Saturday, August 31, 2019

Little Miss Oversexualized

Little Miss Over Sexualized The way that media portrays children today is just plain disgusting. Not only is it inappropriate, it also severely damages the self-esteem of children all over the world. When companies like Vogue put out advertisements of children as young as 10 years old dressed in skimpy clothes, full make-up, and posed very provocatively what does that say to every day children? This is how you need to look to be â€Å"beautiful† or this is how they need to dress and act to be one of the â€Å"cool kids†?The media, whether it is television, magazines, or newspaper are causing huge problems to the self-esteem of children today, especially young girls by putting out advertisements that over sexualize them. Established in 1892 and begun printing advertisements in 1909 Vogue Magazine has been the authority on high class fashion for the past one hundred plus years. (History of 1)In January 2011 edition of French Vogue published a full 15 page spread featuring Thylane Loubry Blondeau a 10 year child model in full make-up, dressed in stimulating clothing, and posed very provocatively.Needless to say this caused a big controversy about over sexualizing children, not only in France but around the world. â€Å"In Britain, Labor Parliament Member Helen Goodman called the photos ‘disgraceful and totally irresponsible†¦Vogue has descended into the gutter by doing this’ (10-year-old 1). Although most of these ads are not aimed directly at small children and pre-teens, they are viewed by them and the effect it is having on them is devastating. Children are developing several different emotional, psychological and physical issues.These issues include but are not limited to: inability to relate to peers, eating disorders, depression and even promiscuity. In her article â€Å"Sex images in media harming kids' mental health† Janelle Miles, a long time journalist for the Australian news publication â€Å"The Courier-Mailâ₠¬  writes: â€Å"Australian and New Zealand College of Psychiatrists president Louise Newman said ‘evidence was emerging that childhood exposure to developmentally inappropriate sexualized images and messages was associated with low self-esteem, depression and eating disorders’.Professor Newman said child psychiatrists were seeing an increasing number of younger children presenting with negative self-esteem and body image issues. Exposure to sexualizing messages contributes to girls defining their self-worth and popularity in terms of sexual attractiveness, with negative impact on self-esteem,’ Prof. Newman said. ‘Excessive focus on appearance and a narrow definition of attractiveness has been found to contribute to the development of abnormal eating behaviors and a lack of positive body image.What's particularly concerning is some primary school-aged children, and even preschoolers, are presenting with some of these concerns. ‘I've seen children as young as four telling me . . . they're ugly’. That's appalling. Children are very receptive and influenced by what's in the world around them† (Miles 1). Although children are being exposed to a barrage of over sexualized print ads, the media does not stop there. Over the last twenty years television shows and commercials have begun to over sexualize young children and teens at an alarming rate.In 1995 the â€Å"Parent Television Counsel was founded to ensure that children are not constantly assaulted by sex, violence and profanity on television and in other media. This national grassroots organization has more than 1. 3 million members across the United States, and works with television producers, broadcasters, networks and sponsors in an effort to stem the flow of harmful and negative messages targeted to children. The PTC also works with elected and appointed government officials to enforce broadcast decency standards.Most importantly, the PTC produces critical res earch and publications documenting the dramatic increase in sex, violence and profanity in entertainment† (PTC Study 1) Increasingly alarming are the Television shows such as â€Å"Toddlers in Tiaras† and â€Å"Little Miss Perfect† showing parents pushing children as young as 2 years old to compete in beauty pageants. The parents scream and yell at these young children and sometimes guilting them into participating in these pageants. These kids are put into frilly dresses, make-up caked on their little faces, and they are told â€Å"if they don’t win mommy will be disappointed. What kind of message does this send to children who are in the middle of developing their identity? Interestingly in December 2010 the PTC completed a study called â€Å"Tinsel town’s New Target: A study of Teen Female Sexualization on Primetime TV. The content of this report was based on the most popular prime time shows among 12-17 year olds during the 2009-2010 televisio n seasons. The following are some alarming facts produced from that report: Underage female characters are shown participating in a higher percentage of sexual depictions compared to adults (47% and 29% respectively).Only 5% of the underage female characters communicated any form of dislike for being sexualized (excluding scenes depicting healthy sexuality). Out of all the sexualized female characters depicted in the underage and young adult category for the entire database, 86% were presented as only being of high school age. Seventy-five percent of shows that included sexualized underage female characters were shows that did not have an â€Å"S† descriptor to warn parents about the sexual content.Based upon a definition established by the American Psychological Association of â€Å"healthy† vs. â€Å"unhealthy† sexuality, the study findings show that 93% of the sexual incidents involving underage female characters occurred within a context that qualified as â €Å"unhealthy. † The data revealed that 98% of the sexual incidents involving underage female characters occurred outside of any form of a committed relationship. The data show that 73% of the underage sexualized incidents were presented in a humorous manner or as a punch line to a joke. PTC Study 1) Tim Winters the President of the PTC said â€Å"The results from this report show Tinsel town’s eagerness to not only objectify and fetishize young girls, but to sexualize them in such a way that real teens are led to believe their sole value comes from their sexuality. This report is less about the shocking numbers that detail the sickness of early sexualization in our entertainment culture and more about the generation of young girls who are being told how society expects them to behave†( PTC Study1). Contrary to the belief in this country, children of today’s society are not stupid.It has long been said by many different expert that children’s brain s process and absorb information twice as fast as an adult. Benjamin Barber a renowned political scientist who earned his Ph. D. from Harvard University in 1966 writes in his 1993 article â€Å"America Skips School. †: â€Å"The young, with their keen noses for hypocrisy, are in fact adept readers-but not of books. They are society-smart rather than school-smart, and what they read so acutely are the social signals emanating from the world in which they will have to make a living.Their teachers in that world, the nation’s true pedagogues, are television, advertising, movies, politics, and the celebrity domains they define. We prattle about deficient schools and the gullible youngsters they turn out, so vulnerable to the siren song of drugs, but think nothing of letting the advertisers into the classroom to fashion what an Advertising Age essay calls ‘brand and product loyalties through classroom-centered, peer powered lifestyle patterning’†(116). In conclusion advertisements that over sexualize children are not going to stop.The government needs to listen to the hundreds of studies that have been completed to show that these advertisements have a huge psychological and sometimes physical impact on children, and they need to put a stop to it. Parents, start teaching your children that they do not have to be a super model to be a good person, just be themselves. Works Cited Barber, Benjamin R. â€Å"America Skips School. † Writing On The River. 3RD ed. Chattanooga: McGraw-Hill Companies, 2012. 116. Print. Graff, Amy. â€Å"10-year-old Fashion Model Sparks Debate | The Mommy Files | an SFGate. om Blog. † The Mommy Files | an SFGate. com Blog. SFGate, 9 Aug. 2011. Web. 06 Nov. 2012. â€Å"History of Vogue Magazine. † History of Vogue Magazine. Vouge Magazine, n. d. Web. 12 Nov. 2012. Miles, Janelle. â€Å"Sex Images in Media Harming Kids' Mental Health. † CourierMail. Couriermail. com. au, 17 Mar. 2010. Web. 06 Nov. 2012. â€Å"PTC Study: Sexualized Teen Girls Are Tinseltown's New Target. † PTC Study: Sexualized Teen Girls Are Tinseltown's New Target. Parent Television Council, 25 Dec. 2010. Web. 06 Nov. 2012. .

