Sunday, December 29, 2019

The Vietnam War in The Things They Carried by Tim O´brien...

The Vietnam War. A war that many Americans believed unfair and unnecessary. â€Å"Why am I being sent off to fight in a war I don’t know anything about? Will I ever return again?† Many draftees asked themselves these questions hoping to find comfort in the answers. But there was little to no hope, and they knew it. They were being drafted and they could do absolutely nothing about it, only hope that at the end they would be returning to the enlightened faces of their loved ones, something that not many Vietnam soldiers expected to ever see again. The Things They Carried by Tim O’Brien, portrays his experience in the war along with his fellow squad members, in their fight for survival against the Vietcong. In The Things They Carried, each†¦show more content†¦The first story O’Brien decides to tell us is the story of Lieutenant Jimmy Cross. Cross represents a young and inexperienced soldier who went to war for all of the wrong reasons. He deals wit h the savagery of the Vietnam War through letters and pictures sent from the woman he loves back home, Martha. Cross carries physical objects, pictures, letters, as well as memories from his time spent back home with Martha before signing up for war. At one point in the story after describing a date between him and Martha, he mentions how â€Å"he should’ve carried her up the stairs to her room and tied her to the bed and touched that left knee all night long.† (5) His thoughts of Martha are enough to help distract him from the brutal realities taking place in the war. However, his distraction becomes too much, and it ends up resulting in the death of one of his fellow squad members, Ted Lavender. He carries regret for the death of Lavender, and years later confesses his guilt to O’Brien, and that he has never forgiven himself for his death. Despite his long-lived regret, Cross finds comfort in his thoughts of Martha, and hopes one day she will return his love. From Tim O’Brien’s point of view, Mitchell Sanders was one of the most likable soldiers in the squad. Not only was he a good soldier, but he was a good friend as well. Along with O’Brien, Mitchell Sanders carries his fair share of stories. However, his stories are more commonly used to entertain theShow MoreRelatedThe Things They Carried By Tim O Brien1169 Words   |  5 Pagesbut are set in the past and borrows things from that time period. A story that fits this genre of literature is The Things They Carried. The story is about Tim O Brien, a Vietnam veteran from the Unite States, who tells stories about what had happened when he and his team were stationed in Vietnam. He also talks about what he felt about the war when he was drafted and what he tried to do to avoid going to fight in Vietnam. The Things They Carried by Tim O Brien was precise with its portrayal of settingRead MoreAnalysis Of The Movie The Things They Carried 1734 Words   |  7 PagesThe Actual War Scenario - Vietnam War The Things They Carried, is a novel based on the Vietnam War, and the book reveals the truth of the war as the author remembers the war after twenty one years and snows his guilt and emotions for the war. The Things They Carried, belongs high on the list of the best fiction about any war... crystallizes the Vietnam experiences for everyone and exposes the nature of all war stories.( New York Times, Book of the Century). Tim O Brien, the authorRead More Things They Carried Essay: Disembodiment723 Words   |  3 PagesDisembodiment in The Things They Carried  Ã‚  Ã‚   With some knowledge of war, one can begin to appreciate Tim O Briens The Things They Carried.   But when the work is viewed in its strict historical context, another layer of   meaning rises to the surface.   Tim O Brien is a veteran; as a result there are many things he takes for granted (or so we think) and does not tell us.   Americas involvement in the Vietnam war resulted from internal domestic politics rather than from the national spirit.  Read MoreThe Things They Carried By Tim O Brien1242 Words   |  5 Pagesâ€Å"Tim O’Brien is obsessed with telling a true war story. O Brien s fiction about the Vietnam experience suggest, lies not in realistic depictions or definitive accounts. As O’Brien argues, absolute occurrence is irrelevant because a true war story does not depend upon that kind of truth. Mary Ann’s induction into genuine experience is clearly destructive as well as empowering† (p.12) Tim O’s text, The Things they Carrie d, details his uses of word choice to portray his tone and bias. Tim O’BrienRead MorePsychological Changes During Soldiers From The Vietnam War981 Words   |  4 PagesSOLDIERS FROM THE VIETNAM WAR The survival of a soldier depends on what he wears. In war, the line between life and death is thinner than ever, and often, supplies, weapons, and the equipment of a soldier is the only thing that can cause the line not to clear. But, a soldier also carries his memory, memories, amulets, ghosts of the past, and trivial objects that do not let him forget that there is another life-the life-beyond war. Soldiers of Alpha Company, who fought in Vietnam, carry everythingRead MoreThe Things They Carried Vietnam Essay1571 Words   |  7 PagesHow Society Influences Man: Tim O Brien in Vietnam Tim O Brien s novel The Things They Carried is meant to display the effects of Vietnam on both American soldiers as well as the boys they once were. Vietnam is a society where human decency is left behind, and death is embraced as either a joke or an escape--where the horrors of reality are turned comical and exaggerated in order to keep going. Tim O Brien shows how Vietnam turns him from a boy unknowing of death, to a young man unwilling toRead More OBrien and Fossie in The Things They Carried Essay862 Words   |  4 Pagescoming of age novel, or Bildungsroman. In many ways, The Things They Carried is an exemplary Bildungsroman as it carries the reader through the lives and problems of every soldier within its pages. Each man is witnessed as he goes through his own maturation and personal times of struggle and hardships. Some are focused on more than others, but each man has a story to tell, each a moral to teach. Throughout The Things They Carried, both Tim O?Brien and Mark Fossie experience a significant amount of personalRead MoreThe Things They Carried By Tim O Brien1407 Words   |  6 Pagesintroduction stated that in â€Å"The Things They Carried,† author Tim O’Brien tells us not directly of the soldiers of Vietnam, or the situations they find themselves in, but about the things they carry on their shoulders and in their pockets. These â€Å"things† identify the characters and bring them to life.   I find that to be true as the author unfolds the stories about war and the uncommon things one carries in to war both inadvertently and on purpose.  Ã‚  Ã‚  As it was noted: Stories about war – especially today – usuallyRead MoreThe Things They Carried By Tim O Brien Essay832 Words   |  4 Pagesand large they carried these things inside, maintaining the masks of composure† (21). In Tim O’brien’s The Things They Carried, the American soldiers of the Vietnam War carry much more than the weight of their equipment, much more than souvenirs or good-luck charms or letters from home. They carried within themselves the intransitive burdens—of fear, of cowardice, of love, of loneliness, of anger, of confusion. Most of all, they carry the truth of what happened to them in the war—a truth that onlyRead MoreAnalyzing The Things They Carried By Tim O Brien1539 Words   |  7 PagesAnalyzing of â€Å"The Things They Carried† The book â€Å"The Things They Carried† is written by Tim O’Brien, the author of â€Å"In The Lake Of The Woods† and â€Å"Tomcat In Love.† In this book, O’Brien tells the details of the Vietnam war as a form of storytelling. He includes several characters in it such as Tim O’Brien, Jimmy Cross, Mitchell Sanders, Henry Dobbins, Ted Lavender and so on. He starts with the primary character, Lieutenant Jimmy Cross, who is carrying out a mission in Vietnam, and carries

Saturday, December 21, 2019

The Effect of Nightlife Entertainment on Psu Student...

