Thursday, December 26, 2019

The Deforestation Of The Amazon Rainforest - 1574 Words

A real life example of a social dilemma is the deforestation of the amazon rainforest. In the early 2000’s rapid industrialisation, immense scales of agriculture and other economic activities led to 20% of the territory being destroyed. The scale of destruction particularly, within Brazil was so large; NASA released an image confirming the effects were detectable from space, (Winter, 2014) Many of the contributing parties to the problem included, developers, subsistence farmers, cattle-ranchers, mining/quarrying, colonising and paper producers, (Butler, 2006). Let us take the later example; paper producers that became tempted by mass production felled for self-interest would have significantly risked depletion of the forest. The consequences would have been potentially catastrophic, the millions of species that the rainforest holds would have lost their habitats, (posing a risk of extinction) and 15% of the world’s carbon would have been released, (Scheer Moss, 2012) . Without limits, lamentable freedoms of a common pool are what Hardin, (1968) described as â€Å"The tragedy of the commons.† Logically, the collective interest of all parties called for minimal utilisation or withdrawal for long-term benefits but free reign meant higher profitability in the short-term. Herein, lay the social dilemma, or more specifically common resource dilemma. Social dilemmas have two fundamental properties: first, the temptation to serve self-interest receives a higher payoffShow MoreRelatedDeforestation of The Amazon Rainforest945 Words   |  4 Pages Brazil holds the global warming issue in the palms of its hands and the government of the world’s fifth-largest economy doesn’t seem to care. A recent article featured on usatoday.com states that the destruction of the Amazon rainforest rose 28% from August 2012 to July 2013 after 4 straight years of decline (Sibaja, 2013). I’m sure this may surprise some people because of the widespread concern of global warming and the affect it may have on future generations, but I don’t think the Brazilian governmentRead MoreDeforestation Of The Amazon Rainforest833 Words   |  4 Pages David Alas ENF 111 11/01/15 The Deforestation of the Amazon Rainforest I. Introduction A. The Amazon Rainforest is one of the most important natural features of our planet, crucial to our way of life. However, what Godfrey (1990) described as â€Å"one of the world’s last great settlement frontiers† is severely under threat. B. According to some experts, during the past 40 years close to 20 % of the Amazon rainforest has been destroyed. Furthermore, it has been suggested that this figure could beRead MoreDeforestation of The Amazon Rainforest1136 Words   |  5 PagesThe Amazon rainforest is perhaps the richest collection of plant and animals diversity in the world. It recycles rainfall from coastal regions to the continental interior, providing water for Brazil’s inland agriculture. Big industries like Archer Daniels Midland, Bunge, and Cargill have established industrial soy plantations in Brazil that are taking over large plots of land in the Amazon rainforest (Food for Thought). Soy has been popularized in the past decade as a healthy protein substitute forRead MoreDeforestation Of The Amazon Rainforest1779 Words   |  8 PagesSince the year 1970, 758,092 square kilometers of the Amazon rainforest have been lost due to deforestation (â€Å"Changing Deforestation 1†). Deforestation is the permanent destruction of forests in order to make the land available for other uses and has been extremely prevalent in the Amazon rainforest in recent years. Many argue that the deforestation of the Amazon rainforest is wrongful because of its negative impact on the environment while others argue that it is necessary to keep the BrazilianRead MoreDeforestation in the Amazon Rainforest Essay1167 Words   |  5 PagesDeforestation in the Amazon Rainforest: Human degradation and its consequences Deforestation is a word that displays an image of cruelty against nature. In any language, and on every continent, the word deforestation is frowned upon by all social classes, however why it is still happening? The consequences of this act that involves human beings willing to cut down trees, burning plants, and destroy habitats of animals are just actions to satisfy some human being. The Amazon rainforest covers variousRead MoreDeforestation In The Amazon Rainforest Essay970 Words   |  4 PagesIntroduction: Deforestation is the clearing of a forest and/or cutting down of trees for human benefits such as agriculture, wood exports, etc. Deforestation is the cause of numerous environmental impacts such as habitat loss, flooding and soil erosion. It can also cause climate change, by reducing the amount of rainfall and changing the amount of sunlight reflected from Earth’s surface and increases the risk of forest . Tree growth is important for biodiversity because they absorb carbon dioxideRead MoreDeforestation in the Amazon Rainforest Essay2143 Words   |  9 PagesIdea 2: Problems can arise when one group pursues its own interests to the detriment of others. Deforestation in the Amazon has led to conflicting interests in the Amazon region. Potentially it can affect societies worldwide through global warming. In this assignment, I will agree or disagree with the following hypothesis: Deforestation in the Amazon benefits some people at the moment. It also causes problems for other people, both in Brazil and theRead MoreEssay on The Effects of Deforestation of the Amazon Rainforest1093 Words   |  5 Pagesapproximately thirty percent (â€Å"Deforestation†). That is about nine percent of the world’s total surface. The largest rainforest is the Amazon River Basin, located in South America. The Amazon is home to many species of animals, insects, plants and trees. Many of the trees and plants in the Amazon produce about twenty percent of the oxygen on earth, and absorb carbon. However, the Amazon is decreasing in size every day due to the ongoing deforestation of the land. Deforestation is when the forest of theRead MoreTragedy of Deforestation in the Amazon Rainforest Essay1243 Words   |  5 Pages The Amazon rainforest in Brazil is the world largest rainforest with over 30 million different species of plants, animals and insects. The rainforest used to cover of the earths surface but today only covers . This is mainly because some parts of the forest are being rapidly deforested because the forest is so useful to so many people. Deforestation provides benefits for many different companies which wish to make large amounts of money. Also Brazil owes largeRead MoreImpact Of Deforestation On The Amazon Rainforest Of Brazil, South America, Impact The Environment?1493 Words   |  6 PagesEvaluation Research Summary The question researched was â€Å"How does deforestation in the Amazon Rainforest in Brazil, South America, impact the environment?† The topic of deforestation in the Amazon was chosen as there is much concern about the problem and for the future of the Earth. There were different research processes used to discover new information about the problems in the Amazon rainforest such as, an interview with a person who currently lives in Brazil, annotating books, journals, internet

Wednesday, December 18, 2019

Robert Frosts Home Burial - 1304 Words

In â€Å"Home Burial,† Robert Frost uses language and imagery to show how differently a man and a women deal with grief. The poem not only describes the grief the two feel for the loss of their child but also the impending death of a marriage. Frost shows this by using a dramatic style set in New England. In his narrative poem, Frost starts a tense conversation between the man and the wife whose first child had died recently. Not only is there dissonance between the couple,but also a major communication conflict between the husband and the wife. As the poem opens, the wife is standing at the top of a staircase looking at her child’s grave through the window. Her husband is at the bottom of the stairs (â€Å"He saw her from the bottom of the†¦show more content†¦Looking at lines 3-9 you are able to see that the wife looks at her world through eyes of fear: Looking back over her shoulder at some fear. She took a doubtful step and then undid it To raise herself and look again... And her face changed from terrified to dull. (l. 3-9) Even though the wife may feel that her husband does not understand her grief, he does try to reach out to her. He implores her, â€Å"Help me, then† (l.46). He knows that he has a difficult time communicating with her and observes: My words are nearly always an offence. I dont know how to speak of anything. So as to please you. But I might be taught. I should suppose. I cant say I see how. A man must partly give up being a man. With women folk. (l.48-53) The husband acknowledges that she is grieving and asks her, â€Å"Let me into your grief† (l.62). He pleads with her, â€Å"Give me my chance† (l.64). He asks for help in such a way that his wife pushes him away again. She throws the accusation at him, â€Å"There you go sneering now!†Ã¢â‚¬  (l.70). This starts a second argument between the two. The argument now is whether the husband can grieve for the child, in the way that he is allowed without society looking down on him? The husband wants the world to know that he is hurting too, but how can he do this? The husband was never taught to grieve, so he is in the process of learning how to do this. The wife does notShow MoreRelated Robert Frosts Home Burial Essay1248 Words   |  5 Pages Robert Frosts Home Burial Robert Frosts dramatic dialogue poem, Home Burial, is the story of a short, but important, episode in the marriage of a typical New England farm couple. They are typical because their public personalities are stoic and unimaginative, and because their lives are set within the stark necessities of northeastern American farm life. Yet, they are also typical in that their emotions are those one might expect of young parents who have abruptly and, to them, inexplicablyRead MoreThe Power of Ambiguity in Robert Frosts Home Burial1115 Words   |  4 Pagesat the moment. Then years later the situation can be reflected on and the meaning potentially can be easily seen. Often poets make use of ambiguity to move a poem or story forward by leaving a little mystery to be pondered. Robert Frost uses this in the poem Home Burial effectively. â€Å"She was staring down, looking back over her shoulder at some fear.† (Frost) He discusses an impasse in a relationship by sing an example as mourning the death of a child. The death of a child can put a strain onRead MoreRobert Frost’s dramatic poem Home Burial depicts two tragedies: the loss of an infant and the1100 Words   |  5 Pages Robert Frost’s dramatic poem Home Burial depicts two tragedies: the loss of an infant and the deterioration of a marriage that follows. The emotional dialogue characterizes husband and wife with their habits of speech, illustrating the ways that they deal with grief. Instead of comforting her in her distress, the husband attempts at every turn to force his wife to cease grieving. The unnamed farmer’s inability to console his wife, who seems to feel so much more deeply the loss of her child, combinedRead More Robert Frost Home Burial - A Reflection of Reality Essay923 Words   |  4 Pages nbsp;Home Burial as a Reflection of Realitynbsp;nbsp;nbsp;nbsp;nbsp; Robert Frosts Home Burial is a masterfully written work, conceived from his and his wifes anguish at the loss of their first-born son as well as from the estrangement between his sister-in-law and her husband due to the death of their child. In Donald J. Greiners commentary on Frosts works, The Indespensible Robert Frost, it is revealed that Mrs. Frost could not ease her grief following Elliots death, and FrostRead MoreAnalysis of Home Burial1496 Words   |  6 PagesRobert Owen Marjory Thrash Eng 1123 V02 13 April 2009 Analysis of â€Å"Home Burial† Many of Robert Frost’s poems and short stories are a reflection of his personal life and events. Frost’s short story â€Å"Home Burial† emulates his experience living on a farm and the death of two of his sons. Frost gives an intimate view into the life and mind of a married couples’ struggle with grief and the strain it causes to their marriage. The characters Frost describes are synonymous, physically and emotionally,Read More The Theme of Death in Poetry Essay819 Words   |  4 PagesThe Theme of Death in Poetry Robert Frost and Emily Dickinson are two Modern American Poets who consistently wrote about the theme of death. While there are some comparisons between the two poets, when it comes to death as a theme, their writing styles were quite different. Robert Frost’s poem, â€Å"Home Burial,† and Emily Dickinson’s poems, â€Å"I felt a Funeral in my Brain,† and â€Å"I died for Beauty,† are three poems concerning death. While the theme is constant there are differences as well as similaritiesRead MoreComparison and Contrast How Death Effects Lives of Men and Women671 Words   |  3 Pagesas separation and stress. The poem, Home Burial, is a clear example of how the couple could not recover from the loss of their child due to the lack of communication. In spite of the fact that the characters in the poem are imaginary people, Robert Frost portrayed his personal life events in those characters lives. The unexpected death of a child can lead to a brake up i n the family, especially if there is miscommunication between the couple. Home Burial illustrates a husband and wife who areRead MoreAnalysis Of Robert Frost s Home Burial And The Death Of The Hired Man 2384 Words   |  10 Pages THESIS STATEMENT Robert Frost, an American poet during the Nineteenth Century, Modernist Era, displayed the issues of realism through his life issues of death and spousal relations through his poems: â€Å"Home Burial† and â€Å"The Death of the Hired Man†. INTRODUCTION Robert Frost’s inspiration for his poetry derived from much of his life and the historical events that surrounded him. American literary critic, Harold Bloom wrote in his Bloom’s Major Poets, â€Å"Robert Frost is one of the major American poets†¦inRead MoreBurial Of A Home By Robert Frost1482 Words   |  6 PagesBurial of a Home Robert Frost’s poem â€Å"Home Burial,† written in 1914, centers around the conversation of a married couple whose relationship is struggling after the death of their young child. A duality in meaning exists in the poem’s title, â€Å"Home Burial,† which references not only the death of their child but also the death of their marriage. Is the child’s death the sole cause of their marital distress? Robert Frost opens the poem in the couple’s home with the husband watching as his wife, Amy,Read MoreRobert Frost s Life Through Poetry1745 Words   |  7 PagesMarch 23, 2016 Robert Frost Reflects Life Through Poetry It is easy to express your emotions, and feelings through poetry. Which is exactly what Robert Frost has done through his entire career. Each poem Robert Frost has written, has meaning behind it all. He has gone through an extreme amount of events, and tragedies in his life. Frost has been through an unimaginable amount of losses, deaths, and loneliness throughout his years. Throughout his life his poetry has had a huge impact on him, the situations

