Monday, September 30, 2019

The teens old enough to drink had some beers

To the Editor, When I read the letter about increasing the age at which people can buy alcohol, I felt I had to write.   I definitely disagree with this idea! Just because someone cannot buy alcohol doesn’t mean that person can’t get drunk.  Many people between 18 and 30 are responsible enough to buy alcohol.   Even if you argue otherwise, teenagers and young adults can still get alcohol–and one way is the very â€Å"responsible adults† argued in favor of.If teenagers are not equipped to handle the effects of alcohol, then neither are those adults.   When I was eleven, I went camping with my parents and some family friends.   The teens old enough to drink had some beers, but stopped when they had a buzz on.   One adult drank so much she made herself sick.   We heard her throwing up in the bushes!   How much more proof do you need that adults are more childish than teenagers?If this law were put to a vote, many people would oppose it.   No t only is it stupid, it is unenforceable– there aren’t enough police officers to monitor all places that sell alcohol, let alone teens and young adults who might buy alcohol!   Current laws prohibiting teens from buying alcohol are fine.   Merchants check identification and refuse service to anyone under 18.Obviously they do a good job, considering how few teens die in accidents every year in comparison with adults.   Looking at the numbers alone, the adults obviously need babysitting, not the kids.It’s not fair to restrict teenagers’ and young adults’ access to alcohol.   It won’t work, anyway, since there are always enough adults who are gullible enough to buy alcohol for kids who ask them or bribe them enough.   Let’s face it: Anne Helmer’s idea is just plain stupid.  

Sunday, September 29, 2019

Catch Us If You Can

With close reference to the novel that you have read, discuss how courage is shown by one of the characters. In the novel â€Å"Catch Us If You Can†, the character who shows courage is Rory. Rory handles challenges with courage. No fear will ever deter him from being separated from his Granda. He had to risk the dangers from being caught as well as other problems that come his way. Firstly, a boy in his early teens, Rory has the courage to take care of his grandfather all by himself.It is not easy for him because he has to balance between school and taking care of his Granda who is getting more forgetful. It is not easy for a young boy to carry such a heavy responsibility. In addition, when they are separated, Rory plans an escape. At times, he feels like giving up, but courage kept him going. He knows he must be strong and brave to withstand the hardship of the Great Escape. He rescued Granda from Rachnadar and never looked back.Then, another example of courage portray by Ror y was when Granda fails to wake up on top of the hill. Rory had to be bravely run for help where he knocks on a stranger’s door. For a young boy to do that is indeed very courageous thing. Throughout their journey going through the escape, I learnt that Rory is indeed very brave. He did not fear the unknown, caring for his aged grandfather while running from the authorities. He showed courage right from the beginning till the end.

Saturday, September 28, 2019

Sentencing, incarceration Essay Example | Topics and Well Written Essays - 500 words

Sentencing, incarceration - Essay Example No matter what ever the purpose of a particular sentencing policy is, the main aim of all policies is to deter future criminal activity. For example: rehabilitative polices are created to educate and change the mental setup of criminals so in future they do not commit crimes. Similarly, in the case of incapacitation, policy makers keep criminals for prolonged period of time because they believe that they can deter crime by keeping criminals of the streets (Ritchie, 2011, p.7). Even in the case of revenge, policy makers make criminals pay heavy amount of fines and even assign corporal punishment with the intent of ensuring that due to the fear of heavy monetary fines, criminals will not commit crimes and punishments such as corporal punishment will deter those who have an intention of committing future crimes. If I would have been in the shoes of a policy maker and had the authority to make sentencing policies, my policies would have been driven by the purpose of deterring crime. My policies would be backed with both forms of deterrence including general as well as specific deterrence. Policies that are made with the aim of specific deterrence are those due to which a criminal is banned or stopped from committing future crimes. To serve the purpose of specific deterrence I would create sentencing policies that would keep criminals for a longer period of time depending on the severity of the crime. Plus I would implement rehabilitation techniques such as providing psychological assistance and education to criminals so their criminal mind set can be altered and they have enough education to pursue careers that would deter them from the path of crime. Similar policies can be applied to serve the purpose of general deterrence; the prolonged period of jail time would be a lesson for upcoming criminals that if they commit a crime they will be banned from the society for a

Friday, September 27, 2019

Nation States Essay Example | Topics and Well Written Essays - 750 words

Nation States - Essay Example processing immediate and untrammeled power over a contiguous territory occupied, in theory, by a population homogenous in speech, culture, and ethnicity. (p. 2) Simply put, capitalism relies on nation-states to maintain local conditions favourable to a culture of capitalist accumulation as well as to help it navigate the economy. The nation state holds the power which assures the creation and reproduction of the capitalist mode of production through a combination of procedures and processes. Hence, the development of capitalism is largely dependent on the progress of the nation-state and the movements within. Depending on one’s standpoint, the role of nation-state in capitalism is either viewed positively or negatively. For instance, Marxist adherents argue that capitalism was an upshot of the English feudalism and that its evolution resulted to a social malady where the sector responsible for the production of goods is protected by the state, to the disadvantage of the labor and the populace in general. There are varying factors in the development of nation-states. Experiences vary from one country to another. For some, nationhood is achieved due to internal developments while for some; it was realized as a result of some crisis which could be external in nature. In the case of the former, it is attained when a movement has succeeded in mobilizing the masses around one common conception of nationhood; while for the latter, political sovereignty is achieved under extraordinary and short-lived circumstances arising from a regional or global crisis rather than strictly internal developments. (Roshwald p. 2) The existence of nation-states has noble objectives. This is what appeals to people within its territory. Constitutions of countries cite these lofty ideals and while there might be some variations, they all bespeak of one important concept and that is identity. According to Martha Cotham et al., the concept of nationalism is similar to that of social