Research Proposal Research title: The effect of nightlife entertainment on PSU student learning quality Background Because of the influence from the western lifestyle and social value, nightlife entertainment becomes the popular recreation for many people. More teenagers go to nightlife entertainment that includes the university students. The freedom of the university student’s life make them can do whatever they want and can be easy to persuade to concern with the nightlife entertainment which teenagers believe that they can find something new there. Some examples of nightlife entertainment where the teenagers would like to go such as pub, bar, discotheque, and club. Many people will think that nightlife entertainment is one factor†¦show more content†¦Theoretical framework: [pic] Hypothesis Gender: Male goes to night life entertainment more than female. Age: 4th years go to night life entertainment more than 3rd years, 2nd years and 1st year. Budget: High budget go to night life entertainment more than low budget. Factor: Value is the main factors that cause student go to night life entertainment. Frequency: The student often to go night life place, it affected to study quality. Quantity: The student drink too much, it affect to study quality. Purpose: Drinking is the purpose of behavior student night life entertainment. Study: Night life entertainment is the main affect to study quality Graduate: Night life entertainment make the student cannot graduate within 4 years. Scope: This research will engage about 10 weeks, start from 17 June to 23 August 2011. We will observe the behavior of PSU students who go to spend their time on nightlife entertainment places. Then, we will interview to the specific group who go to nightlife entertainment place. Finally, we will gather information to analysis. From website: http://www.answers.com/topic/nightlife , it say that Nightlife is the collective term for any entertainment that is available and more popular from the late evening into the early hours of the

Friday, December 13, 2019

Reality Shows Their Effect on American Teens Free Essays

Their Effect on American Teens Martha Wallace ENG 122: English Composition II Professor Kathy Conner August 8, 2011 The values of our forefathers for America have disappeared. Each year more and more of American children are Judging themselves based upon the lives portrayed in popular media. Certain media in the music industry portrays the life of getting rich fast and having a lot of girls. We will write a custom essay sample on Reality Shows: Their Effect on American Teens or any similar topic only for you Order Now Movies depict a life of fast cars, many sexual partners, and dishonesty. The latest media that has become very popular in portraying negative values Is reality shows. Reality shows have replaced traditional family values wows such as: Happy Days, Seventh Heaven, The Cowboys Show, Family Matters, and Growing Pains. Today’s family values are now being portrayed through shows like: Keeping up with the Sardinian, Teen Moms, The Real World, Jersey Shore, and all of the Real Housewives shows. Reality shows have changed the way American teens view family and the values of marriage, honesty, and respect. Today’s teenagers view marriage as a commitment between two people who are in love. Once the love is gone, the marriage is over. On the other hand, some adults may think differently. Marriage is not Just the result from love between two people. There is much more to it. A successful marriage is like a good recipe whose main ingredients, besides love, are commitment, understanding, concern and loyalty. If you can include these qualities In your married life you can find happiness In your marriage. Yet, the future of the stability In American marriage Is slowly decaying. Adults and teens alike are viewing marriage In a different way. This view Is being persuaded by new television shows called Reality television. It Is a known fact the media plays an important part In how teens view themselves and others. Almost every person in the united States has excess to television and the younger generation is the ones who watch it the most (Cheeseboard, 2003, Para 4). Considering the average teen spends more time watching television than with their parents. The majority of them are also learning about the basic values of life, also from television. This bring about a serious concern of reality shows’ effects on teens attitude, values, and behavior. The traditional family value of marriage is portrayed on reality shows as an option for couples who are living together. The reality show Keeping up with the Sardinian is a perfect example of his type of arrangement. One of the older sisters, Courtney, currently lives with her boyfriend and when approached by another slang asking her why she refuses to get married. Courtney replies, â€Å"I’m not sure If he Is really the one† (Bravo, 2011, Para 2). When her mother approaches her about the same thing, Courtney replies, â€Å"Mom, I’m lust not Into ten traditional things† (Bravo, 2011, Para According to David Opened, a Rutgers sociology professor and report co-author, â€Å"Cohabitation is here to stay. I don’t think it is good news, especially for children†, he says, â€Å"As society shifts from arraign to co-habitation, which is what’s happening, you have an increase in family instability’ Canyons, 2005, Para 8). The reality shows that have married couples on it either end up in divorce, the wife shows no respect for her husband, or one spouse cheats on the other. These are the lessons reality shows are teaching American teens today. The broadcasting station, Bravo, has a series of shows titled, The Real Housewives of some very popular cities in America. One of those cities is Atlanta. This reality show is about six women who are married or were once married. The show aired for three years detailing the lives of women who were to represent the real lives of American married women living in Atlanta. Only one of the six was actually married and before the end of the three year series, she was filing for a divorce. Americans by the million were tuning in each week to watch the drama unfold. According to Nelson Media Research, 4. 4 million viewers watched the shows season finale January 30, 2011 and 1. 3 million of those viewers were under the age of 18 (2011). What does this mean for the future of marriage? Many teenagers no longer look forward to their wedding day. In fact in a conversation with teenagers through a youth organization, Youth for Prevention, Action, and Change Through Thought (HAPPY), which aims to develop community leaders by teaching teens about social, racial, and health disparities in their neighborhoods, many of them do not see the need for marriage. One participant stated, â€Å"I’m not looking forward to marriage and I don’t think we [people in general] should be married, because I see how other marriages ended up in my family and on television. It’s always a disaster. When asked which television shows she mainly watches, she replied, â€Å"Reality shows, they ell you how life really is†, Cones, 2006, Para 2). As this ten’s comments indicate, views about marriage are formed by what they see in their lives and in popular media. Shows such as â€Å"The Real World† and the media’s focus on the latest celebrity break-up do not paint a perfect picture of marriage. It is a sign of the growing decline in the value of one of the greatest institutions developed in America. It is these factors that may explain why the U. S. Divorce rate approaches 40 percent. Marriage is not the only American value which seems to be affected by reality shows, honesty s another value among teenagers that is almost invisible and reality shows does not appear to make the view any