Derek Liu

DEREK LIU ENGLISH TEAM †¢ ? Sir , blue-blooded ,? Sir , †¢ , , , 04? Sir ,! †¢ 2011-12 DSE †¢ DSE ( Level 5 7. 6%),Derek Liu English Team 324? Level 5/5*/5** , 5 ! †¢ 2010 Derek Liu English Team 405? Level 5/5* ,Level 4 410? ,!! 2010 3 10A Sir †¢ , , †¢ Sir Beat 334 Paper 3 Listening? HKDSE Beat Paper 1 Reading? Super Word Power , ,? 5! †¢ 04-09 , (05-06 ) (06-07 ) , Sir †¢ 05? 06 3 10A Sir ,? 07 ?1? 5A Sir , Sir †¢ 2002 Sir , , 03-05 (SWA) 02 WHY DEREK ? 1 2 DSE ( Level 5 7. 6%),Derek Liu English Team 324? Level 5/5*/5** ( Paper ), 5! DSE ( P. 4),08 CE Paper 1B Q. 2 (? ),09 UE Section B Q. 3 ( ),10 CE Paper 1B Q. 2 (YouTube/Facebook),11UE Section B Q. 2 (Social Responsibility), ,! 3 W H Y D E R E K ’s C a p t u r e 1 ! 2 3 ! ! Plan A (Paper 1 + 2 = 4? ) Plan B (Paper 3 + 4 = 4? ) Derek Liu English Team , , , , ! ( ) ? 8 600 , , ?600 , , Sir? , , ,! , 100% Sir ,Capture ? , ,! Regular Course , Capt ure DSE Capture ,! 2008 2009 2010 2012 ! 03 DEREK LIU ENGLISH TEAMVivien Chan @ St. Rose of Lima’s College I am glad that I’ve chosen Derek as my English tutor, who helped me to get 5* in HKDSE English subject. Not only did he spend a lot of time and effort in preparing the teaching materials, he also taught very well, in which he gave us a lot of extra information and exercises. Thank you Derek, for improving my English signi? cantly with the wide range of vocabularies and language pattern! Sonia Tam @ Marymount Secondary School Thank you for the skills! They are very practical and useful! Thank you! Leung Ling Sum @ Belilios Public SchoolWith Derek’s professional teaching and logical analysis of various examination question types, I got a more in-depth understanding of different answering tactics. Thanks Derek. P Oh, and I really did appreciate the colorful notes. .S. Ng Wai Ka @ Ho Yu College and Primary School Derek is a great teacher who teaches us whole heartedly with well-designed notes. In fact, he not only teachers, but also inspires – through Facebook. Although there is no live teaching, his every lesson never disappointed me. @ Liu Sir Eng Vocab Oral Writing Liu Sir Sentence Structur Thanks! @Monthly Feature Listening Practice – Karen Wong @ Good Hope School I have been Mr. Liu’s student for half a year. In the beginning, I thought that taking an English tutorial is not as useful and effective as what the school has done, because language cannot be improved within merely a year, it’s something about whether you got a strong foundation or not. But after attending Mr. Liu’s class, I found that there are more to learn in his lesson. Wording structure, dif? cult word phrases, vocabularies, all of which help to strengthen my language base. I feel more con? dent to write, and to speak, as well.His notes are comprehensive, in a sense that they cover all areas in English Language. Thank you, Mr. Liu, and your team, for all your hard work and preparation. I appreciate all your efforts to us. Thanks. @ Capture A (Plan A + Plan B) Paper 2 Law writing logic Law Essay Wish you forever success in tutorial industry and produce countless students with brilliant exam results! Writing Wong Lik Chi @ Munsang College Your notes are always found useful, clear and inspiring! Before I joined your listening intensive courses, I had failed in listening exam in school; after I had joined your courses, I got a 5* in listening.Thanks a lot! Derek! Lau Hon Yiu @ Queen’s College 5* Derek Sir Thank you very much Facebook Fu Ho Cheung @ Cheung Sha Wan Catholic Secondary School Derek Liu 5** Derek Liu Derek Liu 04 DSE Capture by Derek Plan A Paper 1 + 2 Plan B Paper 3 + 4 ,? Regular Course ,? Paper 1 ,Paper 2? , ?,! DSE 324 ? 5/5*/5**, ! 1. Paper 1 Mock Paper Set X + 2. 5** Sample Scripts for 8 Elective Modules ,? Regular Course ,? ,Paper 3 (2-3 ? ), + Paper 4 (5 ?), Conversational Strate gies! DSE 24 ? 5/5*/5**,! 1. Golden Ideas for Group Discussion 2. Group Discussion Samples (6 sets) 3. Individual Response Samples (10 sets) 2013 , ,! 3 DSE , ! 05 Plan A Paper1 Paper 1 + Paper 2 ?4? Reading (1. 5 lessons)  « 100% 2012 Past Paper! ?(Paper 1+2)!  « DSE!  « Poem Reading, , ,? ,!  « 1. 5 : (1) Guess meaning? (2) Pronoun Reference? (3) Information completion? (4) Blank-filling? (5) M. C. Cloze? (6) Sequencing? (7) Matching? (8) Summary Cloze? (9) Evidence quoting? 10) Openended questions? (11) Tone & Style? (12) Poem reading? (13) Underlying message? (14) Others  « , , 1. Mock Paper Set X,100% , Paper2 Writing (2. 5 lessons)  « Derek Liu English Team , 2. 5? !!  « 4 ? Short Tasks ( ), ?8 Short Task , examinable topics!  « 8 ? Long Tasks ( writing formats & writing types), Regular Course ?Writing Formulae, ,KO ! Sample Essays (50 pages! ) 06 2013 Plan A Paper2 ( ) Paper 1 + Paper 2 ?4? Writing (2. 5 lessons) / , 30? , ! This kind of obsc ene materials convey nothing but pornography addiction and casual sex. The big thing about Steve Jobs is not his genius or his charisma but his extraordinary risk-taking and innovation. Lady Gaga In Lady Gaga’s new MV ‘Telephone’, she just pranced around almost completely naked. The video was disgusting and full of raunchiness. Steve Jobs redefined the music business through the iPod, the cellphone business through the iPhone and the entertainment and media world through the iPad. Steve Jobs 5 ! ,ElectiveModules,Regular Course ! †¢ Learning English through Debating †¢ Learning English through Social Issues English through Sports Communication †¢ Learning English through Workplace Communication †¢ Learning English through Popular Culture Learning †¢ Learning English through Short Stories †¢ †¢ Learning English through Drama & Songs †¢ Learning English through Poems , , 07 Plan Intensive Videoa pLearning+Platformr 2 A P er 1 Pape CapStar A6ENGLDLA : Paper 1 + 2 ?4? (V. L. P. ) (HKDSE) (4 Sessions) Plan A By Derek Liu English Team by Derek Liu KB01 KB02 KB03 KB04 KB05 KB06 KB07 KB08 KB09 KB10 KB11 KB12 KB13 KB14 KB15 KB16 KB17 KB18 KB19 KB20 KB21 KB22 KB23 TK01 TK02 TK03 TK04 TK05 Sat 2:05-3:20 pm Sat 2:05-3:20 pm Sun 12:45-2:00 pm Fri 6:00-7:15 pm Fri 6:00-7:15 pm Sat 4:45-6:00 pm Sun 3:25-4:40 pm Fri 7:15-8:30; 8:30-9:45 pm ( ) Sun 10:05-11:20 am Sat 10:05-11:20 am Sat 7:15-8:30 pm Sun 2:05-3:20 pm Fri 3:25-4:40 pm Tue 12:45-2:00; 2:05-3:20 pm ( ) Tue 12:45-2:00; 2:05-3:20 pm ( ) Wed 6:00-7:15; 7:15-8:30 pm Wed 6:00-7:15; 7:15-8:30 pm Thu 6:00-7:15 pm Sat 7:15-8:30 pm Tue 3:25-4:40 pm Fri 12:45-2:00; 2:05-3:20 pm ( Mon 12:45-2:00 pm Wed 12:45-2:00; 2:05-3:20 pm ( ) Fri 7:15-8:30; 8:30-9:45 pm ( ) Sun 3:25-4:40 pm Sat 6:00-7:15 pm Mon 6:00-7:15 pm Wed 12:45-2:00; 2:05-3:20 pm ( ) 2/3-23/3 4V 2/3-23/3 4V 3/3-24/3 4V 1/3-22/3 4V 1/3-22/3 4V 2/3-23/3 4V 3/3-24/3 4V 8/3-15/3 4V 3/3-24/3 4V 2/ 3-23/3 4V 2/3-23/3 4V 3/3-24/3 4V 1/3-22/3 4V 5/3-12/3 4V ( ) 19/3-26/3 4V 6/3-13/3 4V 20/3-27/3 4V 7/3-28/3 4V 2/3-23/3 4V 5/3-26/3 4V 1/3-8/3 4V 4/3-25/3 4V 13/3-20/3 4V 8/3-15/3 4V 3/3-24/3 4V 2/3-23/3 4V 4/3-25/3 4V 6/3-13/3 4V $540 08 ## @ Plan Intensive Videoa pLearning+Platformr 2 A P er 1 Pape CapStar MK01 MK02 MK03 MK04 MK05 MK06 MK07 MK08 MK09 MK10 MK11 MK12 MK13 MK14 TW01 TW02 TW03 TW04 TW05 TW06 TW07 TW08 TW09 TW10 TW11 TW12 YL01 YL02 YL03 YL04 YL05 YL06 ## ?4? (V. L. P. ) (HKDSE) (4 Sessions) Sun 2:05-3:20; 3:25-4:40 pm ( ) Sun 2:05-3:20; 3:25-4:40 pm ( ) Sat 4:45-6:00; 6:00-7:15 pm ( ) Sun 12:45-2:00 pm Sun 12:45-2:00 pm Sat 2:05-3:20 pm Sun 10:05-11:20; 11:25-12:40 pm ( ) Sat 7:15-8:30 pm Fri 8:30-9:45 pm Mon 7:15-8:30; 8:30-9:45 pm ( Sat 3:25-4:40 pm Mon 12:45-2:00; 2:05-3:20 pm ( ) Mon 12:45-2:00; 2:05-3:20 pm ( ) Tue 12:45-2:00; 2:05-3:20 pm ( ) Sat 2:05-3:20; 3:25-4:40 pm ( ) Sun 3:25-4:40 pm Fri 7:15-8:30; 8:30-9:45 pm ( ) Fri 7:15-8:30; 8:30-9:45 pm ( ) S at 11:25-12:40 pm Wed 7:15-8:30; 8:30-9:45 pm ( ) Thu 8:30-9:45 pm Wed 4:45-6:00 pm Wed 7:15-8:30; 8:30-9:45 pm ( ) Thu 12:45-2:00; 2:05-3:20 pm ( ) Thu 12:45-2:00; 2:05-3:20 pm ( ) Wed 12:45-2:00; 2:05-3:20 pm ( ) Fri 6:00-7:15; 7:15-8:30 pm ( ) Fri 6:00-7:15; 7:15-8:30 pm ( Sat 12:45-2:00; 2:05-3:20 pm ( ) Sat 12:45-2:00; 2:05-3:20 pm ( ) Mon 2:05-3:20; 3:25-4:40 pm ( ) Sun 11:25-12:40; 12:45-2:00 pm ( ) 3/3-10/3 4V 17/3-24/3 4V 9/3-16/3 4V 3/3-24/3 4V 3/3-24/3 4V 2/3-23/3 4V 10/3-17/3 4V 2/3-23/3 4V 1/3-22/3 4V 11/3-18/3 4V 2/3-23/3 4V 4/3-11/3 4V 18/3-25/3 4V 19/3-26/3 4V 9/3-16/3 4V 3/3-24/3 4V 1/3-8/3 4V ( ) 15/3-22/3 4V 2/3-23/3 4V 6/3-13/3 4V 7/3-28/3 4V 6/3-27/3 4V 20/3-27/3 4V 7/3-14/3 4V 21/3-28/3 4V 13/3-20/3 4V 1/3-8/3 4V 15/3-22/3 4V 2/3-9/3 4V 16/3-23/3 4V 4/3-11/3 4V 3/3-10/3 4V $540 @ , 09 Plan Intensive Videoa pLearning+Platformr 