Thursday, September 26, 2019

British Isles Iron Production during the Roman Occupation Essay

British Isles Iron Production during the Roman Occupation - Essay Example The essay "British Isles Iron Production during the Roman Occupation" talks about the evidence concerning the chain of operation in iron production in the British Isles during the Roman occupation. The British Isles were clearly a vital part of the Wealden iron industry having been in operation from pre-historic periods. Considering that its geology that was made up of sandstone Ashdon Beds and clay mad it easier for the extraction of iron. The place was also favorable in that there was enough wood that would be used during the smelting process. Furthermore, the soft sandstones could be carved to form valleys and lakes that would eventually provide water for powering the forges and furnaces. The process of identifying the iron mines depended on the availability of wood used for smelting fuel which was abundant in the British Isles. This was because iron ores were found everywhere in the country and iron quite inexpensive. Britain emerged to be a right place for getting iron which was required for making war machines used by the Romans. The Romans constructed most f the underground mines found in Britain. Iron was mined in open pits as well as underground fields with slaves bearing the weights of the work. After extracting the ore from the mine it was the crushed and washed according to Burnham. Once the iron ore had been mined from the open pits, they had to be cleaned before undergoing further processing. The iron oxide was then left after washing and later was smelted through the bloomery method.

Wednesday, September 25, 2019

Leadership and Management Assignment Example | Topics and Well Written Essays - 1500 words - 2

Leadership and Management - Assignment Example oup Problem Solving: Leadership and Motivation: The performance of different members in a business organization largely depends on the leadership style followed within the organization and the factors that motivate the employees personally. Employees may be motivated either by external factors like wages and rewards or by internal factors like their relationship with their work. Based on the different needs of different individuals, there are three motivational theories that are applicable for business organizations. These are the Maslow’s Hierarchy of Needs, Alderfer’s ERG Theory, and McClelland’s Theory of Needs (Nader n.d.). Maslow divided the needs of humans into five divisions that include their psychological needs, safety needs, relationship needs, esteem needs, and self-actualization. Psychological needs involve the basic needs of an individual like food, shelter, and clothing. Safety needs include security of jobs, a good working environment, and plans fo r pensions and insurances. Relationship needs reflect the need to socialize and have friends and companions around. Esteem needs are those that are more than the basic needs such as need for appreciation and recognition. Finally, self-actualization is the stage where an individual feels the need to pursue further to achieve something for his own. This need may completely vary from one man to another and tend to become individualistic in nature (Nader n.d.). Alderfer’s theory focused on an individual’s need for existence, thus requiring suitable conditions and materials; the need for relatedness that may be achieved through interactions and communications with others; and the need for growth reflected through their achievements and self-actualization. According to McClelland’s theory individuals feel... From the assignment presented by the researcher, it can be concluded that Lee, who was analyzed as the leadership manager of the company proved to be an effective leader as far as finding solution to the problems that were established from the start, such as customer dissatisfaction and employee motivation that was concerned. The researcher analyzed his recommendations and states that instead of ignoring the problem, the leadership manager surveyed and determined that a reward program might prove to be effective to motivate the employees towards effective performance that was lacking in the present situation. The leadership manager also proved to be a responsible leader trying to improve the performance of all the team members such that the organizational goals may be achieved. The proposal for a standardized method of recruitment that was described in the assignment can also be said to be an effective measure suggested by the manager for recruitment of effective people which is othe rwise not achieved through unstructured interview patterns. The researcher then mentiones that understanding the particular needs of employees and hence fulfilling them would be a better option for future improvement and successful work. Moreover, transformational leadership would be recommended in such cases as described in the assignment as it allows to establish better communications between the leader and the employees, thereby improving the relation and move towards more cognitive consensus for problem solving.

Tuesday, September 24, 2019

The Pain And Suffering Of The Voiceless People In Cinema Essay

The Pain And Suffering Of The Voiceless People In Cinema - Essay Example The necessity of resorting to non-verbal communication is indeed apparent in the film, for the obvious reason that the perceived victims in the film are voiceless and powerless. In the absence of words, what is left for them is body language, through dance accompanied by music. The definition of dance as a form of expression that uses bodily movements that are rhythmic, patterned, sometimes improvised, found in every culture and is performed for purposes ranging from the ceremonial, liturgical and magical to the theatrical, social and simply aesthetics (Britannica 2011), relatively connects with the film. The music that was devoid of words and the dances were quite entertaining in the film. The movements were expressive, which was demonstrative of the reflex response of the children when in danger, which is to either flee or let go to hide the fear. The choreography is in support of the desire of the captured children to immediately do something about the negative emotion bottled up inside their system, which they hope to free. The competition in the capital city of Kampala was again entertaining, the excitement can be likened to the much-talked-about worldwide show, â€Å"American Idol.† Through their participation in that competition, they were out to prove that they can be giants amidst the suffering in their real life. The value of the dance however in this film and the beats of the drums, set some limitation concerning the messages that are needed to be said in public, which at times, only words can do. Emotionally, in a personal context for the children, they were able to pretend that everything can be alright, but in general, the hope for help and call for rescue are quite elusive.