clearer. There was a time when a man was held to his word and a handshake was the only deed required. Those days are long gone. No one can trust the other. Prenuptial are written before marriages, contracts are required between businesses, and even teenagers are signing contracts with parents. One reality show, Teen Moms, broadcasted a show which detailed a written contract between one teen and her parents. The purpose of the contract was to validate the parents’ words to help their daughter financially after she gives birth to he child. Reality television shows and their effects on teenagers can depend on the desires and motives they see themselves in these stars and somehow these stars are living their lives through the show. Each reality show portrays and fulfills certain desires like powerful high class living, survival and outwitting others, beauty, revenge Ana amnesty. Many teenagers enjoy a certain sense AT pleasure Ana satisfaction when they watch these reality television shows and their effects are continuously mirrored in the way they interact with others, deal with various situations, and face certain challenges. According to the teens in HAPPY, the reality shows are entertaining Cones, 2006, Para 5). Yet, most of these shows are built upon other people’s failures, sadness, frustrations, depressions, and other mental and physical handicaps. There are some reality shows that have a positive effect on ten’s lives. Broadcasting station, FOX, had a show, Trading Spouses, where two families, usually of different social classes, swap wives or husbands for a week. Each family is awarded $50,000, with the stipulation that the guest mother decides how her host family must spend the money (Schneider ; Italian, 2004). The adults show how families can come together and grow. It gives hope to the value of family and honesty. Each participant is required to react normally and to come to an understanding on how to handle differences. The children are given an opportunity to express themselves and this usually results in their parents making some changes to include the opinions of their children. The parents come face to face with the honesty of some mishaps in their family and agree to make an honest effort to correcting them. These types of reality show effect teens in a positive way. For those men’s that may not have been able to express their thoughts or opinions to their parents, the show gives them suggestions and allow them to see an honest possibility of the outcome. Most teenagers see their parents as difficult people to compromise with. This type of reality television shows the vulnerable side of parents and how they can make mistake too. Teens begin to see their parents as human and someone they can talk to. Honesty is rarely played out in reality shows, therefore our teens have a front row view of how to become a liar and deceive people. Some of these wows are so deceitful; it is hard to imagine someone would have agreed to be a participant. For example, â€Å"Joe Millionaire†, is a reality show where women compete to win the heart of a supposed millionaire. At the end, the women find out the â€Å"Joe Millionaire† is actually an â€Å"Average Joe† and have to decide if they want to stay with him. This show is probably one of the most dishonest reality shows and unethical of them all. Teens and adults alike are shown ways to be dishonest and degrade the true meaning of finding love and honesty in an individual. Respect has great importance in everyday life. As children we are taught ,one hopes, to respect our parents, teachers, and elders, school rules and traffic laws, family and cultural traditions, other people’s feelings and rights, our country’s flag and leaders, the truth and people’s differing opinions (Dillon, 2010, Para 1). If we are to live by this description of respect, then reality shows has gotten it wrong. A study called, â€Å"Kids These Days: What Americans Really Think About the Next Generation†, surveyed 2,000 adults who characterized teenagers and young children as â€Å"irresponsible†, â€Å"rude†, and â€Å"lazy’ (Kids these days, 1997). Those words are scarcely new attitudes towards American’s youth. The reality show, Keeping up with the Sardinian, portrays a family with two teenage daughters who are often rude to their parents, constantly shows disrespect towards each other, and uses profanity towards their parents. This reality show is rated number one among teenagers in America. Yet this show, â€Å"Keeping up with the Sardinian†, shows very little respect towards the parents Trot any AT ten SIX centre Foul language Is town across ten room Trot ten teen daughters, young adult children, their boyfriends, and the parents. There is no respect for other people’s feeling, rights or differing opinions. One particular episode, the teen daughters swore at her mother and told her dad she will make her own decision and didn’t need his help. After consulting with his wife, they agreed to allow their 13 year old daughter to make her decision on a career move that would affect her for the rest of her life. This is not a good message to send to teenagers today. Raising one’s voice and slamming doors is not the way to gain respect. Yet, reality shows often show teenagers acting this way and the results are often the arenas bending the rules to allow the teens to make their own decisions. Showing respect is the best way for anyone to receive respect. Everyone should have an opinion, be able to express them and feel good about that relationship. No one should feel pressured to do something Just because it seems like everyone else is doing it, or because someone else is trying to get you to do it. Yet that is precisely what most reality shows are doing. Teens are being pursued to make decisions and react to certain things according to celebrities on reality television. The reality show reduced by MAT, The Real World, gave American Teens a real look at honor and respect in it episode featuring Pedro Somoza. Pedro Somoza was a young man chosen to be one of the six young adults sharing a house in New York City, who Just happened to have AIDS. Pedro died of the disease and America tuned in the watch every episode as it unfolded on television. This series of The Real World, New York taught many people the truth about AIDS. The effect this show had on American teens open their eyes to respect other people, taught valuable lessons on safe sex, and gave AIDS a new found respect. Since the rising of these popular reality elevation shows, American teens have changed the way they view â€Å"entertainment†. This genre has influenced the way teenagers express themselves. Considering many of these shows are geared towards teens, they are the ones who are more susceptible to its various influences. With each passing year more and more of American children are Judging themselves based upon the lives portrayed in popular media. Certain media portrays the life of getting rich fast, having a lot of girls, a life of fast cars, many sexual partners, and dishonesty. There are not many good values portrayed in these reality shows. Yet, reality shows can give insight to teens about many different types of people and cultures. They can also prepare teenagers for the outcome of bad choices people make about the values of marriage, honesty, and respect. The core role is to see what people reactions in certain scenarios are, and how they face these given situations. American teens can learn and apply these outcomes to their lives. They can learn about teamwork. They can become motivated in life to achieve their goals and can even chase a dream. References Dillon, S. (2010). Respect, The Stanford Encyclopedia of Philosophy (Fall 2010 Edition). How to cite Reality Shows: Their Effect on American Teens, Papers