2 A P er 1 Pape CapStar TM01 TM02 TM03 TM04 TM05 TM06 TM07 TM08 TM09 TM10 S101 S102 S201 S202 S203 S204 S205 S206 S207 FT01 FT02 F T03 FT04 TY01 TY02 TY03 FL01 FL02 FL03 Sat 4:45-6:00; 6:00-7:15 pm ( ) Sat 4:45-6:00; 6:00-7:15 pm ( ) Sun 10:05-11:20 am Sun 12:45-2:00 pm Thu 7:15-8:30 pm Sat 3:25-4:40 pm Wed 12:45-2:00; 2:05-3:20 pm ( ) Wed 12:45-2:00; 2:05-3:20 pm ( ) Tue 12:45-2:00; 2:05-3:20 pm ( ) Tue 12:45-2:00; 2:05-3:20 pm ( ) Tue 4:45-6:00; 6:00-7:15 pm ( Tue 4:45-6:00; 6:00-7:15 pm ( ) Fri 7:15-8:30 pm Fri 7:15-8:30 pm Sat 2:05-3:20; 3:25-4:40 pm ( ) Sat 2:05-3:20; 3:25-4:40 pm ( ) Sun 10:05-11:20 am Fri 12:45-2:00; 2:05-3:20 pm ( ) Mon 12:45-2:00; 2:05-3:20 pm ( ) Sat 11:25-12:40; 12:45-2:00 pm ( ) Sat 12:45-2:00; 2:05-3:20 pm ( ) Thu 6:00-7:15 pm Thu 2:05-3:20; 3:25-4:40 pm ( ) Sat 2:05-3:20; 3:25-4:40 pm ( ) Sat 2:05-3:20; 3:25-4:40 pm ( ) Sun 3:25-4:40 pm Sun 11:25-12:40; 12:45-2:00 pm ( ) Sat 7:15-8:30 pm Mon 7:15-8:30 pm ?4? (V. L. P. ) (HKDSE) (4 Sessions) 2/3-9/3 4V 16/3-23/3 4V 3/3-24/3 4V 3/3-24/3 4V 7/3-28/3 4V 2/3-23/3 4V 6/3-13/3 4V 20/3-27/3 4V 12/3-19/3 4V 26/3-2/4 4V 5/3-12/3 4V 19/3-26/3 4V 1/3-22/3 4V 1/3-22/3 4V 2/3-9/3 4V ( ) 16/3-23/3 4V 3/3-24/3 4V 15/3-22/3 4V 11/3-18/3 4V 2/3-9/3 4V 16/3-23/3 4V 7/3-28/3 4V 7/3-14/3 4V 2/3-9/3 4V 16/3-23/3 4V 3/3-24/3 4V 10/3-17/3 4V 2/3-23/3 4V 4/3-25/3 4V $540 10 ## @ , Plan Intensive Videoa pLearning+Platformr 2 A P er 1 Pape CapStar Sat 10:05-11:20 am CB01 Sat 2:05-3:20 pm CB02 Fri 8:30-9:45 pm CB03 Sat 4:45-6:00 pm CB04 Sat 3:25-4:40 pm CB05 Sat 12:45-2:00 pm NP01 Sat 3:25-4:40 pm NP02 Sun 3:25-4:40 pm NP03 Mon 7:15-8:30 pm NP04 Fri 2:05-3:20; 3:25-4:40 pm ( ) NP05 AB01 Tue 2:05-3:20; 3:25-4:40 pm ( ) AB02 Tue 2:05-3:20; 3:25-4:40 pm ( ) ?4? (V. L. P. ) (HKDSE) (4 Sessions) 2/3-23/3 4V 2/3-23/3 4V 1/3-22/3 4V 9/3-6/4 4V 2/3-23/3 4V 2/3-23/3 4V ( ) 2/3-23/3 4V 3/3-24/3 4V 4/3-25/3 4V 8/3-15/3 4V 5/3-12/3 4V 19/3-26/3 4V $540 ## @ , 11 Plan B Paper3 Paper 3 + Paper 4 ?4? Listening (2 lessons)  « 100% 2012Past Paper ! !  « 3? Long Tasks Format! Marking Scheme, Long Tasks!  « 4? Short Tasks, Ta pescript , !  « DSE? CE & AL ,!  « 2 : Short Tasks Long Tasks †¢ Form-filling / Checklist / Table-filling / Others †¢ Opening ( ) & Closing ( ) / Layout ( ) Non-reply Letter Reply Letter Article Speech Personal Profile Simple Report Press Release Email Content ( ) & Relevance ( ) ?/? Data File ?Answers Data File 12 Plan B Paper4 Paper 3 + Paper 4 ?4? Speaking (2 lessons)  « 5 , Paper 4!!  « Conversational Strategies, Sentence Patterns? Useful Diction? Golden Ideas,!  « Sample Discussion? Sample Responses,? 14!  « 2 : Group Discussion 1. 2. 3. 4. Elaborate by Examples Elaborate by borrowing Elaborate by Dos/Don’ts Elaborate by providing alternatives 5. Give concrete names 6. Elaborate by listing the pros and cons Individual Response dead air ! 6. Giving & Supporting Opinions 7. Agreeing & Disagreeing 8. Advantages & Disadvantages 9. Proposing Solutions to Problems 7. Ask ‘Wh-’ questions and provide answers 8. Elaborate by ‘Ifâ₠¬â„¢ 9. Lead the members 10.Refute the others 11. Offer assistance 1. Do you prefer X to Y? 2. What do you dislike about X? 3. What do you like most about X? 4. Why do some people like X? 5. How would you improve X? 1 5% ! 1. Golden Ideas for Group Discussion 2. Group Discussion Samples (6 sets) 3. Individual Response Samples (10 sets) Derek Liu English Team! 13 Plan Intensive Videoa pLearning+Platformr 4 B P er 3 Pape CapStar A6ENGLDLB KB01 KB02 KB03 KB04 KB05 KB06 KB07 KB08 KB09 KB10 KB11 KB12 KB13 KB14 KB15 1. : Paper 3 + 4 2. ?3? 4 Paper 4 -Oral , 4 5 ?4? (V. L. P. ) (HKDSE) (4 Sessions)Plan B By Derek Liu English Team by Derek Liu Fri 7:15-8:30; 8:30-9:45 pm ( ) 1/3,26/4 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 22/3,3/5 4V Sat 7:15-8:30 pm 2/3-9/3, 27/4-4/5 4V Sat 7:15-8:30 pm 16/3-23/3 4V Sat 4:45-6:00 pm 27/4-4/5 Sun 2:05-3:20 pm 3/3-10/3 4V Sat 10:05-11:20 am 27/4-4/5 Sun 2:05-3:20 pm 17/3-24/3, 27/4-4/5 4V Fri 7:15-8:30 pm 1/3-8/3, 26/4-3/5 4V Fri 7:15-8:30 pm 15/3-22/3 4V Fri 6:00-7:15 pm 26/4-3/5 Thu 8:30-9:45 pm 7/3-14/3 4V Sat 2:05-3:20 pm 27/4-4/5 ( ) Thu 8:30-9:45 pm 21/3-28/3 4V Fri 6:00-7:15 pm 26/4-3/5 Mon 2:05-3:20; 3:25-4:40 pm ( 4/3 4V Tue 6:00-7:15; 7:15-8:30 pm ( ) 30/4 Mon 2:05-3:20; 3:25-4:40 pm ( ) 25/3 4V Tue 6:00-7:15; 7:15-8:30 pm ( ) 7/5 Wed 12:45-2:00; 2:05-3:20 pm ( ) 27/3 4V Sun 10:05-11:20 am 28/4-5/5 Tue 12:45-2:00; 2:05-3:20 pm ( ) 2/4 4V Sun 2:05-3:20 pm 28/4-5/5 Fri 7:15-8:30; 8:30-9:45 pm ( ) 5/4 4V Sun 12:45-2:00 pm 28/4-5/5 $540 14 ## @ , Plan Intensive Videoa pLearning+Platformr 4 B P er 3 Pape CapStar TK01 TK02 TK03 TK04 MK01 MK02 MK03 MK04 MK05 MK06 MK07 MK08 MK09 MK10 TW01 TW02 TW03 TW04 TW05 TW06 TW07 ?4? (V. L. P. (HKDSE) (4 Sessions) 1/3,26/4 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 22/3,3/5 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 16/3-23/3 Sat 7:15-8:30 pm 4V 4/5 Sat 6:00-7:15; 7:15-8:30 pm ( ) 19/3 Wed 12:45-2:00; 2:05-3:20 pm ( ) 4V 27/4 Sat 6:00-7:15; 7:15-8:30 pm ( ) Sat 12:45-2:00 pm 2/3-9/3, 27/4-4/5 4V Sat 12:45-2:00 pm 16/3-23/3 4V Sat 2:05-3:20 pm 27/4-4/5 Sat 4:45-6:00; 6:00-7:15 pm ( ) 2/3,27/4 4V Sat 4:45-6:00; 6:00-7:15 pm ( ) 23/3,4/5 4V Sun 10:05-11:20; 11:25-12:40 pm ( ) 3/3,5/5 4V Sun 10:05-11:20; 11:25-12:40 pm ( ) 24/3 4V Sun 2:05-3:20; 3:25-4:40 pm ( 5/5 Mon 7:15-8:30; 8:30-9:45 pm ( ) 4/3,6/5 4V Mon 7:15-8:30; 8:30-9:45 pm ( ) 25/3 4V Fri 8:30-9:45 pm 26/4-3/5 ( ) Tue 12:45-2:00; 2:05-3:20 pm ( ) 5/3 4V Sat 7:15-8:30 pm 27/4-4/5 Tue 12:45-2:00; 2:05-3:20 pm ( ) 12/3 4V Sun 2:05-3:20; 3:25-4:40 pm ( ) 28/4 Sat 2:05-3:20; 3:25-4:40 pm ( ) 2/3,27/4 4V Sat 2:05-3:20; 3:25-4:40 pm ( ) 23/3,4/5 4V Fri 4:45-6:00 pm 1/3-8/3 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 26/4 Fri 4:45-6:00 pm 15/3-22/3 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 3/5 Wed 7:15-8:30; 8:30-9:45 pm ( ) 3/4,8/5 4V Fri 7:15-8:30; 8:30-9:45 pm ( 5/4 4V Fri 4:45-6:00 pm 26/4-3/5 Wed 12:45-2:00; 2:05-3:20 pm ( ) 6/3 4V Sat 11:25-12:40 pm 27/4-4/5 @ , $540 ## 15 Plan Intensive Videoa pLearning+Platformr 4 B P er 3 Pape Cap Star TW08 YL01 YL02 YL03 YL04 TM01 TM02 TM03 TM04 TM05 TM06 S101 S201 S202 S203 S204 ?4? (V. L. P. ) (HKDSE) (4 Sessions) 27/3 Wed 12:45-2:00; 2:05-3:20 pm ( ) 4V 25/4-2/5 Thu 8:30-9:45 pm 2/3-9/3 Sat 10:05-11:20 am 4V 26/4 Fri 6:00-7:15; 7:15-8:30 pm ( ) 16/3-23/3 Sat 10:05-11:20 am 4V 3/5 Fri 6:00-7:15; 7:15-8:30 pm ( 17/3 Sun 11:25-12:40; 12:45-2:00 pm ( ) 4V 27/4 Sat 12:45-2:00; 2:05-3:20 pm ( ) 24/3 Sun 12:45-2:00; 2:05-3:20 pm ( ) 4V 4/5 Sat 12:45-2:00; 2:05-3:20 pm ( ) 10/3,5/5 4V Sun 2:05-3:20; 3:25-4:40 pm ( ) 17/3 Sun 2:05-3:20; 3:25-4:40 pm ( ) 4V 27/4 Sat 4:45-6:00; 6:00-7:15 pm ( ) 9/3-16/3 Sat 7:15-8:30 pm 4V 2/5 Thu 7:15-8:30; 8:30-9:45 pm ( ) 24/3 Sun 2:05-3:20; 3:25-4:40 pm ( ) 4V 4/5 Sat 4:45-6:00; 6:00-7:15 pm ( ) ( ) 23/3-6/4 Sat 7:15-8:30 pm 4V 25/4 Thu 7:15-8:30; 8:30-9:45 pm ( ) 5/3 Tue 12:45-2:00; 2:05-3:20 pm ( 4V 28/4-5/5 Sun 10:05-11:20 am 2/4,30/4 4V Tue 7:15-8:30; 8:30-9:45 pm ( ) 2/3-9/3 Sat 7:15-8:30 pm 4V 27/4 Sat 2:05-3:20; 3:25-4:40 pm ( ) Sat 7:15-8:30 pm 16/3-23/3, 27/4-4/5 4V Fri 8:30-9:45 pm 22/3-5/4 4V Fri 7:15-8:30; 8:30-9:45 pm ( ) 3/5 Mon 12:45-2:00; 2:05-3:20 pm ( ) 4/3 4V Sat 2:05-3:20; 3:25-4:40 pm ( ) 4/5 $540 16 ## @ , Plan Intensive Videoa pLearning+Platformr 4 B P er 3 Pape CapStar FT01 FT02 FT03 TY01 TY02 FL01 FL02 CB01 ?4? (V. L. P. ) (HKDSE) (4 Sessions) CB02 CB03 NP01 NP02 NP03 NP04 AB01 AB02 /3-9/3 Sat 2:05-3:20 pm 4V 27/4 Sat 12:45-2:00; 2:05-3:20 pm ( ) 16/3-23/3 Sat 11:25-12:40 pm 4V 4/5 Sat 12:45-2:00; 2:05-3:20 pm ( ) 21/3-28/3 Thu 4:45-6:00 pm 4V 2/5 Thu 4:45-6:00; 6:00-7:15 pm ( ) 14/3 Thu 2:05-3:20; 3:25-4:40 pm (DL) 4V 27/4 Sat 2:05-3:20; 3:25-4:40 pm ( ) 21/3 Thu 2:05-3:20; 3:25-4:40 pm (DL) 4V 4/5 Sat 2:05-3:20; 3:25-4:40 pm ( ) 3/3,5/5 Sun 11:25-12:40; 12:45-2:00 pm ( ) 4V Sun 11:25-12:40; 12:45-2:00 pm ( ) 24/3,12/5 4V 2/3,27/4 4V Sat 3:25-4:40; 4:45-6:00 pm ( ) 27/3-3/4 Wed 8:30-9:45 pm 4V 26/4-3/5 Fri 8:30-9:45 pm 2/4 Tue 12:45-2:00; 2:05-3:20 pm ( 4V 27/4-4/5 Sat 2:05 -3:20 pm ( ) 1/3 Fri 2:05-3:20; 3:25-4:40 pm ( ) 4V 27/4-4/5 Sat 12:45-2:00 pm Thu 8:30-9:45 pm 7/3-14/3, 2/5-9/5 4V Fri 2:05-3:20; 3:25-4:40 pm ( ) 22/3 4V Sat 3:25-4:40 pm 27/4-4/5 Thu 8:30-9:45 pm 21/3-28/3 Sun 3:25-4:40 pm 5/5 4V Mon 7:15-8:30 pm 6/5 Tue 2:05-3:20; 3:25-4:40 pm ( ) 2/4 4V Sat 4:45-6:00; 6:00-7:15 pm ( ) 27/4 Mon 8:30-9:45 pm 25/3 Tue 6:00-7:15 pm 2/4 4V Sat 4:45-6:00; 6:00-7:15 pm ( ) 4/5 $540 ## @ , 17 Capture (Plan A/B) ? DSE www. derekliu. com. hk ? Derek’s Blog ( )