Monday, September 23, 2019

The Advancement of the Crusaders and the Church Research Paper

The Advancement of the Crusaders and the Church - Research Paper Example The crusades were a series of wars by Western European Christians to recapture the Holy Land from Muslims, which lasted till late 13th century1. Though there were various subtle factors behind the crusades, the first and the most noticeable one was the aggression by Islamic rulers. A look into the factors behind crusades makes it evident that they, in no way, advanced the cause of Christ because they were against the Christian worldview. The history of crusades As far back as in the third century, Christians used to visit the Hold Lands to see the places of Christ’s life. Though the place was conquered by Muslim rulers, pilgrimages continued without my disruption as Caliph Harun al-Rashid accommodated Christian pilgrims. However, the situation went wrong when the Egyptian ruler of Palestine in the 11th century, known as Hakim, started torturing the Christian pilgrims. He destroyed Constantine’s Church of the Holy Sepulcher and declared himself as God incarnate2. The Tur ks were advancing with enormous power. By 1050, they had a state in Persia and within five years, they reached Baghdad and up to Aegean in Anatolia. Soon Byzantine was defeated at Manzikert and a new sultanate was started at Nicaea. In the year 1071, Jerusalem became a part of the new Seljuk state of Syria. It was in this disorder and anarchy that General Alexius I Comnenus came to power in Byzantine. As already known, there was a split between the Eastern and Western churches. So, Pope Gregory VII found it a good opportunity to unite the Churches by spreading the holy war to Asia. So, he offered to send an army of western knights under his own leadership to Byzantine. Similarly, Pope Urban II offered military help to Byzantine against Turks. Pope Urban II pointed out in his speech at the Council of Clemont in 1095 the hardships faced by the Eastern Christians and the pilgrims to Jerusalem. He declared that God would assist those who would fight for their brothers. Another declarati on was that the sins of those who died in the work of God would be forgiven. Thus, enormous numbers of people joined the Crusade. Seeing the great Crusader armies, Turks surrendered Nicaea without a war. The crusaders advanced through Dorylaeum and soon, Edessa, a strategically important imperial city, was conquered and it became the first crusader state3. Soon, Jerusalem and Antioch were conquered by the Crusaders, and Baldwin of Edessa became the first king of Jerusalem. Within no time, the crusader states grew wealthy with the local resources. Admittedly, it was not the military order of the crusaders that helped them, but it was the lack of unity among the Muslims that allowed the crusader survival there. Soon, the Muslims united and a re-conquest was the result. Thus, in 1144, Edessa was captured by Muslims. At this point, St. Bernard preached the second crusade. As he managed to attract masses, King Louis VII of France and King Conrad III of Germany reached the East in what is called the Second Crusade. However, this time, the Crusade was destined to fail. First lf all, the local lords feared that the newcomers would take away their kingdoms and hence, the newcomers were in conflict with the local lords. Thus, the crusaders failed to conquer Damascus in 1149. The Muslim re-conquest continued undisturbed. Saladin of Egypt was a great ruler who managed to bring Syria and Mesopotamia under his control. By 1183, his brother was the ruler of