Thursday, December 5, 2019

Student Attendance free essay sample

This project focuses on the development of a web based attendance register system, called mobile student attendance monitor. This project is motivated due to the fact that the students attendance record is the most important element which can reflect their academic achievement in the institutions. Mostly, the attendance register is circulated in the lecture rooms by the lecturers. This is a very time consuming method and not ideal for a large number of students in a big lecture hall. The aim of the project is to develop a user friendly, efficient and effective mobile attendance system that provides an alternative solution to manual attendance in the educational institutions. The development of this prototype system has been built using the web-based applications such as PHP, My SQL and VB. NET to deal the students attendances by using RFID reader. As, most of the academic institutions provide their students and staffs, ID cards with RFID tags on them. These cards are also known as Contactless smart cards. This project is designed to collect and manage student attendance through this technology which works on the verification basis of the students and recording their time of entrance and exit in the lecture hall. Keyword: web based prototype, PHP, MySQL, VB. NET, RFID, readers, tag, and contactless smart cards. INTRODUCTION OF THE PROJECT AND THE SYSTEM Introduction Management in organizations is a very important aspect in every field as economy is growing at a very fast speed in this busy world. One of the most important factors of the management of nearly all the organizations is to keep the records of the attendance of the individuals. Many researches and the evidences in them have shown that there is an important relationship between the attendances and the performances of the individuals. If the individuals do not attend the places, their performances will link to poor retentions and results. The development of this system is provoked due to the fact that the students attendance record is one of the important elements that may reflect their academic achievements in the institutions. For the sake of good results, it is also very important for the institutions to keep the records of the students at all times. As having the accurate and more powerful attendance systems, it helps in the monitoring of the students activities and their interest in the course. With the help this kind of systems, it would be very easy to handle the record management. Importance of Attendance Empirical evidences have shown that there is a significant correlation between students attendances and their performances [1]. This aspect is agreed by both Mazza and Dimitrova where they claimed that this factor is the most important aspect which indicates the behavior of the student for the course. With the help of this analysis, the judgment can be made about their tendency and dedication of the students toward the courses. [2]. Results taken from the study done by Newman-Ford, Lloyd and Thomas have shown that attendance was a significantly better predictor of grade than any other factors such as age, prior education background or even gender [3]. From the study, it had also revealed that retention rates were substantially better for students who were consistently attending classes than those more frequently absent. All of these findings have showed that attendance records have primarily become the proxy to determine the success of the students in most of the higher academic institutions. [4] Manual Attendance System Traditionally, in most of the higher academic institutions, the recording of the students attendances are mainly done by paper and pen. On the other hand, this practice will also lead to human errors that could be happening during or after the process of attendance taking. For this process, the attendance sheets are to be distributed in the classes for the students to sign in and this whole process consumes a lot of time. Sometimes this list requires the registrant to write his/her time of entry to the classroom as well. In most cases, there is not any list available and students have to write their names on a plain piece of paper plus their signatures and possibly ID (Identification data) numbers which are assigned to them by their institutions. By using the manual system, the process of attendance becomes more difficult for the management to update the record regularly and manually calculate the percentage of classes attended [5]. All of these limitations regarding the manual system indicate the needs to improve the process of attendance recording and reporting. Using papers are not just inefficient but it will require the management of the academic institution to provide a well-managed filing system to cater the attendance records. Therefore, it is crucial to reinforce the use of attendance register system in order to improve the process of recording and reporting students attendances in the higher academic institutions. [4] By proper analysis of this method, we can observe a lot of problems in the process which are unsuitable for the system. If we start the whole procedure from the beginning, we can notice that each student has to look his/her name up on the list which takes some time, some fellow students can sign for their friends and colleagues who are absent and the lecturer could not identify the signatory, any mistake can occur like list do not have proper names, times for entering in the lecture hall and their registration numbers on the list, the list would be difficult and time consuming to circulate in large lecture rooms consisting of high number of students, some students may forget to sign their attendance on the register. For the lecturer, it might be a big hassle to pass this to the department of administration because of their busy schedule and timings. Especially for the administration; its always a tough task to keep the records over a long period of time which may confuse them when searching for the record of a specific student in particular dates. Web Based Applications Web-based applications have now become one of the preferable technologies that are used to ease the process of managing data and records. Some of the motivations that contribute to the development of any web-based systems nowadays are because of its efficiency in handling rapid access of documents and its ability in supporting multi-users simultaneously, thus saving a lot of time and hassle free [6], [7]. Web based applications have many advantages over software that you have to download. You dont need to install or update anything on your PC. You can use the application from any PC or mobile device. Web applications are easy to use and make working with other people much simpler. You dont need to worry about backups because your data is safely stored on a server. [7] Furthermore, web-based applications are designed with the same principles as a regular website. So, it is as simple to use a website as to use a web-based application. [8] Use of RFID in the System Recording the students attendances has also become the prospective process to be automated by using the web-based system. Many researches are involved in more advanced technologies that are integrated with the online systems such as the use of bar code technology, biometric technology and Radio Frequency Identification. These days, mostly all the institutes and organizations do provide their students with ID cards which have been integrated with RFID transponders which contains the basic details of the card holder. These cards may have different details like the student registration number, roll number, name, batch number and department ID and the department name etc This ID card which is also known as Contactless smart card is provided to the students for the access to different premises in the university like laboratories, libraries, buildings, seminar rooms, parking lots and class rooms. To access different areas, students have to present their ID cards to different machines which are mostly called scanners or readers, located in campus in the university and these machines are capable of reading ID cards even they are not touched with them. For this project, in order to design a system, first we need record the attendance of the students using their ID cards. This system is equipped with an RFID reader which reads student ID cards and records their time of attendance at each lecture, into its memory. In order to take the attendance, lecturers can connect this machine to an external host station to print a full list of students attending lecture and the list can be easily viewed by them. Project Outline * Chapter 2 provides the basic idea about the automatic identification system and its general types * Chapter 3 focuses on the technology overview of RFID system * Chapter 4 focuses on the system design and implementation. * Chapter 5 discusses the evaluation and testing of the different scenarios of the system * Chapter 6 concludes the project and recommendations for the future work AUTOMATIC IDENTIFICATION SYSTEMS In recent years, the automatic identification systems have become very popular as they are providing services in many fields like industries, purchasing and distribution logistics, industry, manufacturers and material flow systems. These are the systems which exist so they can provide information about humans, products, animals and goods in transport. Barcode Procedure Bar codes have successfully held their own against other systems over the past few years, as the turnover of the bar codes in the decade of 90s. The bar code system consists of bars and gaps arranged in parallel configuration which is a physical representation of a binary code. They can be either narrow or wide which also have associated numerical readings. For this reason they are arranged in a pattern which is decided and they are representing data that refer to an associate symbol. All bar codes represent data in a machine readable form. Different bars and spaces in a bar code represent different numbers and letters which can be decoded with the help of a bar code scanner. When they are scanned by optical lasers, the white gaps and black bars produce dissimilar reflections from the laser beam which provide for different sets of codes. This scanned data is then sent to a computer where it is recorded and then processed. [10] In addition, there are many barcodes which are popular in the industry, they are as follows: * Code Coda bar * Code 2/5 interleaved * Code 39 * Code 128 * UPC Optical Character Recognition This type of identification system was developed in the 1960s. Optical character recognition is usually abbreviated to OCR. OCR is a field of research in pattern recognition, and artificial intelligence. It is the mechanical or electronic translation of written images, typed or printed text into machine-editable text. It is used to convert paper books and documents into electronic files. When a paper is scanned, it produces just an image file, or a photo of the page. As the computer cannot understand the letters on the page, so OCR software is used to convert it into a text or word processor file.. The result is much more flexible and compact than the original one. All OCR systems include an optical scanner for reading text, and sophisticated software for analyzing images. Most OCR