Tuesday, December 10, 2019

Understand the Importance of Diversity free essay sample

For most of us, treating people equally and appreciating peoples differences is the basis of being a good citizen. This has to be learnt from a very early stage so that children can understand that no matter what differences people may have, we have to still be treated equally. Diversity means difference between people etc With diversity, we understand that although people have things in common with each other, they are also different and unique in many ways. Diversity is about recognizing and valuing those differences. Diversity therefore consists of factors, which include personal information such as background, culture, personality in addition to the characteristics that are protected under discrimination legislation in terms of race, disability, gender, religion and belief, sexual orientation and age. By recognizing and understanding our individual differences and embracing them, and moving beyond simple tolerance, we can create a productive environment in which everybody feels valued. We will write a custom essay sample on Understand the Importance of Diversity or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Equality means treating people in a way that is appropriate for their needs. For example, if we are in a childcare environment and there is a child in a wheelchair and we are doing an exercise which includes physical activity, we still involve the child by doing exercises that the child can participate in for instance stretching with hands and passing the ball to each other in a way that he can pass the ball as well etc.. , it would be no good saying to him, â€Å"you cannot do this activity because you are in a wheelchair†. This will only make the child feel unwanted and helpless to do anything and this is the beginning for may other mental problems to begin for the child. Equality is very important for everyone to understand from a very young age because everybody deserves a chance to be equal and have the same opportunities as everybody else. Inclusion means giving children with special needs and their parents or caregivers the same opportunities to learn, enjoy and participate as other families do. Inclusion is about equal opportunities for all pupils, whatever their age, gender, ethnicity, and background. It pays particular attention to the provision made for, and the achievement of, different groups of pupils within a school. Many skills achieved by children are mainly learnt by seeing other children doing it. So, regardless of the disability a child might have, it is always important to include everyone in the same group and encourage students to learn and nteract with each other therefore learn from each other and also learn to develop positive attitudes toward each other. I conclude by saying that with these three very important points, a child can develop a healthy personality and also a good mind on how to look at each other without discriminating and judging only by the disability of the person. Personality has to be built on a positive ground and there is no better way to develop a good personality by learning to accept differences of other people

Monday, December 2, 2019

Medical Assistant free essay sample

One Career choice for an individual to have as an option should be to become an Medical Assistant. It’s Not Something to make a living from but its one step into the medical field. Most people go for an R. N or even better for a Dr. Degree. But here is some information about Medical Assistants responsibilities, etc. Medical assistants have no formal education or training requirements although most have a high school diploma. Many receive only on-the-job training while others complete a one to two year formal program. Medical assistants are not required to be certified, but certification indicates that one is experienced and has received formal training. This may lead to better employment opportunities and higher pay. Certification is available from several professional organizations. One may also become certified in a specific medical specialty, such as obstetrics or podiatry. A medical assistant should be polite and pleasant and have good communication skills. We will write a custom essay sample on Medical Assistant or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page There are no national licensing requirements for medical assistants, although, depending on the state in which they work, they may be required to obtain a license to perform certain procedures. (â€Å"The medical assistant career†) Medical Assistants are certified by one of several agencies. Certification is important, particularly for those applying for entry level positions, since it indicates competence in the field. The Certified Medical Assistant designation is offered by the American Association of Medical Assistants. The Registered Medical Assistant credential is given by American Medical Technologists. Due to their large scope of knowledge, medical assistants are valuable members of every healthcare team meaning opportunity for you! In your career, youll keep an office or facility on track and ensure that patient needs are met each and every day. What do these duties include? Your medical assistant duties and job description includes many important tasks. As a medical assistant you will perform administrative and clinical duties under the direction of physician. You will be responsible for keeping the medical office or facility running in a smooth manner. Your duties may vary depending on the state where you are located, but typical duties of a medical assistant include: (Taking and recording vital signs and medical histories, Preparing patients for examination, Drawing blood, Administering medications as directed by the physician, Discussing prescriptions and nutrition with patients, Scheduling appointments, Maintaining medical records, Billing and coding for insurance purposes, Preparing correspondence, Managing finances. In your medical assistant career, you will work in a comfortable medical office or facility, applying your skills to the front and back areas. As you assist patients in the back office, you will spend more time on your feet as you handle your medical assisting duties. In the front office, you will sit at a desk or workstation so you can greet patients and efficiently handle administrative medical assisting tasks. While most medical assistants work a standard 40-hour week, the Bureau of Labor Statistics (BLS) reports that some work part time, evenings or weekends. What’s the medical assistant job description). Medical assistants perform administrative and clinical tasks to keep the offices of physicians, podiatrist, chiropractors, and other health practitioners running smoothly. The duties of medical assistants    depend on the location and size of the practice and the practitioners specialty. In small practices, medical assistants usually do many different kinds of tasks, handling both administrative and clinical duties and reporting directly to an office manager, physician, or other health practitioner. Those in large practices tend to specialize in a particular area, under the supervision of department administrators. â€Å"Administrative† medical assistants update and file patients medical records, fill out insurance forms, and arrange for hospital admissions and laboratory services. They also perform tasks less specific to medical settings, such as answering telephones, greeting patients, handling correspondence, scheduling appointments, and handling billing and bookkeeping. (About Being a Medical Assistant. ) Most people start off small when going into the medical field, such as being a medical assistant. They attend a Jr. college or community college, for up to two years for their associate’s degree, some go straight to a university. After getting a career started like that most people go back to school for their bachelor degree. Some people go back study for an R. N which takes up to 4 years of attending college. Some go for a doctor’s degree which takes up to 8-10 years. Whats the medical assistant job description?

Wednesday, November 27, 2019

Gays Adopting Children essays

Gays Adopting Children essays You stare into a mirror. The reflection glaring back at you is one that you can barely recognize. Your skin is ghostly white and malnourished. Tears begin to stream down your emaciated cheeks, as you strain to reach up and whip them. All you have ever known is the story of abuse and neglect. The thoughts of bouncing from foster home to foster home are your fondest memories . The feeling of loneliness has engulfed you from as far back as you can remember. You visualize the beatings, the screaming, and the tears that you have endured. Shivers race up your spine as you fall on your shaking knees and pray. You pray that one day a family will reach out to you. You pray that one day just maybe you can be loved, regardless of who the family is, just as long as you can feel love. Millions of same sex couples are ready and willing to provide a happy home for neglected children. However society does not permit this, and so you are still alone, and will be for some time. You continue to pray. The diversity of the world begins with who we are attracted to and who we love. To be ashamed of it, or phobic about it, does not seem very wise at all (Pg 154). Love is love. The undying notion that God made man and women for a reason, has finally died. Who is to say that homosexuality is wrong? Who is to say that the emotions of love cannot be felt by two individual of the same sex? That is pure ignorance. If you are sure about yourself, and the attraction that you posses towards someone else, then nobody has the right to claim that that is unnatural. There are millions of desperate children in the world, bound by foster homes, and without families. These same sex couples have the same stability, love, and support to give a child as a mom and dad. Whose to say that the male versus female relationship is the only correct environment to raise a child? It is to choose to be who you are. It is a choice to defines what you do. I...