Sunday, September 22, 2019

Cultural Resource Management Essay Example for Free

Cultural Resource Management Essay 1. (2pts each) Utilizing the lecture notes from the first day of class, define the following terms: Cultural Resources – Are the sources of culture such as art, heritage, artifacts, and architecture Cultural Resource Management – The main form of archaeology in the USA. It is used mostly by archaeologists to refer to management of historic places based on their archaeological, architectural, and historical interests in compliance with the environmental and historic preservation laws. Mostly salvage or rescue archaeology is conducted. Historic Preservation – A way of preserving historic places, landmarks, and artifacts to protect them from destruction or any other means that may harm them. Historic Properties – Places of historic significance that are protected under the historic preservation act. These can include architecture, such as the Mount Vernon Estate, as well as specific pieces of land themselves, such as Gettysburg. Archeological Resources – Sources that can provide significant amounts of archaeological data such as artifacts and features. It is also something that may provided pertinent information to the archaeological record. 2. (2 pts) What is the function of cultural resource management, and what are the values of cultural resources? The function of cultural resource management (CRM) is to protect historic places based on their archaeological, architectural, and historic interests. A majority of the work done in CRM is salvage archaeology. To put it in better terms they try to salvage as much from a site as possible before construction or other forms of land development destroy it. Cultural resources provide a link to the significant knowledge that can be ascertained from archaeological and significant historical sites. 3. (5pts) The late 19th century witnessed a transformation in the way our nation viewed cultural resources. Provide an overview of private attempts at preservation during the late 19th century. There were many attempts at preservation during the late 19th century. A few that come to mind are that of Independence Hall, Gettysburg and the Mount Vernon Estate. The Mount Vernon Estate was bought by a group of people known as the Mount Vernon Ladies Association for preservation. They fully restored the Estate to its formal glory. A group of concerned citizens established the Gettysburg Battlefield Memorial Association whose purpose was to preserve portions of the battlefield as a memorial to the Union Army that fought here. They eventually transferred their land holdings to the Federal government in 1895, which designated Gettysburg as a National Military Park. In 1872 the city of Philadelphia set aside Independence hall and forever declared it a significant landmark, which in turn led to its restoration. 4. The late 19th century witnessed a transformation in the way our nation viewed cultural resources, and this resulted in the 20th century with the passage of major state and federal legislation directed toward promoting cultural resource preservation. For each of the following provide the following information: Antiquities Act of 1906 (9pts) a. This was the first law passed by the United States government that attempted to protect cultural resources and antiquities, allow the president to decide which resources he deemed worthy of protection, and for excavations to be conducted only with authorized permits. b. This legislation was intended to deal with the protection of significant historic lands and sites, as well as establish rules to limit the destruction and looting of said sites and lands. It allowed the president to decide on the significance of a particular site so that he may allow for its protection through federal means. It allowed excavations to be conducted only by means of obtaining a permit. This was to prevent private excavations and looting. It also made anything that was found on the site to be turned into museum hands for the publics benefit. c. The central theme is the protection and procuration of historic landmarks and antiquities through legal means. Historic Sites Act of 1935 (9pts) a. This act was the first assertion of historic preservation as a governmental duty and helped establish rules and organization for the national parks, monuments and historic sites. b. It gives a wide range of powers and responsibilities to the National Park Service and the Secretary of Interior including: codification and institutionalization of Historic American Buildings Survey, authorization to note significant sites and buildings, and to actually be able to carry out and perform preservation work. It also established the National Park System Advisory Board to assist the Secretary of the Interior with administration. c. The central theme to this act was to formulate a means of organization and rules for the preservation and maintenance of historic sites. Missouri Basin Project (9pts) a. This project was conducted as a means of emergency or salvage archaeology at water resource development projects within the vast Missouri River Basin. b. The issue that the legislation faced here was the destruction of potential archaeological sites along the Missouri River Basin. c. The central theme is the ideal behind salvage archaeology and how it can benefit the archaeological record before it is destroyed by some form of major construction or other land development. Federal-Aid Highway Act of 1956 (9pts) a. Before the interstate could be put in this law allowed for an archaeological survey and potential excavation to be conducted. b. This law was passed to help preserve archaeological data that might be damaged or destroyed by the construction of the interstate. c. The theme for this law is to allow archaeologists to salvage as much information as possible from potential sites before construction of the interstate could begin. Reservoir Salvage Act of 1960 (9pts) a. Provides a means for the recovery and preservation of historical and archaeological data that might be lost or destroyed in the construction of dams and reservoirs. b. With all the big damns and large-scale construction being done at this time, this law provided a means for archaeologists to excavate and salvage as much data as possible before the construction was to begin. c. The theme for this law is to provide a way of preserving as much data as possible from a site before construction or completion of a damn or reservoir destroys it. National Historic Preservation Act of 1966 (9pts) a. This act was created to preserve historical and archaeological sites in the United States of America and created the National Register of Historic Places, the list of National Historic Landmarks, and the State Historic Preservation Offices. b. This legislation provided a means to not only protect significant historic places but also a means to help govern how to run them and how to decide which ones even make the cut to be placed on the list. c. The theme for this law is to provide a means of deciding which landmarks, architecture and significant sites should be included in federal protection as well as how to actually keep up with their restoration. 5. (5pts) Briefly summary the strengths and weaknesses of Works Progress Administration (WPA) Archaeology as part of Roosevelt’s New Deal Programs? This type of archaeology offered many new jobs for people to fill. It also provided a means of excavating sites that were potentially unreachable due to their location and how deep they were actually buried. It created a long lasting impression on archaeology and anthropology as well. It created museums and anthropology departments at universities across the nation. It also created many vast collections of artifacts. The bad with this type of archaeology was that people had to work all year round and often in terrible conditions. Since many of the workers were untrained they had potential to damage artifacts and sites that they came across. 6. (5pts) Provide an overview of the significance of Section 101 of the HPA? It formed the State Historic Preservation Office (SHPO). SHPO’s responsibilities include surveying and recognizing historic properties, reviewing properties to be placed on the National Register for Historic Places, reviewing undertakings for the impact of these properties and finally supporting federal, state and local governments as well as the private sector. States are responsible for setting up their own SHPO and thus each one varies in its rules and regulations. 7. (5pts) What is the National Register of Historic Places? What makes an historic property eligible for the National Register? Discuss the â€Å"Criteria of Significance† and the â€Å"Criteria of Integrity), etc The national register of historic places is a register that was invented to protect historic properties of significant value to the history of the United States. To be eligible for admission to the register a property must be go through a list called the Criteria of Significance. It has to have one of the following to be able to be on the list. A property must be associated with events that made a significant contribution to our nations history, be associated with a significant historical person of our nations history, have the ability to provide significant information about history or prehistory, and lastly embodies the distinctive characteristics of a type, period, or method of construction, or that represent the work of a master, or that possess high artistic values, or that represent a significant and distinguishable entity whose components may lack individual distinction. 8. (5pts) Provide an overview of Section 106 process of National Historic Preservation Act. Include the steps (that I talked about in class) of the Section 106 â€Å"Consultation† process. Discuss assessment and mitigation of adverse effect in your answer. Section 106 mandates federal agencies undergo a review process for all federally funded and permitted projects that will impact sites listed on, or eligible for listing on, the National Register of Historic Places. The steps for Consultation process include 1 Initiation of the Section 106 Review; 2 Identification of Historic Properties; 3 Assessment of Adverse Effects; and 4 Resolution of Adverse Effects. If an adverse effect is expected, the agency is required to work with the local State Historic Preservation Office to ensure that all interested parties are given an opportunity to review the proposed work and provide feedback. This allows for steps to be found avoiding having an adverse effect on historic properties. A Memorandum of Agreement is then reached between all consulting parties outlining agreed to mitigation or avoidance of historic properties. Without said process, historic sites or properties would lose out on significant protection. It provides a process to help decide different approaches or solutions to a project but does not mean that it prevents site destruction or alteration. 9. (6pts) Provide a one word definition for each of the follow (2pts each): Phase I- Identification Phase II- Evaluation Phase III- Mitigation 10. (5pts) YOUR OPINION†¦IS IT a duty of our society and as a community to protect and preserve our heritage? Are communities doing enough to protect their heritage, or are they doing too much, imposing their will too aggressively and infringing the property of others?