systems use a combination of hardware and software to recognize characters. OCR systems have completely failed to be deployed in the different fields in the world as the scanners are highly expensive and the readers are complicated in comparison to the other readers of the automatic identification systems. Biometric Procedures This is a unique method for recognizing humans which is based on one or more intrinsic physical or behavioral characteristics and qualities. The main purpose of this system is to identifying human beings by detecting and comparing the physical characteristics of each person such as hands and finger prints and with the help of their voice and iris. Finger Identification Systems Finger print is one of the most important procedures in this field and its applications are used to identify criminals. It is most developed of all the biometric technologies and its price is low enough to see it beginning to make inroads in to the mass market. When this procedure is run to identify personal identification, the finger is placed on the specified reader. The system calculates it pattern and this analysis of fingerprints for matching, generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. Voice Identification Voice identification technology was initiated in the early 1960s. Since then, voice ID has undergone aggressive research and development to bring it into the mainstream. Voice ID is sometimes called voice authentication, which is a type of user authentication that uses voiceprints and pattern recognition software to verify an individual. [13] Voice identification is possible because every person has a unique set of voice characteristics and speech patterns. Voice identification extracts specific and unique features from a persons speech, such as pitch, tone, cadence, harmonic level and vibrations in the larynx, and stores and uses them to differentiate that persons voice from the other voices. This system requires speech samples from the subject. The input is compared with a stored sample of the subjects speech. This stored sample is called a voiceprint. A voice print is a plot of frequency density vs. time. [14] Early voice identification systems made matches between sets of such plots. If these samples match, then the person can be identified or a reaction can be initiated (e. g. open door). Smart Cards A smart card, a type of chip card is a plastic card embedded with a computer chip that stores and transacts data between users. This data is associated with either value or information or both and is stored and processed within the cards chip, either a memory or microprocessor. The card data is transacted via a reader that is part of a computing system. Smart card-enhanced systems are in use today throughout several key applications, including healthcare, banking, entertainment and transportation. [15] The microprocessor on the smart card is there for security. The host computer and card reader actually talk to the microprocessor. The microprocessor enforces access to the data on the card. If the host computer read and wrote the smart cards random access memory (RAM), it would be no different than a diskette. Smarts cards may have up to 8 KB of RAM, 346 KB of read only memory (ROM), 256 KB of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography. Smart cards can be used with a smart-card reader attachment to a personal computer to authenticate a user. Web browsers also can use smart card technology to supplement Secure Sockets Layer (SSL) for improved security of Internet transactions. [16] The most common smart card applications are: Credit cards * Electronic cash * Computer security systems * Wireless communication * Banking * Government identification Smart cards are much more popular in Europe than in the United States. In Europe, the health insurance and banking industries use smart cards extensively. Every German citizen has a smart card for health insurance. Even though smart cards have been around in the ir modern form for at least a decade, they are just starting to take off in the United States. [16] Therefore, this market represents one of the fastest growing subsectors of the microelectronics industry. They have two types, either a memory card or one with computer capacity known as a microprocessor card. The memory cards operate using a sequential logic state machine which accesses the memory (EEPROM) of the card. Security can be increased by adding stream ciphering algorithms. The functionality of the memory card in question is usually optimized for a specific application. Flexibility of application is highly limited but the advantage is the cards are very cost effective. Therefore they are used in price sensitive, large scale applications. The microprocessor cards, contains a microprocessor which is connected to a segmented memory (ROM, RAM and EEPROM segments). The mask ROM incorporated an operating system for the microprocessor and is inserted during the chip manufacture. The contents of the ROM are determined during the manufacturing are identical for all the chips from the same batch and cannot be overwritten. The chips EPROM contains application data and application related program code. Reading from or writing to this memory area is controlled by the operating system. The RAM is the microprocessor temporary working memory. Data stored in it is lost whenever supply voltage is disconnected. Microprocessor cards are very flexible as it is possible to integrate different applications in one card. The application specific parts of the program are not loaded in to the EPROM until manufacture and can be initiated via the OS. [19] THE BASICS OF RFID TECHNOLOGY What is RFID? In twelfth night, Shakespeare wrote Some are born great, some achieve greatness, and some have greatness thrust upon them. RFID is one of the more recent four letter abbreviations to have greatness thrust upon it in a flurry of industry mandates, government legislation, and hyperbole. 20] RFID is basically the abbreviation of four letters which are combined together which stands for Radio Frequency Identification. This describes a system which can identify wherein an electronic device that uses radio frequency and magnetic field attached to an electronic device. The object of any RFID system is to carry out any form of data to suitable tran sponders which are called tags and to retrieve data with the help of machine at a suitable time and place to satisfy particular needs. These are the two most important components of this system, one is tag and the other one is called the reader, which recognizes the presence of RFID tags and reads the information which is manually stored on them. This information is then passed to another system confirming the presence of tags. The software with which the system is communicated with the reader is called RFID middleware and it stands between reader and the applications. Case for RFID Much of the recent interest surrounding RFID has arisen from mandates and recommendations by the government agencies such as the U. S Department of Defense (DoD) and the Food and Drug Administration (FDA) and from a few private sector mega corporations. For instance, Wal-Mart called for its top 100 suppliers to begin providing RFID tags by early 2005 on pallets shipped to its stores. This mandate caused the companies in Wal-Marts supply chain to focus in implementing RFID solutions. Companies worked to decide which tags and readers to use and how to attach them with tags or embed them with the products and how to test the read rates for RF tags on pallets as they moved through doors or trucks. Several companies have announced their support for what are commonly known as tags and ship applications. [20] Applications of RFID RFIDs can have many applications depending on their type of functionality. They can be appropriate for different industries and commercial markets. Certain type of RFID applications characterize the whole approach of technology which can be differentiated on the basis of the considerations and implementations. The term autoid, short for automatic ID, describes any automated system for attaching an identity to an item. Real-Time Location Systems (RTLSs) are automated systems for tracking the location of an item. [21] The tree below shows the relationship between different identifications systems and the different types of RFID types. These five categories of RFID are the basic applications which can demonstrate some sense and issues in the physical implementation of this technology. Access Control Most organizations today require a performing and efficient access control system. There are many reasons for having such a system which are: 1. Enhanced security to limit access to restricted areas. 2. Tracking employee activity and . Improve loss prevention Some primary considerations for this type are counterfeiting which means that tags must be recognized and any kind of violation must be discouraged. The other consideration which is very important is tailgating, which occurs when an unauthorized object enters behind an authorized object before or after its entrance. To deal with tailgating and issues like emergency access, this can be implemented with the help of barriers which can be done by singulation, keeping a check which entity is entering through the sensors, either to allow them access or restrict them at a time. But the factor of counterfeiting is a hard process to be address and explained as many systems are been reversed and they proved vulnerable to the attacks. Therefore, strong encryption is necessary on both ends of messages and the digital signatures. An RFID access control system can provide an easy and efficient solution. RFID badges can be read from much further distances than other traditional technologies and the embedded electronic information for each badge can be over-written repeatedly. Furthermore, multiple RFID badges can be read all at the same time. Information about employee access, attendance, and duties performed, can be easily and efficiently monitored and stored in a database. [24] Tag and Ship Tag and ship applications are minimal RFID systems that allows a user to associate an RFID tag with an item, apply the physical tag to the item and then verify that tags operate properly to the attached item or not. Logistics and transportation are major areas of implementation for RFID technology. For example, yard management, shipping and freight and distribution centers are some areas where RFID tracking technology is used. Some considerations of this application are cost, isolation, tag failure and their impact on the processes. For this process, it is very important to purchase tags and device with low cost that the owner has to bear for its implementation. Therefore, a simple equipment best fits for its implementation. Furthermore, to buy some extra tags and devices lower down the cost of the maintenance of the system. It can be implemented by using simple labels that are encoded by the appliances rather than coded by tag vendors. Smart Shelf Keeping an accurate inventory of shelved items in real time constitutes is one of the most desired attributes in any retail business, resource collection, or library system. A Radio Frequency Identification (RFID) system offers an ideal way to track how often an item gets removed from or looked at and returned to a shelf. RFID uses radio-frequency communication to identify, track, and manage objects or living things via a reader and- tag system. An item fitted with RFID tag couples radio signals that a RFID reader receives to obtain the details. 