Saturday, November 23, 2019

How To Use the Spanish Preposition A

How To Use the Spanish Preposition A The Spanish preposition a is often thought of as the equivalent of to - but in fact it has far more uses. A can also be the equivalent of on, at, from, by or in, among others. And in many cases it is not translated at all. Rather than learning how to use the Spanish a by its translation, it is probably best to learn the purposes for which a is used. The following list doesnt cover all its uses, but it does show the uses you are most likely to come across at the beginning stages of learning Spanish. Where a is translated, the translation is indicated in boldface. Using A To Indicate Motion or Location Almost any verb indicating motion, and even nouns, can be followed by a before a destination. It can also be used with some other verbs to indicate where the verbs action takes place. Llegamos a Argentina. (We arrived in Argentina.)Se acercà ³ a la casa. (He approached the house.)Cayà ³ al piso. (It fell to the floor.)Ofrecemos servicios especializados para facilitar su visita a Disneyland. (We offer specialized services to facility your visit to Disneyland.)Esa es la puerta al baà ±o. (That is the door to the bathroom. Al is a contraction of a el, usually meaning to the.)Me siento a la mesa. (I am sitting at the table.) Using A Before an Infinitive A is often used to connect a verb with an infinitive that follows. This use is especially common when indicating the start of an action. In these cases, a is not translated separately from the infinitive. Empezà ³ a salir. (She began to leave.)Entrà ³ a hablar contigo. (He came in to talk to you.)Él se negà ³ a nadar. (He refused to swim.)He venido a estudiar. (I have come to study.)Comenzà ³ a bailar. (She began to dance.) The most common usage following this patter is using ir a infinitive to form the a type of future tense  known as the periphrastic future. Si no jugamos bien no vamos a ganar. (If we dont play well we arent going to win.)Voy  a  cantar.  (I am going to sing.)Tenemos que aceptar que tal vez no nos vayan a entender. (We have to accept that sometimes they arent going to understand us.) Using A To Indicate Manner or Method Numerous expressions begin with a followed by a noun to indicate how something is done. The phrase starting with a functions as an adverb and is sometimes translated as one. Vamos a pie. (We are going on foot.)Hay que fijarlo a mano. (It is necessary to fix it by hand. Note that a mano also could have been translated as manually, an adverb.)Estoy a dieta. (I am on a diet.)Escribo a lpiz. (I am writing with a pencil.)Andan a ciegas. (They are walking blindly.)Llegamos a tiempo. (We are arriving on time.)La internet evoluciona a cada instante. (The Internet is changing constantly.)Lee el libro a escondidas. (She is studying the book covertly.) Introducing an Object With A Before a direct object, a is used before name or noun that represents a person in a usage known as the personal a. The preposition in these cases usually is not translated. A can also introduce an indirect object. Conozco a Pedro. (I know Peter. In this and the next two examples, the name functions as a direct object.)Encontrà © a Fido. (I found Fido.)Verà © a Marà ­a. (I will see Mary.)Le doy una camisa a Jorge. (I am giving a shirt to George. In this and the next three examples, George is an indirect object. Note how the translation of a varies with the verb.)Le compro una camisa a Jorge. (I am buying a shirt for George.)Le robo una camisa a Jorge. (I am taking a shirt from George.)Le pongo la camisa a Jorge. (I am putting the shirt on George.) Using A in Time Expressions A is sometimes used in specifying times or days. Salimos a las cuatro. (We are leaving at four.)A la una de la noche escuchamos maullar. (At 1 in the morning we heard meowing.)Estamos a lunes. (Today is Monday. Literally, we are at Monday.)

Thursday, November 21, 2019

Inception Movie Essay Example | Topics and Well Written Essays - 750 words

Inception Movie - Essay Example The intention of this study is ‘Inception’ as perhaps the most sophisticated and fascinating movie that revolves around the power of the mind and simultaneous to how it can be manipulated. A dream inside a dream and the sharing of this activity enables Dom Cobb and his team to illegally steal information related to corporate espionage through extraction. It starts off with the architect who builds the dreams and designs all of its intricacies. This process goes all too well until projections, which are the person’s subconscious in action, becomes aware that what is happening is not real. These projections turn against the dreamer. The projections are part of the dream and comprise the whole feel that actually adds to make the dream more real but they are at same time the most telling that everything is not in order and retaliates so that a search for the dreamer and the end of the dream ensues. This is why it is important to keep track of reality within a dream to avoid triggering the subconscious toward any suspicion. The main goal of extraction, or in this case inception, is to be able to create a reality that would allow Cobb to grab hold of information that the person hides intently. Specifically in inception, it is the control to let the person come to his own realization to make the idea more compelling. In the world presented in the film, technology not only enables people to explore dreams extensively, it has also instilled the value of protection from such thievery. This is where the inception of Robert Fischer with the idea to break up his father’s empire turned out to make the job terribly difficult as armies are sent instead of the normal human projections. But this is not the most threatening of all the projections. It is the recurrence of Mal that threatens their lives while inside three concurrent dreams. In order to keep off the animosity of projections, the architect plays an important role in the development and crea tion of dreams. From the start the audience already gets a strong sense that Cobb is the best at what he does but he has been broken by memories of the death of his wife and constant running away from authorities. Ariadne proved to be the most helpful in keeping away the demons that haunt Cobb and in eventually allowing him to confront them and the reality of what happened to his wife. She was the only other architect who was able to parallel him in his prime. Initially, the film had established that the architect plays an important role. When Cobb was supposed to extract information from Saito, the latter was able to tell it was a dream because of the carpet which was a lapse on the part of their previous architect. As Botz-Bornstein aptly puts it, â€Å"The architect of dreams must create a place. Space is already there in the cacophony of the subconscious† (p.122). What Ariadne provided are the details, in small or large scale, which was a way to make them partake in the d ream. More than her initial task of creating an intrinsic labyrinth so that Cobb may shed away his projections of Mal, Ariadne created sequences upon layers of dreams that made for the believability of their alternate reality. Cobb had cautioned her vehemently, â€Å"Never recreate from your memory. Always imagine new places!† (Inception). But mostly this warning was directed by Cobb for his own benefit since it is Mal’s projections that are the worst and ultimately had led them to the abyss that endangered their lives. Ariadne, except for the recurrence of Mal, was the only pivotal female figure that actually exists in real time in the film. The architect provides for development of the story and her strength

Tuesday, November 19, 2019

Evaluating ways in which carphone warehouse fufill is ethical and Essay

Evaluating ways in which carphone warehouse fufill is ethical and social obligatory - Essay Example Methodology Carphone Warehouse is a large company that's been operating for years, so it is impossible to review its CSR policy in true detail. Nonetheless, a brief overview is illustrative. First, I will summarise and analyse Carphone Warehouse's stated CSR policy. Second, I will examine if past transgressions have occurred, and if so, at what level. Third, I will analyse the way that those events might impugn CPW's CSR policy and determine where the blame is to be put. CSR Policy Carphone Warehouse has an impressive and well thought-out CSR policy (Carphone Warehouse, 2011). It began with an overview to bring in five areas of their business: â€Å"At the Carphone Warehouse we have spent the past 12 months devising a clear CR strategy which focuses on five key areas - Customers, Employees, Community, Charity and Environment† (Carphone Warehouse, 2011). They include their investors, customers, employees and communities as stakeholders. Carphone Warehouse supports several chari ties, as does TalkTalk. It supports Barnardo's and Get Connected, and TalkTalk has its own partner charity, Treehouse (Carphone Warehouse, 2011). ... It also has its own Foundation that it uses to support initiatives floated by employees, and supports Namibia Trek, Helping with Homelessness and others. But the CSR policy is far from simply a charity policy. They have a battery directive to return waste batteries under the 2009 Waste Batteries and Accumulator Regulations, and have a goal to reduce their carbon footprint by 12% by 2012 (Carphone Warehouse, 2011). In addition, they have introduced a 0%-to-landfill policy. Their environmental policy goes beyond merely complying with the law, showing a commitment to â€Å"legal plus†, though they do prominently display their compliance with the law as if it were laudatory. They also funded a study to determine health risks from cell phones. While they had a vested interest in the outcome of this study, they could have avoided funding it at all. The study found that there is no connection between cell phone use and cancer, which matches with other evidence on the topic. They also offer an independent fact sheet, not produced by the company. CPW also has an impressive diversity policy, using totaljobs.com and jobability.com to provide jobs to disabled people and using ethnic magazines to promote to ethnic minorities (Carphone Warehouse, 2011). They have a self-esteem system of both monetary bonuses and intangibles like parties, and have the Pulse survey to monitor their employees. They have invested into training initiatives for laptops. The sign of a good CSR policy is that it goes beyond charity and legal compliance and shows attention to the company's impacts and stakeholders. CPW's meets this bar. Ethical Lapses However, CPW has been associated