Friday, August 30, 2019

Intelligent Campus Using Rfid

chapter 1 introduction 1. 1GENERAL With the increasing denial of time and space the RFID technology is gaining momentum day by day. RFID is a source of identification of individuals and unique products. The budding technology RFID proves to threaten even the cloning technique, through the chip insertion. New ways of improving the existing RFID technology are being found and implemented. This advancement of RFID technology is looked beyond the security purposes. 1. 2 PRESENT SCENARIO Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of unique serial number) of an object wirelessly, using radio waves. RFID technologies are grouped under the more generic Automatic Identification and Data Capture (AIDC). The RFID technology is used only in security, tagging goods, inventory purposes. Since the RFID technology is not well established in India, the introduction of new methodology in the field of RFID will indeed enhance the use of RFID technology in various areas of science and technology. . 3 PROBLEM An individual should be allocated to maintain registers in all places and appointment of staffs for coordinating with students in all occasions. The ID card can be duplicated even thought it has some other advancement which will be used in rare occasions. 1. 4 SOLUTION The best solution to the above problem is to develop a single RFID tag that can be used inside the college campus. Each and every RFID tag holds a particular number and it is integrated with the id cards of each and every individuals. The RFID tag reader can be fixed anywhere in campus and it is used to collect the information about the tag location. The collected data can be sent to centralized server to handle that information. Another added advantage is that the ID cards can’t be duplicated. This has several advantages and it is a time saving one for the institution, students and staff members. 1. 5 HARDWARE AND SOFTWARE REQUIRED The hardware required is: 1) Personal computer. 2) RS 232. 3) Reader. 4) Power supply unit. 5) IR transmitter and receiver pair. 6) Buzzer. 7) LCD. 8) Tags. The software required is: 1) AVR studio 3. 5. 2) Visual studio 6. 0. 1. 6 BLOCK DIAGRAM Figure 1. 1 block diagram of intelligent campus using RFID CHAPTER 2 RFID system 2. 1 INTRODUCTION Radio Frequency Identification or RFID refers to the set of technologies that use radio waves for identifying objects or people. The RFID system is used to identify individual objects or things in the environment which can be monitored through use of wireless technology. RFID is a generic term for technologies that use radio waves to remotely store and retrieve data. In other words, it is a combined term with RF and ID where RF means a wireless communication technology and ID means identification information of tag. So it is said that RFID is theoretically a wireless networking technology to transmit identification information stored at an electronic memory space. 2. 2 COMPONENTS OF RFID SYSTEM: ? An RFID device (transponder or tag), that contains data about an item. ? An antenna used to transmit the RF signals between the reader and the RFID devices. ? An RF transceiver that generates the RF signals. A reader that receives RF transmissions from an RFID device and passes the data to the host system for processing. Figure 2. 1: RFID SYSTEM 2. 3 GENERIC RFID TAG ARCHITECTURE The tag contains circuit to both rectify DC power from the incoming RF signal as well as to detect and extract the information modulated on the signal. The antenna load is a controlled resistance that changes the impedance of the dipole, enabling the backscatter. The tag IC is mounted on a carrier known as a strap and subsequently bonded to the antenna to form the fully assembled tag. The chip itself is very small, enabled by modem CMOS technology. The mounting of the die on a carrier has been made very inexpensive and capable of large volume by either flip-flop or by other innovative technique such as the Alien Technologies Fluidic self Assembly process. [pic] Figure 2. 2: Basic Tag IC Architecture 2. 4 Components of a tag The major components of the tag are 1) Microchip. 2) Antenna. 2. 4. 1 Microchip Microchip is electronic equipment consisting of a small crystal of silicon semiconductor fabricated to carry out a number of electronic functions in an integrated circuit. The microchip used in a HF tag is a contact less read/ write passive RFID device that is optimized for 13. 56 MHz RF carrier signal. The device needs an external LC resonant circuit for wireless communication with the interrogator. The device is powered remotely by rectifying an RF signal that is transmitted from the interrogator and transmits or updates its contents from memory-based on commands from interrogator. 2. 4. 2 Antenna The antenna emits the radio signal to activate the tag and reading and writing data to it. Antennas are the conduits between the tag and the transceiver, which controls the system data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built in a door frame to receive tag data from persons or things. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continuously. If constant interrogation is not required, the field can be activated by the sensor device. 2. 5 rfid readers RFID reader is like any other device that can be connected to a PC Or might be in built like an external or internal modem. The RFID reader can be powered by a power source using an adapter †Reader† or †Interrogator†, a device that is able to locate and activate tags so that the information that has been programmed onto the tag is transmitted back to the reader and subsequently to interface computing systems. The information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc. Not only do reader locate activate and receive transmissions from RFID tags, a reader has the ability of sending data back to read/write capable tag in order to append or replace data. Readers exist that can also scan bar codes in environments where both bar codes and RFID are used. 2. 6 COMPONENTS OF A READER The reader has the following main components: ? Transmitter and Receiver ? Microprocessor ? Memory ? I/O channels for external sensors, actuators and annunciators ? Controller ? Communication interface ? Power. [pic] Figure 2. 3: BLOCK diagram of a reader 2. 6. 1 TRANSMITTER The reader’s transmitter is used to transmit AC power and the clock cycle via antennas to the tags in its read zone. This is part of the transceiver unit, the component responsible for sending the reader signal to the surrounding environment and receiving tag responses back via the reader antennas. The antenna ports of reader are connecting to its transceiver component. One reader antenna can be attached to each such antenna port. Receiver receives analog signals from the tag via the reader antenna. It then sends the signals to reader microprocessor, where it is converted to its equivalent digital form. 2. 6. 2 MICROPROCESSOR This component is responsible for implementing the reader protocol to communicate with compatible tags. It performs decoding and error checking of the analog signal from the receiver. In addition, the microprocessor might contain custom logic for doing low level filtering and processing of read tag data. 2. 6. 3 MEMORY Memory is used for storing data such as the reader configuration parameters and list of tag reads. Depending on the memory size, however, a limit applies as to how many such tag reads can be stored at one time. If the connection remains down for an extended period with the reader reading tags during this downtime, this limit might be exceeded an part of the stored data lost. 2. 6. 4 I/O channels Readers do not have to be turned on for reading tags at all time. A sensor of some sort, such as a motion or light sensor, detects the presence of tagged objects in the readers read zone. This sensor can then set the reader on to read this tag. Similarly, this component also allows the reader to provide local output depending on some condition via an annunciators or an actuator. 2. 6. 6 CONTROLLER A controller is an entity that allows an external entity, either a human or a computer program, to communicate with and control a reader’s function and to control annunciators and actuators associated with the reader. . 6. 7 COMMUNICATION INTERFACE The communication interface component provides the communication instructions to a reader that allows it to interact with external entities, via a controller to transfers its stored data and to accept commands and send back the corresponding responses. 2. 6. 8 POWER This component supplies power to the reader component. The power sources g enerally provided to this component through a power cord connected to an appropriate external electrical outlet. 2. 7 COMMUNICATION BETWEEN A READER AND A TAG Depending on the tag type, the communication between the reader and a tag can be one of the following: †¢ Modulated backscatter †¢ Transmitter type †¢ Transponder type The area between a reader antenna and one full wave length of the RF wave emitted by the antenna is called near field. The area beyond one full wavelength of the RF wave emitted from a reader antenna is called far field. Passive rfid systems operating in LF and HF use near field communication, whereas those in UHF and microwave frequencies use far field communication. The signal strength in near field communication attenuates as the cube of the distance from the reader antenna. In far field, it attenuates as square of the distance from the reader antenna. 2. 7. 1 MODULATED BACK SCATTER Modulated backscatter communication applies to passive as well as to semi active tags. In This type of communication, the reader sends out a continuous wave (CW) RF signal containing ac power and clock signal to the tag at carrier frequency. Through physical coupling, the antennas supplies power to the microchip. About 1. 2v are generally necessary to energize the tag microchip for reading microchips. For writing, the microchip usually needs to draw about 2. 2v from the reader signal. The microchip now modulates or breaks up the input signal in to a sequence of on and off patterns that represents its data and transmits it back. When the reader receives this modulated signal, it decodes the pattern and obtains the data. Thus, in modulated backscatter communication, the reader always â€Å"talks† first, followed by the tag. A tag using this scheme cannot communicate at all in the absence of a reader because it depends totally on the reader’s power to transmit its data. pic] Figure 2. 4: backscatter communication 2. 7. 2 TRANSMITTER TYPE This type of communication applies to active tags only. In this type of communication, the tag broadcasts its message to the environment in regular intervals irrespective of the presence or absence of a reader. Therefore, in this type of communication, the tag always â€Å"talks† first rather than the reader. [pic] Figure 2. 5: T RANSMITTER communication 3. 4. 3 TRANSPONDER TYPE In this type of communication, the tag goes to a â€Å"sleep† or in to dormant stage in the absence of interrogation from a reader. In this stage, the tag might periodically send a message to check any reader is listening to it. When a reader receives such a query message, it can instruct the tag to â€Å"wake up† or end the dormant stage. When the tag receives this command from the reader, it exits its current state and starts to act as a transmitter tag again. The tag data is sent only the reader specially asks. [pic] Figure 2. 6: TRANSPONDER communication chapter 3 microcontroller 3. 1 INTRODUCTION The hardware includes the following components: ? Atmega162 (micro controller). ? Power supply. ? In system programming. ? Buzzer. Liquid crystal display. ? Reset. ? Max 232. 3. 2 Hardware details of ATMEGA162 controller Utilizes the AVR – RSIC architecture. 3. 2. 1 Features ? High-performance and Low-power Advanced RISC Architecture. ? Most single clock execution. ? 32 x 8 general purpose working registers. ? Fully static operation. ? On chip 2 cycle multiplier. ? Up to 16 MIPS throughput at 16 MHz. ? 131 powerful instructions. 3. 2. 2 Non-volatile Program and Data Memories ? 16K Bytes of In-System Self-programmable Flash. ? Endurance: 10,000 Write/Erase Cycles. ? 512 Bytes EEPROM. ? 1K Bytes Internal SRAM. Up to 64K Bytes Optional External Memory Space. ? Programming Lock for Flash program and EEPROM data Security. 3. 2. 3 Peripheral Features ? Two 8-bit Timer/Counters with Separate Modes. ? Two 16-bit Timer/Counters with Separate Compare Modes, and Capture Modes. ? Real Time Counter with Separate Oscillator. ? Six PWM Channels. ? Dual Programmable Serial USARTs. ? Master/Slave SPI Serial Interface. ? Programmable Watchdog Timer with Separate On-chip Oscillator. ? On-chip Analog Comparator. ? External and internal interrupt sources. 3. 2. 4 SPECIFICATION ? Low power high speed CMOS process technology. Fully static operation. ? Power consumption at 4 MHz, 3v, 25c. ? Active: 3. 0 MA. 3. 2. 5 Special Microcontroller Features ? Power-on Reset and Programmable Brown-out Detection. ? Internal Calibrated RC Oscillator. ? External and Internal Interrupt Sources. ? Five Sleep Modes: Idle, Power-save, Power-down, Standby, and Extended Standby. 3. 2. 6 I/O and Packages ? 35 Programmable I/O Lines. ? 40-pin PDIP, 44-lead TQFP, and 44-pad MLF. 3. 2. 7 Operating Voltages ? 1. 8 – 5. 5V for ATmega162V. ? 2. 7 – 5. 5V for ATmega162. 3. 2. 8 Speed Grades ? 0 – 8 MHz for ATmega162V. ? 0 – 16 MHz for ATmega162. 3. ATMEGA162 architectural overview The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. . 3. 