26] Some important considerations for this applications are item-level inventory, hardware used and to handle the spurious tag reading. Track and Trace One of the most important and earliest of the RFID applications was to track dairy cattle. Therefore, the animals were tagged with glass capsules or ear tags which were used to identify lost animals. But now, this application is used far more like to sort information from live stock, and pharm aceutical tracking. The primary considerations of this application are information sharing and instant based control. In case of information sharing, the repetition of identification cannot be ignored therefore, unique numbers are assigned to the products so that they can be easily sorted and traced by the vendors. RFID System Categories RFID systems can be grouped into four different categories which are as follows: EAS Systems Electronic article surveillance (EAS) is a technological method for preventing shoplifting from retail stores. These systems are basically the one bit which can sense the presence or absence of an item. EAS is a technology used to identify articles as they pass through a gated area in a store. This identification is also used to alert someone if any unauthorized removal of items is being attempted. Portable Data Capture Systems Portable data capture systems are characterized by the use of portable data terminals with integral RFID readers and are used in applications where a high degree of variability in sourcing required data from tagged items may be exhibited. The readers capture data that is transmitted directly to a host information management system via a radio frequency data communication (RDFC) link or held for delivery by line linkage to the host on a batch processing basis. 29] Networked Systems Networked systems applications can generally be characterized by fixed position readers deployed within a given site and connected directly to a networked information management system. The transponders are positioned on moving or immoveable items, or people, depending on the application. [29] Positioning Systems Positioning systems use transponders to facilitate automated location and navigation support for guided vehicles. Readers are positioned in the vehicles and linked to onboard computer and RDFC link to the host information management system. The transponders are embedded in the floor of the operating environment and programmed with appropriate identification and location data. The reader antenna is usually located beneath the vehicle to allow close proximity to the embedded transponders. [29] Advantages of RFID There are many different ways to identify different objects, people and animals. For identifying small number of items of any kind object, the policy to count and write them on a paper is fine but when the number grow more than hundreds, some kind of automation is required, in a limited number of hours. To summarize, some of the benefits of RFID are the following: Alignment is not necessary: A scan does not require line of sight which saves time in processing that would otherwise be spent lining up items. Item level tracking: Different types of tags are used which have the capability to track the number of items. Re-writ ability: Some RFID tags are written and re-written many times which is a big advantage. For an item on a store shelf, this type of tag might be a security liability, so write once tags are also available in the market. So, tags can be reused and therefore extremely low maintenance cost occurs. Variety of form factors: Tags are available in a great range of types, sizes and materials. RFID tags range in size from a lunch box to a tiny passive tags smaller than the grain of the rice. Different tags are used for different purposes in wide variety of environments. High speed inventory: Multiple items can be scanned at multiple times. Therefore, it results in extreme low error rate when tracking bulk of items. Labor saving technology RFID technology is a labor-saving technology. This translates to cost savings. System Components of RFID RFID uses wireless communication technology and the basic purpose of the system is to identify objects and people which are tagged, there are three basic components as below: * A tag: Tags are also known as transponders. A tag is an identification device attached to the object we want to track or identify. * An Interrogator: This device is also referred as reader. A device that can recognize the data stored in the RFID tags. A reader is composed of an antenna, an RF electronics module, and a control electronics module. A controller: Interrogator reads the information/ data on RFID tags and passes this data to a workstation. The workstation usually runs software or middleware are to control and manage the required actions associated with the tags. The tag and the interrogator communicate information between one another via radio waves. When a tagged object enters the read zone of an interrogator, the interrogator signals the t ag to transmit its stored data. Tags can hold many kinds of information about the objects they are attached to, including serial numbers, time stamps, configuration instructions, and much more. Once the interrogator has received the tags data, that information is relayed back to the controller via standard network interface such as an Ethernet LAN or event the internet. The controller can then use that information for a variety of purposes. For instance, the controller could use the data to simply inventory the object in a database, or it could use the information to redirect the object on a conveyor belt system. [30] Tag RFID tags are the object tracking devices that are used to store and transmit data to the interrogator. These tags are made up of an electronic chip and an antenna. The electronic chip contains memory (for data read/write purpose) and other usable circuitry. Batteries may also be encapsulated with chips and antennas to provide on board power source for RFID tags RFID Tag Shapes and Sizes RFID tags can be manufactured in several different shapes and sizes depending on the type of application in which they will be used. Some are the size of a pencil lead or are less than a half-inch in length and can be inserted under the skin of animals and livestock. Screw-shaped tags are used to identify specific trees. * Rectangular RFID tags found in some products are used as an anti-theft device. * Large, heavy duty tags that are several inches in length, width, and depth are used to track large containers or large vehicles such as trucks or rail cars. [31] Basic Types of RFID Tags There are two types of RFID tags: * Active tags ( self –powered ) * Passive tags ( no battery ) * semi-passive tags ( Combination of Passive and Active ) On board power source is the main differentiating factor between these tag types. Active Tags Active tags have their own power source to broadcast signal to RFID reader (interrogator) and power electronic chips. These tags have comparatively larger memories and are much complex than passive counterparts. Usually a battery is used as the power source. By using a battery as power source, active tags are able to transmit data and communicate with low-powered RFID readers. Another advantage of using active tags is that it can transmit signals over relatively longer distances. The complexity, power source, and larger memories make these tags more expansive. Passive Tags Passive tags have no power source and rely on RFID readers. These tags derive power from the signal sent by RFID readers. Due to this fact, these tags require high powered RFID interrogators and have short effective range (usually less than 2 feet). Passive tags have smaller memory capacities as compared to active tags due to power source absence. As a result, these tags are much less complex and are less expansive to manufacture. Semi-Passive Tags Some passive tags have built-in power source but do not use this source for signal transmission. In fact, they use power source for on-board circuitry. Such types of tags are called battery-assisted passive tags or semi-passive tags. Basic Tag Capabilities Many basic operations can be performed with an RFID tag: * Attaching the tag: Any RFID tag must be attached to an item through some way. * Reading the tag: tag must be able to communicate with the reader through radio frequency. * Write once: Some tags are manufactured with their values at the factory, but some are left as the user can write once on them and after that the tag values cannot be changed and manipulated. Write many: some tags are manufactured for a reason that the data can be written again and again on them. * Anti-collision: these are some intelligent form of tags which can wait for their turn incase, when many tags are in close proximity. * Security and encryption: some tags are more intelligent as they are able to participate in encrypted communication and they can respond to those readers only, which can prov ide a secret password. * Disable: once tag is disables, it never responds to the reader again. Selection of Tags Many considerations are important in the selection of the tags which are as follows: * Read range: Active tags provide a longer range than the passive tags. For the purpose of the retail, the read range is fulfilled by the passive tags. * Material: In order to deploy the RFID tags in different materials, it is very important to keep in mind where they will be used. For example, in case water or metal, radio frequency or their waves may be obstructed and hamper down. * Cost: This is the most important of the selection criteria as many applications use many kinds of tags. So, to make an affordable system, it plays an important role. Form: As tags are of different sizes, shapes and materials, therefore it is obvious that the tags which will be used for the specific purpose depends on the packaging used in the product and goods. * Standards: EPC global and the International Standards Organizations (ISO) provide standards for the communications between RFID tags and the readers. Character istics in RFID To understand and appreciate the capabilities of RFID systems, it is important to understand the basic parts, data flow that influences the choice of the systems and practicalities of communicating across the air interface. By taking into consideration the components of RFID systems and the different types of functions within the chain, it is possible to take hold of the important issues that influence the effective application of RFID. Thus, it is important to make a start from the method of communication as how it is achieved and the special techniques involved in the design of this system. The Air Interface and Wireless Communication The air interface describes the way in which a tag communicates with the reader. Having knowledge about the tags air interface, we can determine tags read and identity readers compatible with the tag. Communication of data between tags and a reader is done by the wireless communication. For this purpose, there are two methods which can be distinguished from each other, the first one is based on proximity and electromagnetic which is also known as inductive coupling and the other is based