostic pathology of infectious disease. Philadelphia, PA: Saunders Elsevier. Marcus, B. (2004). Malaria. Philadelphia: Chelsea House Publishers. Margulies, P. (2005). Diphtheria. New York: Rosen Pub. Group. Perrin, E., Durch, J., Skillman, S. (1999). Health performance measurement in the public sector. Washington, D.C.: National Academy Press. Rosaler, M. (2005). Measles. New York: Rosen Pub. Group. Stehouwer, C., Schaper, N. (2009). Diabetes. Oxford: Clinical Pub. Vries, R., Cohen, I., Rood, J. (1990). The Role of micro-organisms in non-infectious diseases. London: Springer-Verlag. 1 | Page

Tuesday, November 12, 2019

Christian View of the Natives in the New World Essay -- American Ameri

Christian View of the Natives in the New World Some would say that Christopher Columbus was a devout Christian. He believed that "his was a mission that would put Christian civilization on the offensive after centuries of Muslim ascendancy" (Dor-Ner 45). Columbus' original mission was to find a western route to the Indies. But when that failed, his mission became clear: convert these new people to Christianity. Throughout this paper I will show the view of the natives by Columbus and Christendom and how these views changed over a span of fifty years. Columbus made it very clear that he was doing this not only for Ferdinand and Isabella, but also for the faith that he was subject to (Dor-Ner 150). He may not have always had the backing of the Papacy, but he always claimed to be doing, whatever it was that he was doing, for the Church. In 1492, when Columbus first arrived, the first thing he saw were a bunch of naked people. I guess to someone who is used to "civilization" this would be somewhat shocking. His first impression of them was recorded in his log. He says that all he saw were young people, handsome and well built, and they seemed to be friendly and well-dispositioned (Dor-Ner 152). So first contact was not a hostile thing. This friendly attitude towards the natives did not last long. There was a settlement left on the island of Hispaniola, after the first voyage, called Navidad. The settlers were supposed to be cementing relations and trading with the natives. On the night of November 27, 1493, when Columbus was on his second voyage back to visit this colony, he was met with only silence. All that was found were the ashes of the town and the remains of the settlers bodies (Dor-Ner 206-207). From this ... ...es or even killing them, but it was a start. It took fifty years for people to even declare that the beasts that they were killing were indeed human and capable of understanding religion. They went from being looked at as a friendly people, to slaves and evil abominations, to truly innocent men who need and want to receive the Word of God. It took five hundred years for people to truly realize that what we did was just plain wrong. Bibliography Davies, Nigel. Voyagers to the New World. New York: William Morrow and Company, Inc., 1979. Dor-Ner, Zvi. Columbus and the Age of Discovery. New York: William Morrow and Company, Inc., 1991. Dyson, John. Columbus: for Gold, God, and Glory. New York: Simon and Schuster, 1991. Kung, Hans. Christianity: Essence, History, and Future. New York: Continuum, 1995. Sublimus Dei. http://www.listserv.american.edu.

Sunday, November 10, 2019

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m