1 features OF ATMEGA162 The 16K bytes of In-System Programmable Flash with Read-While-Write capabilities, 512 bytes EEPROM, 1K bytes SRAM, an external memory interface, 35 general purpose I/O lines, 32 general purpose working registers, a JTAG interface for Boundary-scan, On-chip Debugging support and programming, four flexible Timer/Counters with compare modes, internal and external interrupts, two serial programmable USARTs, a programmable Watchdog Timer with Internal Oscillator, an SPI serial port, and five software selectable power saving modes. The fast-access Register File contains 32 x 8-bit general purpose working registers with a single clock cycle access time. This allows single-cycle Arithmetic Logic Unit (ALU) operation. In a typical ALU operation, two operands are output from the Register File, the operation is executed, and the result is stored back in the Register File – in one clock cycle. Six of the 32 registers can be used as three 16-bit indirect addresses register pointers for Data Space addressing – enabling efficient address calculations. One of these address pointers can also be used as an address pointer for look up tables in Flash Program memory. These added function registers are the 16-bit X-, Y-, and Z-register, described later in this section. The ALU supports arithmetic and logic operations between registers or between a constant and a register. Single register operations can also be executed in the ALU. After an arithmetic operation, the Status Register is updated to reflect information about the result of the operation. [pic] Figure 3. 1: BLOCK Diagram. Program flow is provided by conditional and unconditional jump and call instructions, able to directly address the whole address space. Most AVR instructions have a single 16-bit word format. Every program memory address contains a 16 or 32-bit instruction. [pic] Figure 3. 2: BLOCK Diagram of the AVR Architecture Program Flash memory space is divided in two sections, the Boot Program section and the Application Program section. Both sections have dedicated Lock bits for write and read/write protection. The SPM instruction that writes into the Application Flash memory section must reside in the Boot Program section. During interrupts and subroutine calls, the return address Program Counter (PC) is stored on the Stack. The Stack is effectively allocated in the general data SRAM, and consequently the Stack size is only limited by the total SRAM size and the usage of the SRAM. All user programs must initialize the SP in the reset routine (before subroutines or interrupts are executed). [pic] Figure 3. 3: Data Memory Map 3. 3. 2 ALU – Arithmetic Logic Unit The high-performance AVR ALU operates in direct connection with all the 32 general purpose working registers. Within a single clock cycle, arithmetic operations between general purpose registers or between a register and an immediate are executed. The ALU operations are divided into three main categories – arithmetic, logical, and bit-functions. 3. 3. 3 Status Register The Status Register contains information about the result of the most recently executed arithmetic instruction. This information can be used for altering program flow in order to perform conditional operations. Status Register format [pic] Bit 7 – I: Global Interrupt Enable: The Global Interrupt Enable bit must be set for the interrupts to be enabled. The individual interrupt enable control is then performed in separate control registers. If the Global Interrupt Enable Register is cleared, none of the interrupts are enabled independent of the individual interrupt enable settings. The I-bit is cleared by hardware after an interrupt has occurred, and is set by the RETI instruction to enable subsequent interrupts. Bit 6 – T: Bit Copy Storage: The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T bit as source or destination for the operated bit. Bit 5 – H: Half Carry Flag: The Half Carry Flag H indicates a half carry in some arithmetic operations. Half Carry is useful in BCD arithmetic. Bit 4 – S: Sign Bit, S = N. V: The S-bit is always an exclusive or between the Negative Flag N and the Two’s Complement Overflow Flag V. Bit 3 – V: Two’s Complement Overflow Flag: The Two’s Complement Overflow Flag V supports two’s complement arithmetic. Bit 2 – N: Negative Flag: The Negative Flag N indicates a negative result in an arithmetic or logic operation. Bit 1 – Z: Zero Flag: The Zero Flag Z indicates a zero result in an arithmetic or logic operation. Bit 0 – C: Carry Flag: The Carry Flag C indicates a carry in an arithmetic or logic operation. 3. 3. 4 Stack Pointer The Stack is mainly used for storing temporary data, for storing local variables and for storing return addresses after interrupts and subroutine calls. The Stack Pointer Register always points to the top of the Stack. The Stack Pointer points to the data SRAM Stack area where the Subroutine and Interrupt Stacks are located. This Stack space in the data SRAM must be defined by the program before any subroutine calls are executed or interrupts are enabled. Stack Pointer FORMAT pic] The Stack Pointer is incremented by one when data is popped from the Stack with the POP instruction, and it is incremented by two when data is popped from the Stack with return from subroutine RET or return from interrupt RETI. The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The number of bits actually used is implementation dependent. 3. 3. 5 Reset and Interrupt Handling The AVR provi des several different interrupt sources. These interrupts and the separate Reset Vector each have a separate program vector in the program memory space. All interrupts are assigned individual enable bits which must be written logic one together with the Global Interrupt Enable bit in the Status Register in order to enable the interrupt. There are basically two types of interrupts. The first type is triggered by an event that sets the Interrupt Flag. For these interrupts, the Program Counter is vectored to the actual Interrupt Vector in order to execute the interrupt handling routine, and hardware clears the corresponding Interrupt Flag. Interrupt Flags can also be cleared by writing a logic one to the flag bit position(s) to be cleared. If an interrupt condition occurs while the corresponding interrupt enable bit is cleared, the Interrupt Flag will be set and remembered until the interrupt is enabled, or the flag is cleared by software. The second type of interrupts will trigger as long as the interrupt condition is present. These interrupts do not necessarily have Interrupt Flags. If the interrupt condition disappears before the interrupt is enabled, the interrupt will not be triggered. 3. 3. 6 In-System Reprogrammable Flash Program Memory The ATmega162 contains 16K bytes On-chip In-System Reprogrammable Flash memory for program storage. Since all AVR instructions are 16 or 32 bits wide, the Flash is organized as 8K x 16. For software security, the Flash Program memory space is divided into two sections, Boot Program section and Application Program section. [pic] Figure 3. 4 Programmable Memory Map The Flash memory has an endurance of at least 10,000 write/erase cycles. The ATmega162 Program Counter (PC) is 13 bits wide, thus addressing the 8K program memory locations. 3. 4 EEPROM Data Memory The ATmega162 contains 512 bytes of data EEPROM memory. It is organized as a separate data space, in which single bytes can be read and written. The EEPROM has an endurance of at least 100,000 write/erase cycles. The access between the EEPROM and the CPU is described in the following, specifying the EEPROM Address Registers, the EEPROM Data Register, and the EEPROM Control Register. 3. 4. 1 EEPROM Read/Write Access The EEPROM Access Registers are accessible in the I/O space. A self timing function, however, lets the user software detect when the next byte can be written. If the user code contains instructions that write the EEPROM, some precautions must be taken. In heavily filtered power supplies, VCC is likely to rise or fall slowly on Power-up/down. This causes the device for some period of time to run at a voltage lower than specified as minimum for the clock frequency used. In order to prevent unintentional EEPROM writes, a specific write procedure must be followed. The EEPROM Address Register [pic] Bits 15. 9 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bits 8. 0 – EEAR8. 0: EEPROM Address The EEPROM Address Registers – EEARH and EEARL specify the EEPROM address in the 512 bytes EEPROM space. The EEPROM data bytes are addressed linearly between 0 and 511. The initial value of EEAR is undefined. A proper value must be written before the EEPROM may be accessed. The EEPROM Data Register –EEDR [pic] Bits 7. 0 – EEDR7. 0: EEPROM Data For the EEPROM write operation, the EEDR Register contains the data to be written to the EEPROM in the address given by the EEAR Register. For the EEPROM read operation, the EEDR contains the data read out from the EEPROM at the address given by EEAR. The EEPROM Control Register – EECR [pic] Bits 7. 4 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bit 3 – EERIE: EEPROM Ready Interrupt Enable Writing EERIE to one enables the EEPROM Ready Interrupt if the I bit in SREG is set. Writing EERIE to zero disables the interrupt. The EEPROM Ready interrupt generates a constant interrupt when EEWE is cleared. Bit 2 – EEMWE: EEPROM Master Write Enable The EEMWE bit determines whether setting EEWE to one cause the EEPROM to be written. When EEMWE is set, setting EEWE within four clock cycles will write data to the EEPROM at the selected address. If EEMWE is zero, setting EEWE will have no effect. When EEMWE has been written to one by software, hardware clears the bit to zero after four clock cycles. See the description of the EEWE bit for an EEPROM write procedure. Bit 1 – EEWE: EEPROM Write Enable The EEPROM Write Enable signal EEWE is the write strobe to the EEPROM. When address and data are correctly set up, the EEWE bit must be written to one to write the value into the EEPROM. The EEMWE bit must be written to one before a logical one is written to EEWE; otherwise no EEPROM write takes place. The following procedure should be followed when writing the EEPROM (the order of steps 3 and 4 is not essential): 1. Wait until EEWE becomes zero. 2. Wait until SPMEN in SPMCR becomes zero. 3. Write new EEPROM address to EEAR (optional). 4. Write new EEPROM data to EEDR (optional). 5. Write a logical one to the EEMWE bit while writing a zero to EEWE in EECR. 6. Within four clock cycles after setting EEMWE, write a logical one to EEWE. The EEPROM can not be programmed during a CPU write to the Flash memory. The software must check that the Flash programming is completed before initiating a new EEPROM write. Step 2 is only relevant if the software contains a Boot Loader allowing the CPU to program the Flash. If the Flash is never being updated by the CPU, step 2 can be omitted. Caution: An interrupt between step 5 and step 6 will make the write cycle fail, since the EEPROM Master Write Enable will time-out. If an interrupt routine accessing the EEPROM is interrupting another EEPROM access, the EEAR or EEDR Register will be modified, causing the interrupted EEPROM access to fail. It is recommended to have the Global Interrupt Flag cleared during all the steps to avoid these problems. When the write access time has elapsed, the EEWE bit is cleared by hardware. The user software can poll this bit and wait for a zero before writing the next byte. When EEWE has been set, the CPU is halted for two cycles before the next instruction is executed. Bit 0 – EERE: EEPROM Read Enable The EEPROM Read Enable Signal EERE is the read strobe to the EEPROM. When the correct address is set up in the EEAR Register, the EERE bit must be written to a logic one to trigger the EEPROM read. The EEPROM read access takes one instruction, and the requested data is available immediately. When the EEPROM is read, the CPU is halted for four cycles before the next instruction is executed. The user should poll the EEWE bit before starting the read operation. If a write operation is in progress, it is neither possible to read the EEPROM, nor to change the EEAR Register. 3. 5 Timing External memory devices have various timing requirements. It is important to consider the timing specification of the external memory device before selecting the wait-state. The most important parameters are the access time for the external memory in conjunction with the set-up requirement of the ATmega162. [pic] Figure 3. 5: External Data Memory Cycles without Wait-state. 3. 6 Crystal Oscillator XTAL1 and XTAL2 are input and output, respectively, of an inverting amplifier which can be configured for use as an On-chip Oscillator. Either a quartz crystal or a ceramic resonator may be used. C1 and C2 should always be equal for both crystals and resonators. The optimal value of the capacitors depends on the crystal or resonator in use, the amount of stray capacitance, and the electromagnetic noise of the environment. The Oscillator can operate in four different modes, each optimized for a specific frequency range. [pic] Figure 3. 6: Crystal Oscillator Connections 3. 6. 1 Low-frequency Crystal Oscillator The Low-frequency Crystal Oscillator must be selected by setting the CKSEL Fuses to â€Å"0100†, â€Å"0101†, â€Å"0110† or â€Å"0111†. The crystal should be connected as shown in Figure. If CKSEL equals â€Å"0110† or â€Å"0111†, the internal capacitors on XTAL1 and XTAL2 are enabled, thereby removing the need for external capacitors. The internal capacitors have a nominal value of 10 pF. When this Oscillator is selected, start-up times are determined by the SUT Fuses (real time-out from Reset) and CKSEL0 (number of clock cycles) as shown in below tables [pic] Table 4. 1 Start-up DELAYS from Reset when Low-frequency Crystal Oscillator is selected . 7 Watchdog Timer If the Watchdog Timer is not needed in the application, this module should be turned off. If the Watchdog Timer is enabled, it will be enabled in all sleep modes, and hence, always consume power. In the deeper sleep modes, this will contribute significantly to the total current consumption. Chapter 4 Intelligent campus using rfid 4. 1 INTRODUCTION This project describes about the efficient used of RFID technology around us, it also describes about the use of both hardware and software. In addition we also focus on monitoring every individual inside the campus. 4. 2 Basic setup [pic]Figure 4. 1 basic setup The basic external setup for the project is shown in figure 8. 1. The HF reader is connected to microcontroller through RS-232 cable and the IR pairs are connected to the port pins of microcontroller. The microcontroller is then connected to the host computer (server) through RS-232 cable. The detailed explanation of the blocks are given below 4. 