Saturday, September 21, 2019

Theory of Bomb Calorimetry Essay Example for Free

Theory of Bomb Calorimetry Essay The purpose of this experiment is to learn how to apply the laws of thermodynamics to chemical reactions. In this particular experiment we will use a bomb calorimeter to study heats associated with combustion reactions. A bomb calorimeter is a device used for measuring the standard heat of combustion associated with a chemical reaction. The standard heat of combustion for a substance is defined as the enthalpy change, accompanies a process in which one mole of a substance undergoes a combustion reaction with oxygen. It can be found according to equation 1. 1) H- Enthalpy; R Gas Constant; n number of moles; U Internal Energy; s denotes sample combusted; 0 denotes standard state (25C, 1bar). The internal energy change of the sample is found from from equation 2, where change in temperature is obtained from experiment and heat capacity of the calorimeter is obtained from standardization of the bomb calorimeter (see Preparations section). The heat capacity of the wire is usually known. 2) T- temperature; w denotes iron wire. Gas constant, R, can be taken to be 8. 315 J/K mol or a more precise value can be obtained from literature. Temperature, T, is the standard state temperature=25C. Change in moles of gas, , 3) From equation 3 we can see that the change in moles of gas is =12-14. 5=-2. 5 At this point we have enough information to calculate the standard heat of combustion! Experimental Setup 1. Make sure all connections to electrical outlet are disconnected. 2. Make sure all the parts to the bomb calorimeter are at hand. 3. Make a sample pellet (Figure1) using a pellet press. 4. Fuse a metal wire into the pellet of the chemical whose heat of combustion is to be determined 5. Attach the ends of the wire onto the two center poles of the cap that is screwed onto the bomb cavity as show in Figure2. Screw the lid onto the bomb cavity (make sure that the lid is on tight). At this point your bomb should look like the bomb in Figure3. Warning: DO NOT ALLOW THE BOMB TO SHAKE ONCE THE PRESSURE INSIDE IT HAS BEEN INCREASED. 7. Close the bomb valve and raise the pressure inside the bomb with the help of a pressure tank until 25 atm is reached. 8. Purge the bomb of the Nitrogen gas by opening the pressure release valve (Figure3) and releasing the gas. Point the bomb away from yourself and others while purging it of Nitrogen gas. 9. Raise the pressure inside the bomb with the help of a pressure tank until 25 atm is reached. 10. Attach the electrodes to the electrode slots on the cap shown in Figure 3. 11. Place bomb in metal pail placed inside the calorimeter jacket, filled with 1L of Distilled water as show in Figure 4. 12. Place the calorimeter lid on top of jacket, ensuring that the thermometer and stirrer are inside the water as show in Figure4. 13. Attach the stirrer belt to the apparatus (Figure4) and plug the stirrer into electrical outlet. 14. Plug in the ignition unit. Running the experiment 16. Start the stirrer. 17. Begin taking temperature reading with the thermometer every 10 seconds. 18. Allow system to run for 5-10 minutes. 19. Ignite the pellet with the ignition unit and continue to measure the temperature until 5 minutes after the temperature peaks. 20. Unplug all the electrical connections. 21. Next remove jacket lid, and remove the bomb from the water 22. In a designated area of the class room release the gas inside of the bomb by opening the pressure release valve. 23. Once all the gas is removed, unscrew the cap and measure the mass of wire remaining, and ensure that all of the pellet was combusted 24. Begin the calculation process (refer to the theory section).