on the propagation of electromagnetic waves. Coupling is done via antenna structures that form an integral feature in both tags and readers. The term antenna is basically used for the propagation systems and is applied to the inductive systems. Carrier Frequencies In wired communication systems, the physical wiring constraints allow ommunication links and networks to be effectively isolated from each other and this approach is adopted for radio frequency communication channels. This requires and is generally covered by the government legislations with different parts of electromagnetic spectrums being assigned for different purposes. Not all the countries in the world have access to all the freque ncies which are listed in the table below as some countries have assigned these bands to other users. Within each country and frequency, these are some specific regulations that govern the use of these frequencies. Range and Power Levels The range that can be achieved in RFID system is determined by: * The power which is available at the reader to communicate with the tag * The power available within the tag to respond * The environmental conditions and structures, including signal to noise ratio. Although the level of power is the first determinant of the range, the manner and the efficiency in which the power is deployed also influence the range. The field from the antenna extends into space which surrounds its place and its strength diminishes with respect to its distance. Therefore, strength of the field always reduced to the square of its distance. The power within the tag is generally a lot less than in the reader. In some systems, the reader comprises of the receiver and is separate from the transmitter. As it is possible to choose power levels for different applications, there are some restrictions on its frequencies and constraints on power levels. Although 100 – 500 m W are values which are often quoted in many countries but these values can be confirmed from the authorities for its use. Types of Keying The term keying comes from the days of telegraphy when an operator pressed a manual key to make short and long tones. Keying is described which attributes of an analog carrier, the analog carrier can be a wave or a field, may be modulated to represent the 1s and 0s of a digital message. There are 3 main types of the keying which are: Amplitude shift keying (ASK): A type of keying that sends digital data over analog carriers by changing the amplitude of a wave in time with the data stream. Frequency shift keying (FSK): A type of keying that sends changes through the frequency of the wave. Phase shift keying (PSK): A type of keying that sends changes through the distance by which the waves lead or follow a reference point in time. Coupling A tags coupling mechanism determines the way a circuit on the tag and a circuit on the reader influences each other to send and receive information on power. The type of coupling a tag uses directly affects the range between the tag and the reader. Along with the range, the choice of coupling mechanism strongly affects the frequency which is used by the tag. Some of the coupling techniques are describes which are described below: Backscatter coupling This technique provides an elegant solution to the puzzle of how to make an RFID tag without the battery. This describes that the RF waves transmitted by the reader are spread out by the tag, so waves are bounced back to the source to send a signal. As the term describes, it means that the tags are reflect at the same frequency emitted by the readers, but some of the qualities of the reflection are changed during all this process. But this is the distinguishing feature of this method that both the tags and the readers use the same frequency. Therefore, this is a half duplex communication mode. The reader powers the tag even when the reader is waiting for the signal or sending from itself. Some components of the tag used in this kind of coupling are shown below: Inductive coupling Inductive coupling is a common type of remote coupling. In technical terms, inductive coupling is the transfer of energy from one circuit to another by virtue of the mutual inductance between the circuits. In an RFID system that uses inductive coupling, the reader antenna and the tag antenna each have a coil, which together form a magnetic field. The tag draws energy from the field. The microchip uses this energy to change the electrical load on the tag antenna. These changes are picked up by the reader antenna and converted into a unique serial number. [40] For this reason, it is sometime called transformer coupling. Magnetic coupling It is close to inductive coupling because the reader and tag form a pair of transformer coils. In this coupling, the reader coil is round or u shaped ferrite core with windings on it. Tag must be within 1 cm when operational and placed over the gaps in the core. As the distance is so small, therefore ASK modulation is used due to strong strength of magnetic coupling to make it simple. Tags are inserted in the reader as they can power up the chips which are complex. This is the reason they are ideal to be used in smart cards. Capacitive coupling It is another form of close coupling that works best for the systems in which tags are inserted in the reader. It is also used for the smart cards. Capacitive coupling dispense with antennas and replace them with electrodes. The reader and tag have conductive patches and they work together with a capacitor when held exactly parallel to each other without touching. It uses simple ASK with load modulation to transfer data. Storage and Processing Capacity Information storage and processing capacity is the final and major consideration when choosing a tag. There are many ranges of tags which can store information according to their capability. The simplest one is the tag that can store 1 bit only. On this basis, the presence and absence of an object or an individual is identified. On the other hand, some tags can store KB of data. Larger capacities usually require active tags and even among passive tags. Larger memory capacity directly increases the cost of the tag. 43] Some of the types of tags are as follows: One -bit EAS tags Electronic article surveillance (EAS) tags are typically used to prevent thefts in libraries and mostly markets. EAS tags are called 1 bit tag as they are capable to store 1 bit of the information whether tag is present or not. This is the reason they are mostly used as they are inexpensive and simple. They do not have microchips are always passive using a specific modulation whi ch is appropriate to the coupling that may be recognized by the reader. Surface acoustic wave tags (SAW) In between the 1 bit tag and other, more advanced tags are SAW tags, which operate in microwave range as the backscatter tags and have no processors. They can be encoded at the time of manufacture to contain a number. A saw tag is shown in the figure given below: The antenna at left receives microwaves pulses from the reader and feeds them back to the transducer, which contains a piezoelectric crystal that vibrates when it receives the pulses and this vibration creates an acoustic waves that travels through the tag, encountering reflecting strips. The strips reflect back part of the waves, causing the crystal to vibrate again and creating a reflection. The number of the strips and the distance between them determines the timing and number of the pulses sent back to the reader. Since the number is set at the manufacture time, SAW tags are read only as they have no logic circuits. These tags respond to the pulses at the same time causing the problems to the readers, in sorting out where one tag response starts and another stop. At the time of the writing, practical size also limits these tags to a 32- bit capacity. [45] State machines and microprocessors Some tags are more complex as they have logic circuits in them. Many others tags like 1bit tags and SAW tags have no circuits. The state machines allow these tags to participate in a complex process of anti-collision with the reader. [45] More complicated processors can provide security through encryption or through the control sensors built in the chips. Advanced smart cards even have powerful processors that can be programmed and reprogrammed. As with the memory capacity, more capacity gain means higher will be the cost. The best principle is Dont buy more than you need. Fortunately, even the most advanced tags are dropping in prices as production volume increases. [45] Interrogators RFID interrogators are essentially small computers. They are also composed of roughly three parts: an antenna, an RF electronics module, which is responsible for communicating with the RFID tag, and a controller electronics module, which is responsible for communicating with the controller. An RFID interrogator acts as a bridge between the RFID tag and the controller and has just a few basic functions which are: * Read the data contents of an RFID tag * Write data to the tag (smart cards only) Relay data to and from the controller * Power the tag (passive tags only) In addition to performing the four basic functions above, more complex RFID interrogators are able to perform three more critical functions: * implementing anti-collision measures to ensure simultaneous RW communication with many tags, * authenticating tags to prevent fraud or unauthorized access to the syste m, * Data encryption to protect the integrity of data. [47] Types of Interrogators Different readers are for different purposes as they fit for different occasions. They differ in size and shapes, support various protocols and requirements. Some readers are half an inch across to the the size of a computer desk. Some readers conform to the same standards as the tags read, but some can support multiple protocols or the tags protocols made by the vendors only. The most important of all is the power levels, frequency variations and requirements vary from region to region. Interrogators Placement RFID systems do not require line of sight between tags and readers the way that bar code systems do. As a result of this, system designers have much more freedom when deciding where to place interrogators Readers and antennas can be placed in variety of places for different purposes. These categories are as follows: Portals The word portal means doorways or the entrance. In this category, they are placed where they can recognize tagged items entering or leaving the place. It is common setup for the warehouses. Tunnels It can be useful for the assembly lines as the readers may identify the station when an item is currently passing through. Handhelds These readers work in a place where the items are heavy enough and they cannot be moved near the readers. They can communicate with the help of wireless Ethernet or RF modem. Forklift readers In some workplaces these readers are now placed on the forklifts as a person might carry a handheld reader. Smart shelves It is potentially made for the real time inventory of the stocks in the workplaces. Smart shelves are the units where antennas are incorporated in a way that readers can acknowledge whether item is coming or departing from the shelves. RFID Controllers RFID controllers are the brains of any RFID system. They are used to network multiple RFID interrogators together and to centrally process information.