3 PERIPHERALS 4. 3. 1 I/O PORTS All AVR ports have true read-modify-write functionality when used as general digital I/O ports. This means that the direction of one port pin can be changed without unintentionally changing the direction of any other pin with the SBI and CBI instructions. Port A Port A is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port A, one each for the Data Register – PORT A, SIB($IB($3B), Data Direction Register – DDRA, $1A($3A) and the Port A. Input Pins – PINA, $19($39). The Port A Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port B Port B is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port B, one each for the Data Register – PORT B, $18($38), Data Direction Register – DDRB, $17($37) and the Port B Input Pins – PINB, $16($36). The Port B Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port C Port C is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port C, one each for the Data Register – PORT C, $15($35), Data Direction Register – DDRC, $14($34) and the Port C Input Pins – PINC, $13($33) The Port C Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port D Port D is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port D, one each for the Data Register – PORT D, $12($32), Data Direction Register – DDRD, $11($31) and the Port D Input Pins – PIND, $10($30). The Port D Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. 4. 4 USART (Universal Synchronous and Asynchronous serial Receiver and Transmitter): The Universal Synchronous and Asynchronous serial Receiver and Transmitter (USART) is a highly flexible serial communication device. The main features are: ? Asynchronous or Synchronous Operation ? Master or Slave Clocked Synchronous Operation ? Odd or Even Parity Generation and Parity Check Supported by Hardware ? Data Overrun Detection ? Framing Error Detection ? Three Separate Interrupts on TX Complete, TX Data Register Empty and RX Complete ? Multi-processor Communication Mode ? Double Speed Asynchronous Communication Mode The ATmega162 has two USARTs, USART0 and USART1. USART0 and USART1 have different I/O Registers. Portd0 is the receiver pin and portd1 is the transmitter pin. Here we are using IC MAX232 as a UART driver. [pic] Figure 4. 2 uart driver. 4. 4. 1 AVR UART – Compatibility The USART is fully compatible with the AVR UART regarding: ? Bit locations inside all USART Registers ? Baud Rate Generation ? Transmitter Operation ? Transmit Buffer Functionality ? Receiver Operation 4. 4. 2 USART Initialization The USART has to be initialized before any communication can take place. The initialization process normally consists of setting the baud rate, setting frame format and enabling the Transmitter or the Receiver depending on the usage. For interrupt driven USART operation, the Global Interrupt Flag should be cleared (and interrupts globally disabled) when doing the initialization. The TXC Flag can be used to check that the Transmitter has completed all transfers, and the RXC Flag can be used to check that there are no unread data in the receive buffer. 4. 5 SENSOR Sensors are the devices that are used to convert the physical parameter into signal that can be measured electrically and it can be easily given as an input to the microcontroller. The effectual sensor should have the following properties namely, ? Sensor should be sensitive to measured property. ? It should be insensitive to any other property. ? It should not influence any other property. An IR sensor is used. It uses IR LED as an IR transmitter, which emits IR rays in the wavelength of 940 nm and a phototransistor is used as IR receiver, which detects IR rays and the output comes in collector. If the receiver is receiving IR rays the output will be low otherwise output is high. The output of the receiver is given to the comparator chip LM393, which compares the receiver output with the prefixed voltage signal. The output of the comparator is given to microcontroller. [pic] Figure 4. 3 CIRCUIT DIAGRAM OF IR SENSOR 4. 5. 1 IR TRANSMITTER LED, a special type of semiconductor diode that has a pn junction acts as a transmitter. The wavelength and the color of the light depend on the band gap energy of the material forming pn junction. The materials used for a LED have a direct band gap energy corresponding to near IR, but Germanium and silicon are indirect band gap materials resulting in a non – radiative recombination. Hence does not emit light. The advantages of LED over incandescent sources are: ? Less costly Long life span ? Insensitive to vibration and shocks. 4. 5. 2 IR RECEIVER A phototransistor is used to detect the IR rays from the LED. It is a bi polar junction that is encased in a transparent case so that light can reach the base collector junction. The phototransistor works like a photodiode with a very high very high sensitivity for light, because the electrons that are gene rated by photons in the base collector junction are injected to base and amplified like a transistor. It has a slower response time than photodiode. [pic] Figure 4. 4 BLOCK DIAGRAM OF IR SENSOR 4. 5. 3COMPARATOR The comparator is a circuit which compares a signal voltage applied at one input of an op-amp with a known reference voltage at the other input. For an inverting comparator the reference voltage is applied to the (+) input and input is given to the (-) terminal. The common mode voltage range includes ground, and the differential input voltage equals power supply voltage. [pic] Figure 4. 5: PIN CONFIGURATION OF LM 393 4. 6 BUZZER It is a transducer which converts electrical signal to sound signal. Piezoelectricity is the ability of certain crystals to produce a voltage when subjected to mechanical stress. The effect is reversible (i. . ) crystals when subjected to external applied voltage can change shape by a small amount and the effect is of nanometers. [pic] Figure 4. 6 circuit diagram of buzzer 4. 7 RS-232C RS-232 stands for Recommend Standard number 232 and C is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. [pic] Fig ure: 4. 7. RS-232 CONNECTOR 4. 7. 1 DB9 INFORMATION The DB9 connection has 9 pins which are each described in the below table. The illustration below is an example of the female serial connector, which would usually be located on the connector that would connect to the computer. 9 pin connector on a DTE device (PC connection) | |Pin No |Direction of the signal | |1 |Carrier(CD) ( from DCE) incoming signal from the modem | |2 |Received data (RD) incoming data from DCE | |3 |Transmit data (TD) outgoing data to a DCE | |4 |Data terminal ready (DTR) outgoing handshake signal | |5 |Signal ground common reference voltage | |6 |Data set ready (DSR) incoming handshaking signal | |7 |Request to send (RTS) outgoing flow control signal | |8 |Clear to send (CTS) incoming flow control signal | |9 |Ring indicator (RI) (from DCE) incoming signal from a modem | Table: 4. 1: DB9 connector DTE stands for Data Terminal Equipment, and DCE stands for Data Communications Equipment. These terms are used to indicate the pin-out for the connectors on a device and the direction of the signals on the pins The RS-232 standard states that DTE devices use a 9-pin male connector, and DCE devices use a 9-pin female connector. 4. 8 LCD LCD is an output device which is used to display a character or a text through microcontroller. So, the LCD is connected in the output port pins of microcontroller. A 2 line LCD display has totally 32 pins. 32 characters can be displayed in our LCD. [pic] Figure 4. 8: 16Ãâ€"2 LCD DISPLAY The starting address for the first line is $80 and for end address is $8F and for second line the starting address is $C0 and the end address is $CF. Pin no |Pin name |I/P or O/P |External connection |Function | |1 |VSS |– |Power supply |GND | |2 |VDD |– | |+5V | |3 |VO |– | |V lcd adjustment | |4 |RS |I/p |MPU |Register select signal | |5 |R/W |I/p |MPU |Read/write select signal | | | | | |Read-1; write-2. | |6 |E |I/p MPU |Operation enable signal | |7-10 |DB0-DB3 |I/p |MPU |Lower order lines | |11-14 |DB4-DB7 |I/p |MPU |Higher order lines | |15-16 |LED,,+,, |I/p |LED backlight power supply |LED,,+,, voltage | | |LED,,-,, | | |type : 4. 2V;Max: 4. 5V | | | | | |LED,,-,, : GND | Table 4. 2 discription of lcd terminals Chapter 5 VISUAL BASIC 5. 1 INTRODUCTION The Visual Basic language is quite powerful – if one can imagine a programming task; it can probably be accomplished using Visual Basic. Once the basics of Visual Basic are understood then one becomes productive. 5. 2 About Visual Basic The â€Å"Visual† part refers to the method used to create the graphical user interface (GUI), Rather than writing numerous lines of code to describe the appearance and location of interface elements, simply add pre built objects into place on screen. The â€Å"Basic† part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more programmers. Visual Basic has evolved from the original BASIC languages and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to accomplish anything that can be accomplished using any other Windows programming language. The Visual Basic programming language is not unique to Visual Basic. The Visual Basic programming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The Visual Basic Scripting Edition (VB Script) is a widely used scripting language and a subset of the Visual Basic language. The investment one makes in learning Visual Basic will carry over to many other areas. Whether the goal is to create a small utility for an individual, a work group a large enterprise-wide system, or even distributed applications spanning the globe via the Internet, Visual Basic has the required tools. 5. 3 ADVANTAGES ? Data Access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ? ActiveXTM Technologies allow you use the functionality provided by other applications, such as Microsoft Word Processor, Microsoft Excel spreadsheet, and other Windows applications. Even applications can be automated and objects can be created using the Professional or Enterprise editions of Visual Basic. ? Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within the application, or to create Internet server applications. ? The finished application is a true. exe file that uses a Visual Basic Virtual Machine that you can freely distribute. 5. 4 Program description The front end is visual basic and this programming concept is chosen because it is more users friendly. The information or the status about the persons is displayed and the same can be stored in a database so that it can be accessed later. [pic] Figure 5. : output and database creation, checking form Chapter 6 conclusion RFID technology is a budding technology that is fast growing world wide. RFID proves to be cutting edge technology through its applications. This project moves a step ahead in RFID’s application and presents a new dimension to view through. This project proves to be entirely different and innovative of RFID technology with the existing components. Such an introduction of a new methodology in the RFID technology enhances its use and improves the present knowledge. The project â€Å"INTELLIGENT campus using RFID† will sure make a great difference in the present industrial applications of RFID. It will provide the ultimate solution for the problems that exists in various cases. This is a prototype of the proposed idea wherein the entire reason behind it is to provide a fully compact, covering larger distance. 6. 1 PROCESS EXPLANATION The various processes that take place during the working of the project are as follows: The RFID tag is a passive, high frequency device in which some unique data’s can be stared in the form of serial numbers known as ELECTRONIC PRODUCT CODE (EPC). Whenever the RFID tag comes in the field of a particular reader, the reader detects the tag and sends the detected information about the EPC to the microcontroller. ACTIVITY FLOWCHART Figure 6. 1: activity flow chart The received information will be fed into the microcontroller which compares the epc number to specific information’s about group of individuals. If the received information is already in the list, it will allow the user to enter inside the campus and also maintains a database for storing this information. The reader refreshes its data continuously checks after certain amount of time interval and when the RFID reader detects the absence of a tag it will remove the tag details from the list. The database can be created with the help of visual basic programming. [pic] Figure 6. 2: database creation of persons entering into the campus Whenever the tag enters into a specific location such as class rooms, library etc, the reader present in that location will detects the tag. Two IR transmitter – receiver pairs are used for the purpose of monitoring whether the person is entering the room or leaving the room. The IR rays interfering sequence is fed to the microcontroller and it is used for detecting the status of the person having that particular tag. The details or the status are also saved into database using visual basic coding. The databases can be shared in the network and it can be used for finding or monitoring each and every individual belonging to that campus. [pic] Figure 6. 3: database creation of persons entering into PARTICULAR LOCATION. The same can be used to find the individual location using search option. 6. 2 FUTURE ENHANCEMENTS The project could further be developed and enhanced in an effective way by suitable polarization RFID reader antennas and increasing the frequency range so that it would not only provide the solution for monitoring persons in a smaller area as mentioned in this model. The security can also be increased by replacing IR devices by some bio-metric ideas. ———————– 162- MICRO CONTROLLER LCD I/O P O R T S I/O P O R T S BUZZER IR 1 IR 2 USART USART PC RFID END CREATES A DATA BASE (In/Out) 1-2 OR 2-1 Yes No Interruption Occurred CHECHS FOR IR SIGNAL CREATES A DATA BASE (Present inside the campus) INFORMATION TRANSFER FROM RFID READER TO M162 Yes RFID TAG PRESENT No READER SIGNAL TRANSMIT START