Friday, September 20, 2019

Marketing Concepts And Principles Of Success Of Subway Marketing Essay

Marketing Concepts And Principles Of Success Of Subway Marketing Essay Marketing analysis consists of finding out the group of potential customers or consumers as well as the market you are targeting. we need to find out their potential needs how can we develop and modify the product or services to develop their needs. We should also know the preferable usage the customer might have for the product or service. We should also be aware of the competitors operation throughout the market that is their pricing policy so that we can be one step ahead of our competitors. We should also be careful about the distribution of the product and services in order to make sure it reaches the right target of the market both local and international. This report is written by studying Subway a leading sandwich shop in Britain. Synopsis The story begins in Bridgeport, Connecticut, USA during the summer of 1965. Fred DeLuca, an ambitious 17-year-old high school graduate, was looking for a way to make enough money to pay for his university tuition. The solution came at a BBQ during a conversation with a family friend, Dr. Peter Buck. Dr. Buck suggested to Fred that he open a submarine sandwich shop having seen a sandwich shop in his hometown experience huge success.   With a $1,000 loan from Dr. Buck, the partnership was formed and Petes Super Submarines opened in August 1965. The first year was a challenge and a learning experience for the young entrepreneurs. They opened their second location a year later and quickly realised that marketing and visibility were going to be key factors in the success of the business the third outlet was in a highly visible location and its still serving sandwiches today. The name was shortened from Petes Super Submarines to SUBWAY ® and the familiar bright yellow logo was introduced.   The next step was to formulate a business plan that outlined the SUBWAY ® chains goals. In an effort to reach those goals, SUBWAY ® outlets began franchising, giving others the opportunity to succeed in their own business venture. The first SUBWAY ® franchise opened in Connecticut in 1974. Literature Review Compare alternative definitions of marketing.(P1) Marketing is a social and managerial process by which individuals and groups obtain what they need and want through creating and exchanging products and value with others.(kotler 2003). Marketing is the management process which identifies,anticipates and supplies customer requirements,efficiently and profitably.(Chartered Institute of Marketing). Marketing is the process of planning and executing the conception, pricing,promotion and distribution of ideas,goods and services to create exchange and satisfy international and organizational objects.(AMA 2004). As far as we can see in the above definitions that all of them is trying to say the same thing that it is a process. Some say it is a social process some say it is a planning process. I would define marketing as a way to reach the consumers as well as customers as AMA American Marketing 2004 has the definition that it is the perfect finishing of pricing promotion and distribution of ideas. I agree with that definition. Identify the main characteristics of marketing oriented organizations.(P2) All marketing oriented organizations develop their business around the customer. They focus on the environment and make a key factor in their decision making Ans:there are four main characteristics which explain the marketing oriented organizations. They are-1)Shared values. 2)Organization. 3)Strategy. 4)Stakeholders. 3)Strategy-Every market oriented company should have a good long term strategy. This is because the company will have a target of gaining its ultimate goal that is to be a market leader that is why from the first they should have a strong strategy which is understandable and flexible also. 4)Stakeholders-Stakeholders are those who has a direct or indirect stake which can be affected by the organisations behaviour or activity.For an organization stakeholders are a very sensitive issue.They should be careful when they make any decisions because the decision must be taken in consideration with the view point of the stakeholders.If the stakeholders are unhappy then this might affect the organization very badly. 3:Explain the various elements of marketing concept.(P3) Team work and Integrated approach to business Profitability Customer orientation Identify and assess the benefits and costs of marketing approach.P4 Ans: the cost and benefits of marketing approach are- Cost 1Regular marketing research-Company needs to do regular market research in order to stay updated according to the market. 2)Building excellent services-Company needs to give a good service both with the suppliers and the customers in order to build a goodwill for the company. 3)distribution-Company needs to be very particular in terms of the distribution costs.if the distribution cost is high it might affect them in the long run in terms of increasing the total cost. Benefits- 1)Profit-A good marketing approach means that it is going to hit the right point which should be the profit. 2)Customer loyalty and trust-Customer loyalty should be one of the key benefit. loyalty comes with the trust which is an important factor. when a customer trusts a company the customer will recommend it to the others. that is how the company will increase its benefit from the marketing approach. P5:Identify and explain macro and micro environmental factors which influence marketing decisions. RELATE INFORMATION TO SUBWAY Macro environmental factors which influence marketing decisions are(P5/M2) Economic Environment It is best described as having the factors that affect consumer buying power and spending patterns (Kotler et al 1998). These factors include income, levels of employment, inflation, value of the currency and many others. The income is a very important factor in terms of macro-environment as any customer because the customer should have the purchasing power to buy the product. If they have the purchasing power they are most likely going to buy at subway. Value of the currency is an important factor. If the value fluctuates then we cannot value the correct value of sub according to the market. Political Social Technology Micro environmental factors which influence marketing decisions are- 1)Customers-Organisations survive by satisfying the needs, wants and providing the benefits of the customers. For e.g-Subway gives special offers to the customers like the sub of the day. 2)Employees-Employing the correct staff and keeping this staff motivated is a very important part in terms of strategic planning process of the organization. Training and development is an important factor in subway in terms of getting a competitive edge than any other fast food joint. 3)Suppliers- Keeping a good relationship with the supplier is a very important factor. Prices of raw materials might increase. A good relationship ensures that they get the products of good quality at a competitive price. P6:Propose segmentation criteria to be used for two products in different markets. Ans: Market segmentation is the fundamental component of a market-based strategy. A market segment is a specific group of customers with distinctive customer needs, purchase behaviours and different descriptive characteristics.(Best 2000). We can talk about the halal stores in subway and the general store of subway. They are two products in different markets. One is aimed generally. Another one is specially aimed at the muslim customers who wants to eat at subway. P7:Outline the factors which influence the choice of targeting strategy. Ans: targeting strategy is the selection of potential customers to whom the business wants to target them to sell products or service. Factors influencing the choice of targeting strategy are- 1)Markets diversity- Market goes on to take different routes like the case of subway which is diversifying their sandwich products. 2)The level of competition-Subway has to ensure their goal beside the level of competition that they are facing. This is why they are targeting health conscious customers by introducing low fat subs like chicken teriyaki. They also use the slogan called Eat Fresh to target people who want to eat out but wants to avoid junk food. 8)Explain how buyer behavior affects marketing activities in two different buying situations. Ans: Buyer behavior affects marketing activities in many situations. One may be the way the customers lifestyle is. For e.g.-if the customer is an marketing officer he is more likely to buy formal clothes than a plumber who needs informal clothes like jeans because it will be more suitable for him to work with a pair of jeans. Another situation might be a psychological factors. For e.g-customers of mark and spencer might belief that ms products are very much better than the others. This might influence them to buy that product.