Sunday, November 17, 2019

Acid Rain Essay Example for Free

Acid Rain Essay Acid Rain is rain, snow or fog that is polluted by acid in the atmosphere and damages the environment. When fossil fuels are burned they release mostly CO2, but they also release two harmful gases, sulphur dioxide and various nitrogen oxides. The sulphur dioxide, SO2, comes from the sulphur impurities in the fossil fuels. However, the nitrogen oxides are created from a reaction between the nitrogen and the oxygen in the air, caused by the heat of the burning. When these gases mix with clouds they form dilute sulphuric acid and dilute nitric acid. This then falls as acid rain. Cars and power stations are the main causes of Acid Rain. Acid Rain has effects on plants, soil and even buildings. The acid reacts with the limestone and then the limestone begins to erode. From previous knowledge, I know that limestone has the chemical formula CaCO3. Limestone, chalk and marble are all calcium carbonate. When an acid reacts with a metal carbonate (such as calcium carbonate) the fizzing shows that a gas is produced. That gas is carbon dioxide, CO2. Adding hydrochloric acid to a rock sample is one of the tests for a carbonate rock, like marble, chalk or limestone. It is also why these rocks are greatly affected by acid rain. The word equation is for this reaction between calcium carbonate and hydrochloric acid is: Calcium carbonate + hydrochloric acid calcium chloride + carbon dioxide + water The chemical formulae for this reaction between calcium carbonate and hydrochloric acid is: CaCO? + 2HCL CaCL2 + CO2 + H2O The rate of reaction can be calculated by measuring amount of Carbon dioxide gas that is obtained by the syringe. There were various types of apparatus which I included: Goggles Syringe Stop clock Measuring cylinder Spatula Hydrochloric Acid Marble-Powder and Chip Boiling tube Bung Preliminary experiment. Before actually beginning my investigation, I will firstly carry out a preliminary investigation. This will help me to see the improvements that I can make after the experiment. I will be able to see possible downfalls and failures in my method, work out appropriate quantities of chemicals to use and generally improve the quality of the final experiment. Below is the set up apparatus that I will use for the preliminary experiment and the actual experiment: The preliminary experiment is performed so that I can predict the volume of acid, the mass of the chip and powder and the length of time that I will be timing for. 1. Firstly, I set up the apparatus. 2. I will specify a curtain mass of marble using a balance and I will place it into the boiling tube. 3. Then, I will measure a quantity of acid and quickly add it to the boiling tube whilst after quickly placing the bung onto the top of the tube. 4. I will record the amount of CO2 gas which is given off, every curtain amount of time. This will produce a rate of reaction. For many experiments the rate of reaction can be changed by altering curtain variables. For this reaction there is no catalyst, therefore we cannot alter this variable. However there are three main variables that could be changed: Temperature of the acid this would be varied by starting off with the acid at room temperature (around 24i C) and then using acid with temperatures of 30i C, 40i C and 50i C. Concentration of the acid the concentration would be varied three times, using hydrochloric acid with concentrations of 0. 5M, 1M and 2M. Surface area of the calcium carbonate the surface area would be varied by using different sizes of calcium carbonate. I will predict that the 2m acid and the powder will be the fastest reaction as the acid is more compact with acid particles in the same volume of water. This helps more successful collisions take place between the particles. The more collisions there are the increased rate of reaction. I found out that I should use 1 gram of mass for the chip and powder marble and 30cmi of acid. This is because the reaction is not too fast or slow. I can get an acceptable number of results recorded. I will be using three different concentrations of acid, 0. 5m, 1m and 2m. (m=molar) The time I will be using will be starting at when the syringe starts to move up to 180 seconds. I will be keeping the amount of acid the same and the mass of the marble so that I conduct a fair test. The temperature was kept at 24i C-25i C. Results 0. 5m with chip 0. 5m with powder Mass of chip = 1. 0g Mass of powder = 1. 0g Time (s) Volume (cmi ) 10 2 20 4 30 5 40 6 50 7 60 8 70 9 80 16 90 17 100 18 110 20 120 21 130 22 140 24 150 25 160 26 170 27 180 31 Volume of acid = 30cmi Volume of acid = 30cmi Time (s) Volume (cmi ) 10 14 20 17 30 19 40 20 50 22 60 23 70 23 80 25 90 29 100 34 110 35 120 37 130 38 140 38 150 38 160 39 170 40 180 40 1 m with chip 1 m with powder Mass of chip = 1. 0g Mass of powder = 1. 0g Volume of acid = 30cmi Volume of acid = 30cmi Time (s) Volume (cmi ) 10 21 20 30 30 36 40 38 50 39 60 31 70 42 80 43 90 43 10 44 110 44 120 44 130 44 140 44 150 44 160 44 170 44 180 44 Time (s) Volume (cmi ) 10 4 20 5 30 6 40 9 50 12 60 15 70 18 80 21 90 24 10 27 110 31 120 34 130 37 140 40 150 44 160 47 170 50 180 52. 2 m with chip 2 m with powder Mass of chip = 1. 0g Mass of powder = 1. 0g Volume of acid = 30cmi Volume of acid = 30cmi Time (s) Volume (cmi ) 10 5 20 9 30 13 40 16 50 22 60 26 70 33 80 36 90 46 10 46 110 46 120 51 130 54 140 57 150 57 160 57 170 57 180 57 Time (s) Volume (cmi ) 10 0-60 20 30 40 50 60 70 80 90 10 110 120 130 140 150 160 170 180 Conclusion. After completing my experiment my results show me that as the concentration of the acid is increased, the reaction takes place faster and more gas is produced in a shorter space of time. Due to this I found that the 2M hydrochloric acid (the strongest concentration of acid I used) produced the most gas in the shortest time. The 0. 5M hydrochloric acid (the weakest concentration of acid I used) produced the least amount of gas in the longest time period. I can clearly see from the graph that the 2M hydrochloric acid gave the fastest reaction and produced the most gas in the shortest space of time, because the gradient of the curve is the steepest and goes far higher than the other curves showing that a larger amount of gas was produced because the gas produced axis is the y axis. The fact that the 2M acid had the steepest curve shows that the reaction was fastest because a large amount of gas was produced (high on the y axis) and in a short space of time (short on the x axis). This will give a steep gradient on the graph. The 0. 5M hydrochloric acid gave almost the opposite curve when the results were placed on a graph. Not much gas was produced in a long space of time and so the slope was very gentle and low on the graph. The 2M hydrochloric acid produced the most gas in the shortest amount of time and was generally a quicker reaction due to its significant difference in particle arrangement compared to the 0.5M and 1M hydrochloric acid. The more concentrated 2M hydrochloric acid has more acid particles in the same volume compared to the 1M and 0. 5M acid. This means there are more available acid particles to react with the calcium carbonate. The reaction will be quicker when using the 2M acid because there are more particles available to react with. The calcium carbonate particles can react with more acid particles quickly as they are easily accessible, whereas in the 0. 5M acid, there are few acid particles in a volume and so some calcium carbonate particles will have no acid particles to react with, causing the reaction to be slow and uneventful. All reactions will only occur if there is enough energy to make it happen. This minimum energy is known as activation energy. Activation energy is the minimum energy for which two reacting particles must collide for a reaction to take place. When particles collide they slow down, stop, and then fly apart again. This will occur regardless of whether they have enough energy to react. In an unsuccessful collision the particles separate unchanged, but in an effective collision the activation energy barrier is crossed and the particles that separate are chemically different from those that came together. I think my results are definitely sufficient to support my prediction. They equal everything I predicted and I am very pleased at how well they turned out. Evaluation I think that the experiment went very well. All my results matched my prediction and everything went according to plan. The gas produced by each acid had a steady increase however; there were a few rogue points. Overall I achieved what I set out to do. I would have liked more time on the experiment to make sure everything was perfect, though. Due to the short time limit we were quite rushed in completing the experiment. There were a few aspects of the experiment that could have been improved to make the experiment even more accurate. For a start the experiment was undertaken over a few days. Each day had a different temperature and so this would have affected the results. If one day had been hotter than the others the heat would have influenced one reaction to take place faster. Also due to the fact that the experiment lasted a few days, different equipment was being used each day. Some gas syringes were slightly stiffer than others and so wouldnt move out as fast. If on one day you had a very stiff gas syringe that wouldnt move very easily and on another day you had a very loose gas syringe, then the results would be very different as the loose gas syringe would give results that say that the reaction happened very fast and the stiff gas syringe would give results that say the reaction was slow. To prevent this from happening the experiment should have been undertaken and finished on the same day, using exactly the same equipment as you started with for each acid. The initial part of the reaction when the acid first reacts with the calcium carbonate is very fast. A lot of gas is produced at the beginning of the reaction. However the way the apparatus are set up means that when you pour the acid onto the calcium carbonate, there are a few seconds when the gas is able to escape before the gas syringe is connected to the test tube. To avoid this from happening a test tube containing the calcium carbonate should be placed inside a beaker containing the hydrochloric acid. They must not be touching, as the reaction would then start. Then the gas syringe will be connected to the beaker. When the reaction is ready to start, the beaker is knocked so that the test tube falls over, consequently causing the reaction to take place as the acid and carbonate would mix. Then when the initial gas is produced it will all be caught as the gas syringe is already in place. The surface area of the calcium carbonate should also have been kept equal. The same number of equally weighted chips should have been used. E. g. all 1g chips. This way the reaction is fair and accurate, as a large surface area will cause the reaction to take place faster. Keeping all the surface areas the same would have kept the experiment fair. However to do this would have taken a long time and we only had a limited amount of time. Another way of keeping the temperature the same would have been to do the experiment in a water bath. This would have allowed us to do the experiment over a few days as well.

Friday, November 15, 2019

Essay --

Currently, there are many discussions regarding society’s views on how a â€Å"good† person should act. For example, in one society going to war may be viewed as a patriotic act, while in another society it may be viewed negatively because it can be seen as an act promoting violence. Furthermore, there are flaws in always conforming to society’s standards because it takes away one’s individuality. These topics are raised in the â€Å"Unknown Citizen† which is a poem by W.H. Auden that describes a man who is viewed by society as a perfect person and also in â€Å"Do Not Go Gently† by Dylan Thomas where he urges society to not accept death and fight it. As a result, there are actions that society declares as being righteous, but it is also important that people follow their own intuition because that way they become their own person. In both the â€Å"Unknown Citizen† and â€Å"Do Not Go Gently,† the authors give an impression of what a virtuous person is. For example, in the work, â€Å"Unknown Citizen,† the unknown man is reported to be perfect in every way and does absolutely no wrong. In fact, it was stated t...