Thursday, November 28, 2019

Representationalism and Aesthetics Essay Example

Representationalism and Aesthetics Paper If one were to be provided a spectator’s view of visitors of an art museum, they would witness a microcosm of the appreciation of art in its entirety. Some observers of art might simply glance at a piece of artwork and shrug it off for its unaesthetic appearance, others might try to delve deeper into what it’s standing for. Multiple factors would possibly come into play; the audiences’ reaction, the inquisition into the artist’s original intention, and perhaps the attempt to connect the artwork to another object based off parallel resemblances. Many of these actions derive from theories that were proposed long ago. Such philosophers as Plato, Aristotle, and Alexander Baumgarten toyed with philosophical theories including representationalism and aesthetic theory. In this paper, I hope to define the outward meaning of these theories and then delve into their similarities and contrasting ideologies. Though some specific parts of these theories might be outdated now, a strong portion of the basic foundations of these ideas appear and are still relevant today. Thus, by becoming versed with these philosophies, a viewer of art can become more appreciative and be given a better view into what the artist was originally trying to convey. Noel Carroll begins his fourth chapter on â€Å"Art and aesthetic experience† by stating that the definition of aesthetics is three-fold; â€Å"one of these is very broad; another is narrow; and a third is tendentious. † The first explanation for aesthetics revolves around the idea that the term Aesthetics is synonymous with Philosophy of Art. Therefore, just as Carroll theorizes that our book might have been appropriately renamed Aesthetics of Art, it is just as reasonable that our entire course be aptly changed to the Aesthetics of Art. We will write a custom essay sample on Representationalism and Aesthetics specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Representationalism and Aesthetics specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Representationalism and Aesthetics specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Besides aesthetics basing itself around this interchangeability, aesthetics has also come to stand for the â€Å"receptive side of things. † This sector of the meaning of aesthetics uses the notion that when â€Å"philosophers talk about aesthetics in the narrower sense, that frequently signals that they are interested in the audience’s portion of the interaction between artworks and readers, listeners and viewers. † The third, and according to Carroll, final meaning of aesthetics is the â€Å"tendentious† idea that â€Å"artworks are objects whose function is to engender aesthetics experiences. † Being that this study of art is provided philosophically, Carroll sought to restate the aesthetic theorists argument for this through a series of logical steps. Thus, by stating his original hypothesis, he was able to state that if the previous step was true, the succeeding logical statement would also be valid a result. This chain continued into finally connecting the first statement and final conclusion, ultimately echoing the main idea behind the third meaning of aesthetics, that â€Å"artists intend their works to function as sources of aesthetic experience. † In layman’s terms, the artist creates their work to garner an aesthetic reaction. Therefore, it is justifiable that the second and third meanings are somewhat analogous since where the former relies on the audiences‘ perception of art; the latter restates the artist’s intention of creating the art in the first place, but both for aesthetic purposes. An interesting facet into the meaning of aesthetics is that besides being three-fold, there were different factions who supported varying interpretations of aesthetics. An example of this is that while it was originally stated that aesthetics and â€Å"philosophy of art† were once interpreted as interchangeable, some theorists argued that this was not true. To some philosophers, â€Å"aesthetics is broader than the philosophy of art, since it studies nature as well. † It is also intriguing that Carroll’s hypothesis that â€Å"what artists intend to do by making artworks is to afford the opportunity for audiences to have aesthetic experiences,† can be carried out to analogies outside of our normal portrayal of art. Similar to Carroll’s hardware example on page 3 of the chapter on aesthetics, consider the example of a manufacturer of winter jackets. People buy winter jackets to stay warm and perhaps as a demonstration of fashion. Department stores stock winter jackets so that people with this goal can find what they are looking for. Therefore, similar to Carroll’s logic, it is reasonable to conjecture that manufacturers of winter jackets, who supply the department stores, intend by making winter jackets to provide the sort of clothing that will facilitate the goals of winter-jacket-buyers. This all connects back to the idea that when artists make artworks, in this case those who manufacture winter-jackets, their intention is to afford the opportunity for audiences, in this case those consumers who buy the winter-jackets, to have aesthetic experiences. The other philosophical topic that this paper will cover, and later compare and contrast to Aesthetics, is Representationalism. One of the most basic forms of representationalism, as noted page 4 of â€Å"Philosophy of Art: Chapter 1-Art and Representation† is that, â€Å"by representation, here is meant something that is intended to stand for something else and that is recognized by audiences as such. † Similar to the example that Carroll gives where a portrait can stand for whomever it is a portrait of, the Renaissance sculpture of David would be considered a representation of David himself. It is important to note, that this interpretation of representation is only a subset known as imitation. Carroll notes â€Å"representation is broader, since something can also stand for something else without looking like it. † An example of this could be based off the fact that historically, women of larger size denoted a sense of beauty because they were potentially seen as a better fit for childbearing and thus were potentially more sought-after. Therefore, a painting of a bigger woman could represent beauty for the artist, but especially if viewed within the context of modern day, not necessarily replicate our modern perception of beauty. This example, particularly biased by the changing of ideologies over time, would epitomize representation by a piece of art without imitation as it did not imitate what is generally considered modern beauty for its current audience. Such counterexamples, according to Carroll, encouraged us to â€Å"take a second look at art history and to ask whether imitation theory was ever accurate. † Additionally, â€Å"with this additional breadth, the representational theory of art remains unsalvageable, since much art is not representational. † Besides the example formerly stated with changing ideologies allowing for representation without imitation, modern architecture can be another example as certain buildings do not necessarily stand for something else, they just are what they are. Similar to the examples given on page 4 of â€Å"Art and Representation,† The Robeson Campus Center does not stand for the building of food, it is a building which feeds students. Branching off the idea stated on page 3 of â€Å"Art and Representation,† that if art didn’t imitate a form of real life, it wasn’t art, this idea seems outdated. Personally, this idea of imitation could be considered flawed, it imposed a restriction on the scope of what art could be. According to Carroll, â€Å"neither the imitation theory of art nor the broader representational theory of art appears successful. † A third variation has branched out known as neo-representational theory which, Carroll states makes a weaker claim, â€Å"namely that in order to count as a work of art, the candidate must be about something (i. e. , it must have a subject, about which it makes some comment).

Sunday, November 24, 2019

Communication in China essay

Communication in China essay Communication in China essay Communication in China essayAccording to Charles P. Cell (1969) â€Å"Communication in China’s Mass Mobilization Campaigns†, the communicative campaign in China serves different roles that include not just the necessity to integrate the society into the campaign, as it is simply a means of controlling the population for the benefit of leaders. Instead, the author notes that the core function of the Chinese campaigns is to change the social tendencies and cultural patterns to ensure that all this is equally beneficial to a greater number of people. In his article, the author explores the roles of the campaigns by stating that the success of the communicative techniques used in the campaigns is much dependent on the persuasion rather than control. Hence the communicative techniques of the campaigns should be based on the implementation of certain changes. The author concludes that the leadership’s efforts to change the patterns of behavior and attitudes of the Chin ese society through the communicative techniques and process of mobilization ultimately proved to be some of the greatest social campaigns in the whole history of humanity. However, the mobilization of society via the use of different communicative techniques is undoubtedly not an easy task.Godwin C. Chu in his article â€Å"Radical Change through Communication in Mao’s China† (1977) explores the issue that in contrast to most of other developing states, China has entirely focused on the communication as a core of the development process. The author examines a number of communication patterns emphasizing that the steady development of the Chinese state started along with the implementation of radical changes in the structure of society, which consequently removed a number of barriers and resulted in mobilizing social resources. The author also examines different kinds of communication focusing on the informational, normative and effective ones. These communicative patt erns serve a common function of encouraging the primary changes of social structure as an essence of the China’s progress. According to the article, this will ensure the rapid enhancement of productivity and effective management of the development programs.

Thursday, November 21, 2019

Hydraulic conductivity Coursework Example | Topics and Well Written Essays - 2000 words

Hydraulic conductivity - Coursework Example This paper will define hydraulic conductivity and discuss the properties or the states that affect the levels of hydraulic conductivity. Further, the paper will explore the importance of hydraulic conductivity and the methods used for the determination of hydraulic conductivity using empirical-based, field-based and lab-based approaches. The properties and the states that affect hydraulic conductivity The first property is the compaction conditions of the soil or the rock materials, where the difference in hydraulic conductivity depends on the contours of initial saturation. The zones of initial saturation are computed using the following equation: (Brauns, Bieberstein & Reith, 2003) Under the equation, â€Å"w is the molding water level; yd is the weight of the dry unit of the soil, yw is the (per-unit) weight of water, and Gs is the particular gravitational level of solids† (Brauns, Bieberstein & Reith, 2003). Defining the water levels in the combination and the weight of th e dry unit matches the hydraulic conductivity. The second determinant of hydraulic conductivity is index properties, which is marked by the composition of the soil or the rock material in question. ... d of larger particles, which are ordinarily less likely to be closely compacted into double layers, levels of hydraulic conductivity are lower (Beckie & Harvey, 2002). The third factor is the atterberg limits of the materials at the given area, where hydraulic conductivity should take place. In general, hydraulic conductivity reduces where there is an increase in the plasticity index and the liquid limit. This is the case, because plastic index and liquid limit are directly connected to the mineralogy of the soil, clay or the rock material in question. Sometimes, an increase in the clay content of a soil or rocky material or the presence of more active minerals of clay leads to a reduction in the size of microscale pores (Deb & Shukla, 2012). These microscale pores are the ones that determine the flow of water in the compacted wet lines of the soil or the rocky materials. This factor implies that soils with higher plasticity index and liquid limits will contain more clay content or a ctive clay minerals, and will characteristically have lower levels of hydraulic conductivity (Ganjian et al., 2006). Also, the particle size distribution of materials influences the hydraulic conductivity of the given material. This means that an increase in the percentage level of the fine particles contained in a unit area of the material causes a decrease in the hydraulic conductivity of the material. For example, soils with high levels of fine clay tend to have lower conductivity levels (Deb & Shukla, 2012). Why hydraulic conductivity is so important Hydraulic conductivity is used for different roles, including the development of engineering models entailing the use of geotechnical designing. Under this use, hydraulic conductivity is necessary for the determination of retaining