Thursday, September 19, 2019

A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson Es

The Pressure to Assimilate in Mary Rowlandson’s A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson There are times when assimilation is not a choice but rather something is forced. In circumstances such as being taken hostage, the ability to survive must come at the price of assimilating one's own customs into another lifestyle. In February of 1675 the Native Americans who were at war with the Puritans obtained hostage Mary Rowlandson of the Plymouth colony. During this time she must perform a role that is uncommon to a colonial woman's way of life so that she may live among them. With the need to survive, how can a person accommodate a second culture? The actions of Mary Rowlandson demonstrate how a person can gain, retain, and end up examining their own beliefs for logical validity. Due to a limited food supply in the tribe, it can't be generosity given to Rowlandson; doing so would cause the entire tribe to become hungry. Rowlandson hand makes clothes for Native Americans in exchange for essentials. She trades with her caretakers and even the well-known King of the tribe. On several occasions she argues with the Natives, attempting not to lose what is her property. Trading and arguing with others was not a job performed by women in her colony; however, in her situation, a change of role is needed in order for her to live with her captors. In the seventeenth century, her change of role might have been seen as a sign of weakness, but today, it's much easier to see her change of role as being a sign of strength; After all, it takes a strong willed person to carry out a change in their life. An altering of one's religion alone could be a difficult task for some, but for Puritans in everyday situations... ...lture expects her to be. In summary, what Mary Rowlandson understands about the Native Americans changes greatly during her confinement. This change in her day-to-day life enables her to live among a Native American tribe while still being a faithful Puritan. The change in her viewpoint gives her not only an understanding of the Native culture, but also her own as well. Although it was never written that her role in the Plymouth colony changed after her return, one could speculate that she may have at least questioned her own beliefs and questioned what God may truly be looking for in a Puritan. Works Cited: Rowlandson, Mary. "A Narrative of the Captivity and Restoration of Mrs. Mary Rowlandson." Negotiating Difference: Cultural Case Studies for Composition. Ed. Patricia Bizzell and Bruce Herzberg. Boston: Bedford Books of St. Martin's Press, 1996. 67-83.

Wednesday, September 18, 2019

Personal Narrative: My Favorite Noncompetitive Activities :: essays research papers

My Three Favorite Noncompetitive Activities The three different activities I like is bicycling, camping, and hiking. I got interested in camping because, you get to see the outdoors, and see the stars, and eat burnt marshmallows. This is very fun. Also, because this is a group activity. I also got interested in hiking because, it keeps you in shape, and its just plain fun and it is a dual activity. I got interested in bicycling because, you get to travel around in it, and it keeps you in shape, and it is very fun. And, because it is an individual activity. When I went to camp I got to fish, swim, and tell scary stories, and sleep in tents. It was a lot of fun. We got to pick our camp grounds. We got to make camp fires, so we can cook our food. We are also able to see the stars at night. We can?t really see the stars in the cities, because there is too much light. But anyways we had a lot of fun camping. Bicycling is also a lot of fun. You can travel anywhere on a bicycle. It keeps you in shape, and it is fun. But you have to be careful of glass or nails, or else your tires might become flat. But other than that, it can be a lot of fun. You can get a really strong workout with a bicycle. You can have races against other people. You can take it with you camping and to the beach. Hiking is a lot of fun. It keeps you in good shape. It exercises your body. It helps your brain to think and learn. You can also race against other people. You can see the great out doors if you are hiking in the woods. You can see different kinds of birds and trees and people. Well I can tell you this much, hiking is a lot of fun.