Tuesday, November 12, 2019

Outline for Common Elements in African Societies Essay

I.Introduction a.My speech is on common elements I found in African societies. Among these are animism, Bantu language, and their political organization. b.The importance of this to Islam is that some African states converted to Islam, which brought Africa into a more Eurasian system of trade, and introduced them to new religious ideas, and political organization. II.Animism a.It was common among African societies to believe in Animism, which is a belief in natural forces as gods. It also provided a model for ethical behavior, and well rounded concepts of good and evil. They believed in a creator deity who did their work through lesser spirits. b.Families, lineages, and clans all played important roles; especially the deceased ancestors. They were believed to be a link to the spiritual world. c.Although the beliefs are generally the same in Animism throughout the different societies, their rituals are unique and different from one another. III.Bantu language a.The movement of Bantu speaking people gave a general linguistic base throughout much of Africa. b.The only society that had a non-Bantu language was the Yourba. IV.Political Organization a.African societies were all either a hierarchy, or a stateless society. A hierarchy is an organization in which people are ranked one above the other according to status. A stateless society is a society that is not governed by a state, and there is little authority. V.Conclusion a.In conclusion, Animism and Bantu language were the common elements found in African societies. b.Again, the conversion of some African states to Islam brought Africa into a more Eurasian system of trade, and introduced them to new religious ideas, and political organization.

Sunday, November 10, 2019

Proteomics

Tracing the footprints of Proteomics – To compare and study the techniques used in proteomics since the last decade. Abstract: Proteomics is a study of the proteome of an organism. The last few decades have seen a rapid progress in the development of this field. This paper attempts to compare and contrast the way in which proteomics studies are performed today as opposed to those performed ten years ago and analyse its future implications. The thrust of research while studying biology at a molecular level initially was focused specifically on the genomes of various organisms. As scientists discovered the intricacies of genes and their functionalities, the attention was soon drawn towards the end result of the central dogma of molecular biology, namely, the proteins, produced through translation of RNAs. Therefore, to study the proteins produced in an organism, referred to as the proteome, not just as products of a genome, but more importantly how they interact and bring about changes at the macro level, the field of proteomics has emerged. (1) Proteins play a pivotal role in carrying out various functions in a body at the structural and dynamic levels. Proteins as enzymes and hormones regulate the vital metabolic processes and as structural components provide stability to the cellular components. The knowledge obtained through the study of these systems gives an insight into the overall functioning of the living organisms. In spite of having similar genetic blue prints, the protein expression in various organisms are regulated differently through diverse networks of protein-protein interactions. Hence, proteomics provides an understanding about these regulatory processes and establishes the differences and similarities between the evolutionary pathways of the organisms by grouping them under phylogentic trees. Further, drugs can be developed for specific diseases by designing structural analogues of proteins responsible for diseased conditions after elucidating their structures, which can then up or down regulate metabolic processes. Thus, the study of proteins plays an essential part of researches carried out in other related fields of study such as developmental and evolutionary biology and drug designing. (1)(2) Since the invention of the 2-Dimentional Gel Electrophoresis in the 1970s, which is considered to be the stepping stone of modern day protein studies, scientists have been constantly striving to develop new and potent methods to study proteomics. Thus, this paper is an attempt to identify and compare these techniques which have been used and improved over the last decade. The popular and preferred procedure to study the proteome of an organism comprises of three major steps, isolation, separation on 2-D gel and analysis through a mass spectrometer. Most of the improvements revolve around this basic protocol. 2-D gel electrophoresis was one of the first methods which were used to analyse the proteome of an organism. In this technique, the protein is separated on the basis of its charge and size. The proteins are first separated on the basis of their different charges in the 1st dimension, following which they are separated on the 2nd dimension on the basis of their molecular weight. The gel or map provides a graphical representation of each protein after separation and hence they can be distinguished individually. However, the reproducibility of the results obtained through such an analysis has not been satisfactory. Till date there are constant efforts being made to improve the efficacy of this technique, such that a large number of proteins could be separated at the same time. The first 2-D separation which was carried out by using the electrophoresis buffer and starch gel, the improvements which followed gave rise to the foundation of modern day 2-D separation, which was combining two 1-d techniques involving separation on the basis of pH using isoelectric focusing (IEF) and using SDS-Page for separation on the basis of molecular weight after the samples have been prepared specifically using various reagents such as Urea (as a chaotrope to solubilise) and DTT (to break di-sulphide linkages without fragmentation into peptides), in a suitable buffer (3). Further, for certain segments of proteins which were hydrophobic in nature, like those found in the cell membrane, it was discovered that special reagents such as thiourea, sulfobetaine and tributyl phosphine which are classified as chaotropes, surfactants and reducing agents respectively, assisted their solubility during sample preparation before running them on the gel. Another notable extension of 2-D separation was the use of IPG strips, which had different pH gradients. These strips were made available commercially and drastically contributed to the convenience of the technique. Also, experiments were carried out using a number of such strips to increase the range of pH, hence successfully accommodating a large number of proteins(4). Nevertheless, such a method, although successful, was human-error prone and hence the results on the varied from each other in majority of cases. To overcome this, a number of replicates of the gel had to be prepared and therefore demanded a lot of labour. To overcome this barrier, the differential gel electrophoresis technique DIGE was developed. In this method, the proteins are labelled with fluorescent dyes prior to electrophoresis. The fluorophores are joined via an amide linkage to the amino acid lysine and therefore the proteins can be resolved together on the same gel through distinguished patterns of fluorescent emissions (5). Further advancement of the standard 2-D gel analysis was to incorporate automation to the technology, however the room for automation to analyse the results was limited due to the inability of a computer to distinguish between the different patterns. Differentiating a spot of protein on a gel, its intensity and to separate it from a background still remains an overwhelming task for the computer. The next step in proteome analysis is protein identification using mass spectrometry (MS). One of the most compelling problems of using MS to study biomolecules such as proteins was the inability to obtain ions of sufficiently large size which would effectively lead to their identification. Since the development of Electron Spray ionization and MALDI (Matrix assisted Laser Desorption Ionization) this drawback of MS was overcome and today the combination of these ion sources with different mass analysers e. g. MALDI-TOF/TOF, ESI Q-TOF and ESI triple quardrupoles are used widely in proteomics. Identification of a protein is carried out through a process referred to as peptide mass fingerprinting (PMF). In this technique, proteins that have been separated on a 2-D gel are excised and digested into peptides using proteases such as trypsin. The digested peptides, when subjected to study in a MS, give a characteristic m/z spectrum. The protein can be indentified when this data correlates to the data in protein databases; compared using softwares based specific algorithms. However, to extrapolate a proteins role in metabolism, it is also necessary to identify how the protein is modified after translation. Post translation modification plays an important role in acting like a regulating switch; modifications such as phosphorylation play an important in processes such as cell signalling. The main drawback while analysing a phosphorylated protein through MS was its signal suppression. To rectify this issue, high performance separation techniques such as HPLC were conjugated with the MS; LC-MALDI-MS is an example of such a combination (6). Further extension of the protein mass fingerprinting was the development of shotgun proteomics, to specifically do away with the disadvantages of a standard 2-D gel analysis. This technique is based on separation of peptides obtained after protease digestion, using multidimensional chromatography. It is necessary that the two dimension of this multidimensional separation done using chromatography are orthogonal in nature, i. e. using two different properties of a protein similar to a 2-D gel separation which uses pI and mass. Separating proteins using reversed phase, based on hydrophobicity, and Strong cation exchange, using the charged state of the peptides is an example of separation in two dimensions. Although the PMF approach provided a successful identification process to recognize the proteins present in a proteome, it was also necessary to study the changes in protein expression in response to a stimulus. To achieve this, the technique call the ICAT was developed which protein mixtures from after isolation were modified such that they can differentiated on the basis of mass from one cellular location to another. In ICAT, this modification is done using a cysteine with an isotope labelled biotin tag. Today, the efforts to develop new technologies are directed towards automation in sample preparation and effective interfacing with other techniques. Interfacing has been achieved more successfully with ESI than MALDI owing to its ability of operating with a continuous flow of liquid (7). Sample from organisms contain thousands of proteins, to effectively separate certain important proteins such as disease biomarkers from this mixture, is a highly demanding task. Further, effective proteolytic digestion can be challenging when the proteins of interest are present in low quantities. Therefore, before a sample of protein can be effectively analysed there are a number of steps to be performed which are prone to human error and are laborious. The development of Micro-fluidic system as an interface with the mass spectrometer such as ESI provides the option of automating this process and hence making proteome analysis more effective less time-consuming. Therefore, such a chip based technology has a clear advantage over the traditionally used methods due its improved probability of obtaining the protein of interest, reduced consumption of reagents and accelerated reaction time. The micro fluidic chips can be directly coupled to an ESI- MS using a pressure driven or electro-osmotic flow. Thus, such a system where there is a direct interface is called an on-line setup. On the other hand, such a setup cannot be achieved in MALDI where a mechanical bridge is created between the micro-fluidic chip and the Mass spectrometer. The first step of a proteome analysis, i. e. sample purification is carried out using a hydrophobic membrane integrated into an inlet channel of a polyimide chip. Separation of proteins from the sample can be achieved either using a capillary electrophoresis (CE) or a liquid chromatographic (LC) method. CE is usually preferred over LC due as it provides a faster separation and can be coupled to an electric pump. Proteolytic digestion is carried out on the solid surface of the chips, where the enzymes are immobilized. Thus, such a chip provides a platform for the automation of the initial steps of a proteomic study, and more studies are still being performed to increase the efficacy of this approach (8). To conclude, over the last decade, there has been a rapid progress in the techniques used to study proteomics. The direction of progress has also shed a light on the importance of proteomics and the implications if would have in the coming years. Studies on evolution have benefitted a great deal with the development of techniques like ICAT which enhances quantitative and comparative studies of the different proteomes. In the field of medicine and drug discovery, the application of these techniques, paves the road for discovery of novel biomarkers for specific diseases in a quicker and less complicated manner. Further, it would also assist vaccine development by identifying specific antigens for a disease. The developments of micro-fluidic chips have opened the door for new diagnostics techniques by characterizing effectively the protein responsible for a diseased state. Such an approach has already been employed to study the proteins produced in the body in a cancerous state. Therefore, as more researchers and academics adapt these with these applications, many more improvements would soon evolve. References: 1. Anderson, L. , Matheson, A. and Steiner, S. (2000). â€Å"Proteomics: applications in basic and applied biology. † Current Opinion in Biotechnology Vol: 11:pp. 408–412. 2. Pazos, F. and Valencia, A. (2001). â€Å"Similarity of phylogenetic trees as indicator of protein protein interaction. † Protein Engineering Vol: 14: no 9: pp. 609-614. 3. Klose, J. (2009). From 2-D electrophoresis to proteomics. † Electrophoresis Vol: 30: pp. 142–149. 4. Herbert, B. (1999). â€Å"Advances in protein solubilisation for two-dimensional electrophoresis. † Electrophoresis Vol: 20: pp. 660- 663. 5. Alban, A. , David, S. , Bjorkesten, L. , Andersson, C. , Sloge, E. , Lewis, S. and Currie, I. (2003). â€Å"A novel experimental design for comparative two-dimensional gel analysis: Two-dimensional difference gel electrophoresis i ncorporating a pooled internal standard. Proteomics Vol: 3: pp. 36–44. 6. Reinders, J. , Lewandrowski, U. , Moebius, J. , Wagner, Y. and Sickmann, A. (2004). â€Å"Challenges in mass spectrometry based proteomics. † Proteomics Vol: 4: pp. 3686–3703. 7. Swanson, S. and Washburn, M. (2005). â€Å"The continuing evolution of shotgun proteomics. † Drug Discovery Today Vol: 10. 8. Lee, J. , Sopera, S. and Murraya, K. (2009). â€Å"Microfluidic chips for mass spectrometry-based proteomics. † Journal of Mass Spectrometry Vol: 44: pp. 579–593.