Thursday, August 29, 2019

Push and pull factors in Syrian migration Research Paper - 1

Push and pull factors in Syrian migration - Research Paper Example By August 2012 the number of Syrian refugees was believed to have reached 200,000. By March the following year, the number had reached to 1.2 million with a gradual increase expected, according to the statistics on the rate of their increase. By the end of the year 2013 there were more that 2 million Syrian refugees. About 12.5% of the total Syrian population are believed to be refugees in foreign countries. The destination of Syrian refugees includes: Lebanon; Turkey; Jordan; Iraq; Egypt; Algeria; Sweden; Bahrain; Germany; Libya; Italy; Bulgaria; Argentina; Armenia; Romania; Nagorno-Karabakh Republic Russia; Gaza strip; Macedonia; and the United States of America. These destinations are arranged in the descending order according to the number of refugees accommodated. The digits used are believed to be estimates since the Syrian refugees have been moving to other countries through both legal and illegal means. Most of the people who fled Syria are those that have no ability to face the violence that is in Syria. Statistics have proved that more than half of the refugees who flee Syria are children. Children are always the most affected by civil wars, especially due to the fact that they are naà ¯ve and physically incapable to cope with the hard situations that are always brought about by civil wars or any other kind of long term violence (Ullah 167). A majority of the remaining refugees are women. Despite the fact that they might not be naà ¯ve they do not have the physical capability to cope with their male counterparts during civil wars such as that has been experienced in Syria since 2011. The kind of work that Syrian refugees do in the foreign countries highly depends on whether or not they have working permits. Most of the Syrian refugees lack a work permit as a result of not being able to get residential papers. In most host countries, it is always harder for the