Friday, November 8, 2019

Nicaragua1 essays

Nicaragua1 essays Have you ever wanted to go to a place during our winter season that is warm or hot most of the year? Well, most people choose Florida, or California. But, why not go out of the country this winter and try the largest country of Central America, Nicaragua. I did lots of research on Nicaragua, and I hope you learn as much as I did. To begin my report, I will give you some brief history. The first inhabitants of Nicaragua were the Nicaro Indians. This way of life was blended with Spanish settlers when they first came. The name of this tribe was from a great Indian chief, whose name was also Nicaro. This chief was so famous that the country of Nicaragua was also gotten from his name. Next, I will tell you about the land of Nicaragua. It is located in Central America, and is the largest country there. It is on the continent of North America. Nicaragua is 50,193 square miles (130,000 square kilometers). Honduras borders Nicaragua in the north, and it is bordered by Costa Rica on the south. There are two oceans that border Nicaragua. On the east, there is the Carribean Sea and on the west is the Pacific Ocean. Nicaragua has many different types of land forms. There are mostly volcanoes, some active, behind the coastal plains and along the Pacific border. The active volcanoes cause some danger to the coastal cities, but there haven't been any serious accidents. The largest volcano in Nicaragua, the Santiago Volcano, lies south of Nicaragua's capital city. Lots of steam rises from the little holes that surround the volcanoes. East of these volcanic regions are the Central Highlands. This part of Nicaragua is rainy and has some evergreen and deciduous forests dotted around. The forest's floors are flat, not hilly like some other regions. Very few people live in this forest-like place. There are also some lakes in Nicaragua. One lake, Lake Nicaragua, is the largest one in Nicaragua and Central America. The other lake ...

Tuesday, November 5, 2019

Islamic Mullah

Islamic Mullah Mullah is the name given  to teachers or scholars of Islamic learning or the leaders of mosques. The term is usually a mark of respect but can also be used in a derogatory manner and is primarily used in Iran, Turkey, Pakistan, and the former Soviet republics of Central Asia. In Arabic-speaking lands, an Islamic cleric is called an imam or Shayk  instead. Mullah is derived from the Arabic term mawla, which means master or the one in charge. Throughout Southern Asias history, these rulers of Arabic descent have led cultural revolutions and religious war alike. However, a mullah is general a local Islamic leader, although sometimes they rise to national prominence. Usage in Modern Culture Most often, Mullah refers to Islamic scholars well-versed in the sacred law of the Quran, however, in  Central  and  East Asia, the term mullah is used on a local level to refer to mosque leaders and scholars as a sign of respect.   Iran is a unique case in that it uses the term in a pejorative manner, referring to low-level clerics as mullahs because the term derives from Shiite  Islam wherein the Quran casually mentions mullah multiple times throughout its pages while Shia Islam is the dominant religion of the country. Instead, clergymen and religious leaders use alternative terms to refer to their most respected members of the faith.   In most senses, though, the term has disappeared from modern usage except to mock those who are overly devout in their religious pursuits - a sort of insult for reading the Quran too much and assuming oneself the Mullah referred to in the sacred text. Respected Scholars Still, there is some respect behind the name mullah - at least for those who regard those well versed in religious texts as mullahs. In these cases, the astute scholar must have a firm understanding of all things Islam - especially as it pertains to the contemporary society wherein the hadith (traditions) and fiqh (law) are equally important. Oftentimes, those considered to be mullah will have memorized the Quran and all of its important teachings and lessons - though often times throughout history uneducated common folk would misname visiting clerics mullahs because of their vast knowledge (comparatively) of the religion. Mullahs can also be considered teachers and political leaders. As teachers, mullahs share their knowledge of religious texts in schools called madrasas in matters of Shariah law. They have also served in positions of power, such as the case with Iran after the Islamic State took control in 1979. In Syria, Mullahs play an important role in the ongoing conflict between rival Islamic groups and foreign adversaries alike, valuing the protection of Islamic law while staving off Islamic extremists and attempting to restore democracy or civilized form of government to the war-torn nation.

Sunday, November 3, 2019

Program and culture architecture class Research Paper

Program and culture architecture class - Research Paper Example Communication theory can fit well in the architectural industry because of the industry is characterized by various personnel. Dainty, David and Michael (26) note that it will be difficult for people in any field to operate if they cannot find a commonly approved modus operandi to underline their work activities, communication is essential to the field of architecture. Much the same way, architectural field cannot be successful without effective communication. The dynamic patterns of involvement in the architectural field effectively present communication challenges. So, without effective communication, it would be very difficult any construction company to effective achieve its goals. I have adopted this blend of various cultural elements because a range of cultural diversity characterizes this country, Indonesia. Depending on where you are born and bled, you might fiend yourself blending up with other groups of people with their own cultural

Friday, November 1, 2019

Reading Respond#3 Essay Example | Topics and Well Written Essays - 250 words

Reading Respond#3 - Essay Example U.S, and of the armed forces of the numerous states, when given the actual service of America and commission all the service personnel of the United States (The Founders Constitution 1). The separation of war powers within the U.S Constitution does not appear so uncertain. While the President is given some exclusive authorities (Straub 1-2), the immensity of the authority to take the country to war depends on Congress (Kinkopf 2). According to U.S. Constitution, there is separation of powers of war. With Congress having the power to proclaim war, select and sustain the armed forces, and manage war funding (Article I, Section 8). At the time the Constitution was outlined (Kinkopf 2), the framers evaluated the singular willpower of the Executive against the Legislature’s consultative function, whose components would ultimately carry the cost of battle (The Founders Constitution 1). The ultimate responsibility for any military engagement is held by the congress. This is clear as it is supported by the Supreme Court. The Supreme Court has been fast to remind the people that, where overlaps in the authorities given by the Constitution prevail, reverence goes to Congress. This is a clear declaration of Supreme Court that when Congress, acting in the vast aspects of overlapping authority, tells the President no, the President ought to comply (Kinkopf 2). Straub, Steve. Alexander Hamilton, Federalist Paper #69, On Command of the Army and Navy. On March 21, 2011. Accessed from

Wednesday, October 30, 2019

The effects of Behaviour Management on Teaching and Learning in Essay

The effects of Behaviour Management on Teaching and Learning in Secondary Education - Essay Example It has been fundamentally inspired by this virtue of behaviour management that it has today emerged as one of the major elements adopted by teachers in the pedagogy education system with the intention of improving the behaviour of learners (Rogers, 2007, p. 1-27). Notably, as pedagogy deal with young minds which are again attributed with high instability and curiosity, making the learners focused on a particular subject becomes a noteworthy challenge. Hence, teachers can be benefitted by obtaining better control on the behavioural traits of the learners which can assist in motivating the students to enhance their behavioural skills and consequently, build their future career prospects. However, the application of behaviour management initiatives is subjected to various factors among which the learning environment is often argued as one of the most crucial elements (Fields, 2004, p. 4-8). As argued by Rogers (2007, p. 1-27), an effective learning environment needs to be developed with the aim of conveying the rights as well as the responsibilities that are necessary for generating better disciplined school and classroom atmosphere and therefore implementing effective behavioural management strategies. It is in this regard that teachers, when applying the theories of modern pedagogy, attempt to introduce as well as execute certain developing and disciplinary programs for the purpose of motivating the learners to develop behavioural traits, appropriate for their promising future (Rogers, 2007, p. 1-27). As can be observed, the major objective of behaviour management is to ensure that the learners are able to acquire appropriate qualities and knowledge in accordance with which they will be able to determine the differences between pessimistic and optimistic influencing factors. Along with developing the behavioural skills of learners, it is also essential that the teachers are equipped with effective behavioural factors in order to ensure that they are able to impa rt appropriate educational knowledge and develop their skills successfully to the desired level. Additionally, it has also been often argued that with the help of behavioural management, teachers can develop the perceptions as well as influence the conscience of the learners which can further contribute towards minimising the involvement of those learners in conducting any sort of anti-social activities (Rogers, 2007, p. 1-27). In other words, with the help of behavioural management, learners’ behavioural traits can be developed in a more responsible as well as conscious way. With this concern, this paper intends to discuss the importance of behaviour management. Moreover, the effects of behaviour management on teaching as well as learning will be taken into concern. In this regard, the effects of behaviour management will be analysed by considering certain important reports like Steer and Taylor Reports among others. Focus of Behaviour Management In the context of education system, behaviour management is often viewed to be an important practice and discipline for the development of positive attitudes, skills and behaviours of students or learners. This particular aspect is recognised to be dependent on various values as well as aims according to which the learning programs and policies are formulated

Monday, October 28, 2019

Relation Between Language Power And Dehumanization English Literature Essay

Relation Between Language Power And Dehumanization English Literature Essay There are implications of limited health care, as Winstons varicose ulcer on his right ankle remains treated throughout. Meanwhile Winston talks of the cheap quality of the vicory cigarettes, the only cigarettes available. The fact that the only attainable alcohol,is gin, and the inclusion of food rationing, also resembles an air of restriction, through a dehumanizing lack of variety. Language plays a vital part in this process of repression, as it is language, through propaganda that enforces it. For example, the telescreen uses manipulative language, to subliminally brainwash people during the two minutes hate. Though the false representation of Goldstein and his rapid polysyllabic speech, as he delivers his usual venemous attack upon the doctrines of the Party an attack so exaggerated and perverse that a child should have been able to see through it, and yet just plausible enough to fill one with an alarmed feeling. (ch1) The party uses hateful language to manipulate them into a frenzy, to a point where they advocate against Goldsteins promotion of feedom of speech, freedom of the Press, freedom of assembly, freedom of thought. To enforce this manipulative repression, further restriction shows that it is illegal for the telescreen to be switched off, even inner party members are only allowed to switch it off for half an hour at a time. Therefore manipulative l anguage empowers Big Brother, so that he can dehumanize the non-proles of Oceana. The telescreen is also used as a tool for repression through recording peoples spoken language and monitoring their lingual thoughts. Winston notes, It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen through the fear of commiting face crime, if an unfavourable expression appeared on a persons face, whilst in front of the telescreen. This is an example of how language itself is repressed, for the benefit of the party. With no freedom of expression, and a sense of paranoia surrounding the use of language, Big Brother is not under threat. The giant big brother is watching you, posters, plastered throughout Oceana, enforce this empowerment through paranoia, that the government holds over Oceana. The monitoring of language, propaganda posters, and telescreens prevents revolution, and therefore language becomes repressed as a result. Along with the fear of commiting crimes through spoken language, there is fear surrounding freedom of language in thought. The thought police, remain a terrifying organization for the residents of Oceana, with the danger of torture and imprisonment if their language, through their thoughts, consist of an anti-party stance. The fact that they watched everybody all the time, installs a sense of paranoia, that makes people mentally restrict their freedom of language, and vocabulary, in order to avoid being targeted by the thought police. To help society keep repressed, and to discourage against the free use of language, there is the invention of Newspeak. As the official language of Oceana, it concentrates upon a narrowing vocabulary, eliminating words concerning freedom and rebellion. As Syme muses Dont you see that the whole aim of Newspeak is to narrow the range of thought?, this directly relates to power. The minimising of language vocabulary, maximises power, with the hope that if one cannot describe freedom, and rebelling against the party, then they prevent themselves from wanting it, or thinking about it. As part of Newspeak, we are introduced to the notion of Doublethink, a process of holding two contradictory beliefs in ones mind simultaneously, and accepting both of them. (ch3) This method is a manipulative way of confusing a persons perception of concepts such as freedom. The party uses this to their advantage as part of their slogan, freedom is slavery. This subliminal brainwashing through contradictive similes confuses the inhabitants into thinking that the opposites are true. The method of doublethink, is used not only in the partys slogans but is used as a tool to boost ignorance, and as a result weakens the chance of big brother getting overthrown. For example, through reporting false events such as how Oceana had always been war with Eastasia, boosts patriotism, whilst forcing inhabitants into ignorance. Through the restriction of truth in language, and spreading of false information, Oceanas inhabitants are dehumanized. This solidifies the parties power as noone challenges these false reports, as they believe that ignorance is truth. Although Winston is part of the party himself, he is still repressed by them. The ironic ministry of truth where he works, is representative of a tolertarian power gone mad. Again, language through lies is used to test and push the ignorance of the people. Winston notes how he has to destroy parts of the past, to the point that history is changed in a continuous process of alteration(ch4). Meanwhile the simple fiddling of statistics, such as the covering up of chocolate ration decreasing from 30 grams to 20 grams, shows how powerful the manipulative newspeak and doublethink is. Winston notes there were demonstrations to thank Big Brother for raising the chocolate ration to twenty grams a week. only yesterday, he reflected, it had been announced that the ration was to be reduced to twenty grams a week. Was it possible that they could swallow that, after only twenty-four hours? Yes, they swallowed it. The ministry of plenty, alas, controlled shortages. Even though people are getting less food and supplies than ever, Winston becomes part of the lingual manipulation process which makes them thank big brother for what they have. As general perceptions are warped by the party through language, so is the act of love. Initial paranoia, which evolves into anger and an urge to seek out anyone who is against the party, is inflicted upon the children of Oceana from an early age. Through this they are dehumanized, as they become incapable of loving their parents and are more than willing, to turn against them, as junior spies. An example of this is when we see Parsons turned in to the party by his children. Through the language, of the sternly named anti sex league, the party uses its power to enforce sexual repression and channel it into anger against the parties enemies. Through anti-sex language propaganda, the party gains power, yet dehumanizes humans, preventing them from a natural activity. This repression of sex even warps the resistant mind of Winston, as he says to Julia, the more men she has been with, the more that he loves her. Here, even though rebellion against the party, his idea of love is ruined. Literature itself is restricted, in fear that its language will promote revolutionary thoughts. One man leaves the word God, in a translation of a Rudyard Kipling poem, and is put in prison as a result, which shows the tension of how restriction of language is essential to power. Along with food, sex, alcohol and cigarettes, literature is seen as a threat. The fact that Winston wakes up from a dream with Shakeapeare on his lips, emphasises this restriction, as he expresses his yearning for culture and literature. The restriction of books is noted in 1984, as we see that no one is reading. Syme note that by 2050, Chaucer, Shakespeare, Milton, Byron theyll exist only in Newspeak versions, not merely changed into something different, but actually changed into something contradictory of what they used to be, establishing the parties aim to destroy and manipulate language in literature for their own needs. The fact that Winston feels extremely guilty, when he writes in a diary (writing is not permitted), and even worse, writing words against the party, which makes him contemplate suicide, shows the power the party has over him. This shows how the restriction of language, through taking away the freedom to write, is dehumanizing, as it prevents the expression of feeling. Conc The only people free from the party are the proles. They are the only residents who have free expression of words, however, they are also dehumanized themselves, through their lack of civilisation and power. Part 2 Whilst language is changed due to a totalitarian element concerning dehumanization in 1984, the language in Naipuls one out of many, represents the struggle between power and dehumanization, under the context of class and social hierarchy. I am going to explore these links through observing the dialogue and attitude of the characters in the text, alongside the tone of the narrator. There is a notable link that language has with power, when it comes to social hierarchy. Someone could become dehumanized, the further they move down the social ladder. The language exchanged between the narrator, Santosh, and the characters in the extract is indicative of this. Santosh speaks of how he relied on the importance of his employer, Sahib, for his own respect and security, and their relationship begins at a seemingly equal level. Sahib warns Santosh that Washington is not Bombay, and that he should be aware of the exchange rate between rupee and dollar. However as soon as they arrive in Washington, the social gap between both the characters widens. Sahib first speaks down to Santosh, saying he is only a domestic, and in front of the officials, he pretends to be horrified at Santoshs natural behaviour on the plane, I cannot understand why your behaviour has already gone so much out of character. Through talking down to Santosh, Sahib commands social power and begins to deh umanize him in front of other people, in order to command respect. When it comes to money, Sahib manipulates Santosh through choosing his words carefully in offering him a raise. The ignorant Sahib, thinks that the raise, and fortnights pay in advance, is more than generous, and like the inhabitants of Oceana over the chocolate ration, is manipulated into being thankful for this. When santosh realises the money isnt enough to live off, he wants to leave. However Sahib uses strong language to threaten him if I send you back now, you will have to work for six or seven years without salary to pay me back. In this way Sahib gains power. Santosh observes that his freedom has been taken away, I understood. I was a prisoner, as he realises the context of the verbal threat dehumanizes him, and makes him almost a slave to Sahib. Of course, Sahib feels himself, dehumanized in the extract, by the Americans. When Santosh has to sleep in a cupboard, he feels that he shouldnt be treated that way and takes it personally, assuming that the government had assigned Santosh this room, just because they are Indian. A paranoid Sahib claims some enemy in the government has done this to me, they think that we all live in cupboards in Bombay. Sahib also feels dehumanized when one of his guests comments how he brought back an ancient stone head from India, tipping the tour guide to keep quiet. Offensively, the guest says, if I had a bottle of whisky he would have pulled down the whole temple for me. Santosh finds comfort in language through talking as says he told stories and smoked, with his friends in Bombay. The tailor warns Santosh that Americans wont wont sit and talk with you in the evenings, which is true, as he becomes a recluse when he moves to Washington, staying in the apartment and watching t.v. This removal of social interaction through language dehumanizes Santosh as racial and foreign language barriers encourage this. To further this isolation, Santosh is talked down to by a number of people, from the flight attendant who spoke roughly to him, to the woman in the cafà © cant you read? We dont serve hippies or bare feet here. The Hubshi girl teaches Santosh English me black and beautiful then calls policeman a pig, using Santoshs naivity to make an impression on him through power of language. Powering him to have prejudices against the police and dehumanize them. Interestingly we see that the power of language and manipulates Santosh into becoming vain. At the beginning, despite being look own upon by the air hostess, he didnt care what the girl said or did, after a series of incidents where people use language to make him inferior, he begins to dress better and became choked with shame at his old ways. The snobbish language made him now wear shoes. The television, in a vaguely similar fashion to the telescreens in 1984, has used language and imagery to manipulate him into how to behave in society. He notes I became obsessed with my appearance and began comparing himself with actors on t.v. Interestingly, during Santoshs predicament, concerning how to get his green card, he commits the most dehumnizing act in the whole extract. Through the green card he gains power, however to gain this power he has to use language to falsely tell the Hubshi girl that he likes her and wants to marry her. This is not only dehumanizing for him, having to marry and live with a woman he doesnt like, but dehumanizing for her, as he does not love her. But then talks down I dont see how you will manage in Washington foreign exchange santosh! Foreign exchange! Boss again speaks down to him when he says in front of the officials Threat- you dont only represent your country, you represent me Officials-does he always travel with his condiments- not talking to him directly- conveys an air of dehumanization. Santosh looks down on the hubshi at first- language is snobby, and dehumaizes them in our country we frankly do not care for the hubshi but then uses language to feel emphathy for them even in the mornings the men were drunk Santosh they can just look at me and see I am dirt Sahibs guests are offensive if I had a bottle of whisky he would have pulled down the whole temple for me- dehumanizing Indians. they are malicious people. Power of hubshi- burning city down Priyas attitude if you cant beat them, join them. I joined them. They are still beating me When moves in with priya I felt I was earning my freedom Power of green card- immigrants they were always about to get green cards, or they had been cheated out of green cards Priya and santhosh equal the American way, man to man I was good looking; I had lost my looks. I was a free man; I had lost my freedom Power of haggling- language- I couldnt stay on for less than a hundred and twenty five- santosh now has power. I have made some corrections in the second bit, but gave up because there are so many little ones, such as grammar and spelling. Also overuse of the name Santosh, the word dehumanizing and a tendency to repeat. However it really just needs tidying up a bit and making a bit more coherent as in the first half. If you wrote the first half, completely, yourself, I would say it was one of the best pieces you have written. I asked if you had written it, because I was shocked that there were hardly any mistakes in it and it appeared balanced and coherent.