Wednesday, August 28, 2019

WK VIII Research Paper Example | Topics and Well Written Essays - 2000 words

WK VIII - Research Paper Example In this paper multi-dimensional perspectives will be analyzed after studying typologies from various empirical studies. Thus, the typologies explicated by R Harrison and C Handy (1998) will be studies, also those of T J Peters, Deal and Kennedy, Chatman and Caldwell and also those of O Reilly would be incorporated in an effort to classify organizational cultures. Furthermore, the paper will try to determine a paradigm so that behavior of those participating in these given cultures can be predicted to address organizational issues. Also, most of the models being addressed in the paper take functionalist paradigm approach to explain their typologies, thus they focus primarily on interrelationship between the internal dynamics of the organization and effectiveness. Thus, comparative research will aim at determining models of cultural classification, further aiming at predicting future behavior of those participating in the culture of the organization (Harrison & Handy 1998). Analyzing the model proposed by Harrison and Handy is one of the most credible, the oldest and the most cited one amongst all. Though the typologies proposed by both these researchers are distinct, there are many similarities in their models. Harrison identified four distinct kinds of organizations; based on the power, tasks, roles and people of the organization. Since an organization contains employees who share a sense of values, thus the system or culture of the organization is shaped by the values identified by Harrison (Hofstede 2002). The culture of power can be identified in an organization where there is immense rivalry amongst people, centralization of power exists with an intensified presence of rivalries alongside intense competition amongst various actors in the organization. Similarly, Culture of roles is found in an organization where there is stability and order, proper hierarchy, and a sense of security with apparent competition. Also, the culture of tasks is the one where

Tuesday, August 27, 2019

Written and Unwritten Constitution Essay Example | Topics and Well Written Essays - 1750 words - 1

Written and Unwritten Constitution - Essay Example This distinction between written and unwritten constitutions has led to the establishment of a far more important classification of written and unwritten constitutions. The idea of permanency is closely associated with the concept of constitution so much so that stability is considered to be one of its main attributes. Written constitutions are considered to be more permanent and, therefore, more written, because, generally speaking, they cannot be amended except by a special process or by means of special machinery. Unwritten constitutions, on the other hand, are deemed to be unwritten because they can be amended or altered by the ordinary process of legislation. It should, however, be noted that the distinction between written and unwritten constitutions does not necessarily depend on the distinction between written and unwritten constitutions. A written constitution may be as unwritten as an unwritten constitution. A typical instance is furnished by the Italian Constitution of 184 8 which, according to the generally accepted view, could be amended by the ordinary process of legislation. (Smith, 2001, 80) The distinction between written and unwritten constitutions was pointed out for the first time by Bryce, and has now become a fundamental concept of constitutional law and practice.

Monday, August 26, 2019

Assignment Example | Topics and Well Written Essays - 1500 words - 21

Assignment Example Presently, theoretical, normative, and political challenges movements have enhanced human rights. People from different walks of life usually view human rights activism as individualistic ideologies and sometimes as simply liberal commitments of the movement itself. However, the existence and application of law seems to have sunk among societal values as they widely accept the provisions within the law. Sections of the people who do not accept the provisions of the law have no choice but to subscribe to what it dictates as it is the only way put of coexistence between the government and its citizens. Interestingly, all kinds of religions see value in the provisions of the rule of law, unlike rights which they view as being driven by individual pursuits. Perhaps it may be argued that the challenges facing the prosperity of human rights and the acknowledgment of rights itself are as a result of the laxity of the rule of law towards protection of human rights. In fact, by virtue of individuals accepting and upholding the law alone creates a platform for which human rights activism can flourish. Generally, laws need to be reasonable and acceptable to a greater part of the populace; not necessarily meaning that they are good laws but that they are normatively justifiable. Most legal systems including the Canadian system center on physical integrity rights or those that are easy to examine yet the relationship between the rule of law and human rights present a more difficult phenomenon to understand and explain, for instance, rights of smaller groups in the society. This strong link between law and rights id depicted in Canada’s Constitution Act of 1982 part 1 which guarantees the rights and freedoms of the people of Canada. The c hapter â€Å"Canadian Chapter of Rights and Freedoms† provides for certain rights and freedoms as long as they are subject to the provisions and limits of

Sunday, August 25, 2019

Standards BasedAssessment Essay Example | Topics and Well Written Essays - 750 words

Standards BasedAssessment - Essay Example Therefore, each step is clued-up by the prior step or steps (Council of Chief State School Officers, 2008). Assessment is the central idea of standards based assessment. Students are assessed at each level. At each level, they are tested for whether they know what they must know and what they are able of knowing. Also, in standards based assessment, when we talk about students, we do not use it as a generic term. Instead we look at them as individuals. How Their individuality is reflected in the standards set by what they can achieve. Under this approach, students are compared to a standard of achievement, not other students (Council of Chief State School Officers, 2008). With this approach, students are not graded with letters, instead they are graded with 'meets the standard', 'exceeds standards' or 'below standards'. As a result, each student is allowed to succeed; they are not ranked in a normal curve where some students are labeled 'failures'. This is also the most significant benefit of the standards based approach. The grading criterion of this approach is such that the whole response of a student is analyzed rather than the final answer. This is clearly done by humans then because computers cannot realize the response. This is known as 'holistic grading'. As a result of this, the thought process of students is given more importance than the strict approach of marking students based on their final answers. An example of such grading criteria is 'inventive spellings'. This is when students are encouraged to spell words on how they hear them, rather than spelling them as how they are universally recognized. This clearly reflects their individual understanding. Some would say this is an extremely reasonable way of testing students. Because of a grading approach that assesses students based on their thought processes, students can be easily evaluated to see where they stand. Diplomas are then given to them based on their standards, thoughts and knowledge. For this reason, we arrive at its second important advantage and core value; high school diplomas are more meaningful for students and colleges alike. As far as reporting tools are concerned, the grade that they receive; where students stand in terms of meeting the standard, must be used as the reporting tool. Also, the grading tools used for subjective assessments can be used as a reporting tool. This could be a teacher's indication of what part of a group project work does not meet standards yet. Conclusion To conclude, I will summarize the core democratic values of such an assessment approach. These are simply and basically fairness, equal opportunity and the well-being of all members of society; and (American Federation of Teachers, 2003). Also, some light must be given to the challenges. These include inconsistencies in grades at different levels, such as national, state or district, there is heavy dependence on who is assessing and grading the students. This means that different teachers will grade significantly differently (American Federation of Teachers, 2003). Also, in my opinion, this is a very idealistic approach. A gain in score is not a definite indication of success. For this reason,

Saturday, August 24, 2019

The Keystone Pipeline Project Research Paper Example | Topics and Well Written Essays - 2500 words

The Keystone Pipeline Project - Research Paper Example activists have continuously urged president Obama to reject the project, counting on his track record of acknowledging the impact of climate change on humanity. The activists classify the project as among the biggest challenges world faces today. Objections to projects of huge magnitude are always necessary (Ruchti, 2010) Case against Implementation of Keystone Pipeline Project White House officials and numerous other state departmental staff have continuously insisted that a ruling by the Obama administration on the keystone XL will be entirely based upon environmental, security and economic factors. Activists have been using the project to test the president’s commitment towards environmental protection efforts, and while the intended economic benefits are huge, the projects negative impact on the environment pits environmental conservation efforts versus economic gains (Roode & Ruchti, 2010). White house officials have stated that the project is neither a component of the c ountry’s policy on climate, nor a means for bargaining on trade issues with other countries, especially Canada as the case on Keystone in this case Canada (Kadrmas, 2009). (i). Negative impact of keystone pipeline on the environment Research suggests that the Keystone Pipeline Project’s negative impact on the environment and climate especially along the proposed route far out weight the intended economic benefits that might be derived from the project (Kadrmas, 2009). Profits gained from investment in the pipeline system might be immediate and worth the cause, but the long term degradation of the environment will negatively influence every aspect of the lives of Americans living along the pipeline, from current to future generations. The project is harmful to the ecosystem and the... The project itself is worthwhile and of great economic implications. Jobs will be created as well as energy. If the Obama administration approves implementation of the keystone pipeline project, the resultant effect of job creation and economic gain aside, there will also be a tremendous increase in greenhouse emissions on the atmosphere. Pollution of land, air and water will be one of the major implications of the project. Because of its magnitude, the world climate will be affected by this single pipeline project in terms of global warming. The government should instead resolve on how clean energy can be produced and recycled since appetite for oil will always exist if not increase with the ever growing population. Structures to check operations of such plants should be put in place and reviewed regularly before projects such as Keystone pipeline are implemented. Compensation for land should be concerned with satisfactorily paying land owners the equivalent of the value of their la nd and additional costs of eviction. The concern for the environment should be the top priority for projects such as Keystone since reversing the effects of environmental degradation is nearly impossible.

Friday, August 23, 2019

California Laws on Meals and Breaks Research Paper - 1

California Laws on Meals and Breaks - Research Paper Example From this paper it is clear that there is evidence that many organizations violate this law and are unwilling to provide this free time to the employees. Besides, some organizations provide these breaks at irregular time while others attach strict conditions regarding the utilization of this period. Therefore, it has become increasingly important to determine how the law should be implemented within the work environment and the role that the employees should play in contributing to the implementation of this law. Evidently, the government needs to support this work policy to reduce the various violation instances in the country. California’s breaks and meals laws provide employers with a framework on how to organize the working and rest period for their employees. According to the law, employers are required to provide their workers with 30 minutes break after every five working hours from the start time if the total working period exceeds 6 hours. Organizations that provide l ess than 6 working hours are exempted to this law as the government considers this working period considerably short. The implication is that if the workers have to work for more than ten hours, they must be awarded more than two breaks as a resting period. The law strictly requires that the five hours rule be adhered as part as obedience to the law. During the break, the employees are free to use this time for their personal duties rather than work. They are not limited to stay within the work premises and may leave to go to other places. However, they must return as soon as this break period is over to continue with their day work.