Friday, October 25, 2019

Lord Of The Flies :: essays research papers

Lord of the Flies Ralph   Ã‚  Ã‚  Ã‚  Ã‚  Ralph was a leader and had a good heart throughout the novel. He took action as soon as he set foot on the island. He believed in democracy instead of dictatorship when he decided to take a vote to choose who would be leader instead of appointing himself to be the leader without the consent of the other castaways. His leadership, cleverness and quick thinking made him a remarkable leader.   Ã‚  Ã‚  Ã‚  Ã‚  Firstly, Ralph’s leadership was important because he organized everything right after he was elected. That shows that he knew what he was doing. He established an organized way of communication with the conch. Ralph was assertive when he spoke like when he said, â€Å"No. We’re having a meeting. Come join in.† He was also a fair and just leader like when he won the election and he saw that Jack was upset he said â€Å"The choir belongs to you, of course† and â€Å"Jack’s in charge of the choir. They can be—what do you want them to be?† He knew his role and did what had to be done.   Ã‚  Ã‚  Ã‚  Ã‚  Secondly, Ralph’s cleverness protected them. Ralph was a thinker he thought of ways to improve the conditions on the island. â€Å"There’s another thing. We can help them to find us. If a ship comes near the island they may not notice us. So we must make smoke on top of the mountain. We must make a fire!† this type of cleverness shows that he is thinking maturely and wanting to be rescued like an adult instead of thinking like a normal 12 year old and just wanting to playing games. He also wanted to keep track of everyone so he told Piggy to get names, â€Å"Piggy get the names of all the boys.†   Ã‚  Ã‚  Ã‚  Ã‚  Lastly, Ralph was a quick thinker when everybody was against him. He made quick and decisive decisions when it really mattered. He thought everything through, even aloud â€Å"Think,† when he executed his decisions. When he was evading the savages he used hit and run tactics, which helped diminish his opposition. He even found a hiding place that he saw fit to hide in after he rationalized how effective it would be. Lord Of The Flies :: essays research papers Lord of the Flies Ralph   Ã‚  Ã‚  Ã‚  Ã‚  Ralph was a leader and had a good heart throughout the novel. He took action as soon as he set foot on the island. He believed in democracy instead of dictatorship when he decided to take a vote to choose who would be leader instead of appointing himself to be the leader without the consent of the other castaways. His leadership, cleverness and quick thinking made him a remarkable leader.   Ã‚  Ã‚  Ã‚  Ã‚  Firstly, Ralph’s leadership was important because he organized everything right after he was elected. That shows that he knew what he was doing. He established an organized way of communication with the conch. Ralph was assertive when he spoke like when he said, â€Å"No. We’re having a meeting. Come join in.† He was also a fair and just leader like when he won the election and he saw that Jack was upset he said â€Å"The choir belongs to you, of course† and â€Å"Jack’s in charge of the choir. They can be—what do you want them to be?† He knew his role and did what had to be done.   Ã‚  Ã‚  Ã‚  Ã‚  Secondly, Ralph’s cleverness protected them. Ralph was a thinker he thought of ways to improve the conditions on the island. â€Å"There’s another thing. We can help them to find us. If a ship comes near the island they may not notice us. So we must make smoke on top of the mountain. We must make a fire!† this type of cleverness shows that he is thinking maturely and wanting to be rescued like an adult instead of thinking like a normal 12 year old and just wanting to playing games. He also wanted to keep track of everyone so he told Piggy to get names, â€Å"Piggy get the names of all the boys.†   Ã‚  Ã‚  Ã‚  Ã‚  Lastly, Ralph was a quick thinker when everybody was against him. He made quick and decisive decisions when it really mattered. He thought everything through, even aloud â€Å"Think,† when he executed his decisions. When he was evading the savages he used hit and run tactics, which helped diminish his opposition. He even found a hiding place that he saw fit to hide in after he rationalized how effective it would be.

Thursday, October 24, 2019

Love Sex and Relationships Essay

Sex, and Lasting Relationships by Ingram â€Å"Love is the state in which man sees things most widely different from what they are. † -Nietzsch Many times we just forgo some of the warnings of love and we fall into infatuation. Our love is biased, meaning we don’t let time indicate the growth of our love, we often forget that love is centered in the partner, that we need to grow everyday in order to have a better relationship with God and each other. Sometimes we fall in love with two people, when true love focuses on one, we often follow our flesh. Many times we feel insecure about our partner, when in true love we don’t even have to think about deceive. We very often try to skip the obstacles instead of fighting together, we let distance become an obstacle, is it real love? In general we are a generation of the present, when getting into a relationship; we forget that an important thing is to think about the future together, driven by our media and our sex centered society it is really easy to get overwhelmed by a miss leaded definition of love. ove has three main components: those of the spirit, mind, and body. Ingram calls these agape, phileo, and eros: selfless love, a beautiful friendship, and physical love. Interestingly, and according to what I see in our society and in what is portrayed in the media†¦ love is eros, more and more erotic scenes, more and more body involved, less talk more action, what is that? Our societies conception of love, seemingly, has fallen into a selfish flesh satisfying â€Å"Loveâ € . I mean it is well understood that love comes first through our eyes, and that this physical attraction is a very important part of a relationship, but love cannot stand on it itself, if we are driven only by eros, we are more averse to fall into sinning by cheating on our partners, our view of Though to help eros, there is â€Å"phileo†, or companionship. This love is the kind of love needed to get to know each other well, sometimes we are just rushed by our emotions and we step into a relationship we did not mean to get into. Firstly we need to spend time with each other, but spending time itself is nothing, unless we share our lives openly, and freely. We need to have this companionship were we play games, we share our happiness and our sadness, what pastors often call quality time. By listening to my friends, those who are in a relationship, I have noticed that all the talks they have with their partners (be them couples or just friends), are very superficial, arrogant and self-centered, meaning there is also a third component for love to be fulfilled. The third component of love is the so called â€Å"Agape†, the selfless love, the not infatuated. And I really like how the author puts it â€Å"giving others the most when they deserve the less†. And better defined in 1 Corinthians 13. Are we in love or infatuated? â€Å"Indeed, steamy starts do not promote our best thinking. Intense emotions often block us from taking a careful and objective look at ourselves, the person we are dating, and the relationship we are forming.

Wednesday, October 23, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. These three sensors are placed in three different threshold levels and are connected to the controller.If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instruction s given by the developer.This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very sp ecific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM p latform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer.All the featu res and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a progra m, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator.Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits a nd other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arr angement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass a lso rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection') and overheating (‘thermal protection'). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well.A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. Th e 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collecto r is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strappe d to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Al though polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the inter rupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least signifi cant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051’s serial communication UART circuitry divides the machine cycle f requency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the p in RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±3 0-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem inte rface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber.The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts.Subscriber carries the Mobile Station. The Base St ation Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific termina l. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that d efine a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User ManualTemperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the m odem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic]Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrode s and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) con tacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered:SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the gr ound. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses th e polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a R egulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows a utomatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAP TER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded app lication The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source fil es are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å"); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 && L2==1 && L3==1 && L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0);Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 && L2==0 && L3==1 && L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³);TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 && L2==1 && L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUP PLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – – – – – – – — – – – – – – – – – – – – – – – – –  œ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H