Tuesday, September 17, 2019

Media: The Fourth Pillar of Democracy Essay

Today, media is considered the fourth pillar of the state all over the world; first and foremost British Member of Parliament Lord Macaulay had given this status to the media. In any republican government system, there must be three administrative bodies, 1- Parliament, 2- Administrative department, 3- Judiciary body. In the absence of any of these three bodies, the government cannot run systematically, but now it is felt that one body more is necessary to be with them, that is media. This body is considered more important these days, it plays an important role as an informative bridge between governing bodies and general public, in absence of media general public cannot know about what kind of bills and acts are passed in the parliament, and what are their positive and negative effects in the society. If media person close their eyes the government officials will do what they want, so media plays a very important and impartial role between government activities and general public, so much so that it is said that the freedom of media is the guarantee of success for a government. Below mentioned are a few recent incidents in which media played a key role and established itself as the fourth pillar of democracy. Delhi Rape Case The media played an important part in raising a debate on women’s safety. As the news of the rape broke, the media went into frenzy, not just in tracking the case but in leading people to introspect. A responsible section of the media asked people to be part of radical reforms the country required while it continued to give expression to the public grief, the mourning and reconciliation as people watched in horror the victim’s final moments. As the movement to bring the gang rape victim to justice went viral, the nation saw a major protest that spread on streets across the country. The media extensively covered the demonstrations, following the protesters; giving their demands for justice a voice and bringing them to the centre of the political debate. It exposed the growing crime statistics, especially in Delhi, against women. The media led bare the growing frustrations of an entire emerging aspirational urban class and generation Rapes that are taking place are being continuously reported in major newspapers with more prominence than before, even though they are not always given the front page coverage. One is assured that the December 16 gang rape incident will continue to be a milestone when covering issues related to women’s safety. This movement goes to prove that the democracy’s fourth pillar can transform incidents of national shame to national justice by establishing confidence in institutions that have been created to protect the citizens of the country. The Anna Hazare Movement The news media, particularly, the TV channels have played a key role in keeping up the tempo of the movement by ensuring round the clock coverage, they ensured that the protests occured across the country and there was a mass frenzy. Even though the channels didn’t state much about merits and demerits of the proposed institution of Lokpal or educated citizens about the implications of the ombudsman, TV and newspapers were visibly the driving force behind the anti-corruption movement. The movement was a perfect example of how media can be used effectively. Though the propriety regarding active participation of news media in a movement is debatable, it is true to an extent that Indian media has voluntarily become a party, a sort of participant, in this drive for Jan Lokpal Bill. The Egyptian revolution The Egyptian revolution began on Facebook with a call to protest in Cairo’s Tahrir Square. Protesters used Twitter to manoeuvre around police and reach the area. People arrived at the location expecting to see a few hundred like-minded individuals. Instead, they found a few hundred-thousand. Until they reached the square, Egyptian dissidents had no clue of their strength. It was a remarkable indication of the power of social networks as a political organizing tool, as has been seen in many uprisings sweeping North Africa and the Middle East. Around 20 million people in Egypt, or about one-quarter of the country’s population, are on the Internet. Early in the political unrest, the Egyptian government attempted to block Facebook and Twitter, then took the unprecedented step of shutting down Internet access in the country altogether. The cyberspace blackout lasted a week but could not thwart the revolution. President Hosni Mubarak stepped down a week later.

Monday, September 16, 2019

Dtmf Remote Appliance Control System Using Mobile Phone

CHAPTER 1 INTRODUCTION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† is used to control appliances which are far away from the user using mobile phone. The aim of the proposed system is to develop a cost effective solution that will provide controlling of home appliances remotely and enable home security against intrusion in the absence of homeowner. The devices connected as home and office appliances consume electrical power and they should be controlled as well as turn on /off if required. Most of the time, it was done manually. Now it is a necessity to control devices more effectively and efficiently at anytime from anywhere. Take an instant when we are going to office and suddenly remembered that to switch off the microwave oven we fell convenient if we could switch off without going back to home, in such situations this project comes to our rescue. In this system, we are going to develop a cellular phone based home/office appliance controller for controlling arbitrary devices. This includes a mobile phone which is connected to the system via head set. To activate the mobile phone unit on the system, a call is to be made and as the call is answered (auto answer mode), in response the user would enter a password to access the system to control devices. As the caller presses the specific button on the keypad, it results in turning ON or OFF specific device and the device switching is achieved by relays. In this project, we designed a basic model and it is used to control 4 lights using a mobile phone, micro-controller and transceiver. The maximum number of devices that can be operated will be the number of buttons present on the keypad of mobile phone. . 1 Block diagram: Figure 1. 1: Block Diagram Fig 1. 1 represents the block diagram of DTMF Remote Appliance Control System using Mobile phone, used to control the appliances present at a distance. Brief Description of Hardware Modules: The DTMF Remote Appliance Control System consists of 1. Mobile Phone 2. MT8888 DTMF Transceiver 3. Philips 89C51 Micro-controller 4. Liquid Crystal Dis play 5. Power Supply Unit 6. Relay Driver 7. Relays 8. Devices 1. 2. 1 Mobile Phone: Mobile Phone is used as a media to instruct the micro controller to power ON/OFF the appliances. The mobile phone used here is Nokia 6030 as it has the required features and is interfaced with the transceiver through ear phones. 1. 2. 2 MT8888 DTMF Transceiver: The MT8888C is a monolithic DTMF transceiver with call progress filter. The transceiver consists of transmitter and receiver. The DTMF signals are transmitted through transmitter and they are received by the mobile phone and decoded using a DTMF receiver/decoder IC’s. 1. 2. 3 PHILIPS 89C51 Micro Controller: The PHILIPS 89C51 is a low cost micro-controller. It has a 40 pin configuration and contains non volatile Flash memory of 64KB which is both parallel programmable and serial in system programmable memory. 1. 2. 4 LCD display: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80 byte DD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. 1. 2. 5 Power Supply Unit: The power supply unit is used to provide a constant 5V supply to different IC’s. This is a standard circuit using external 12V DC adapter and fixed 3-pin voltage regulator. Diode is added in series to avoid reverse voltage. 1. 2. 6 Relay Driver: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance, we may use two transistors to form a darling ton pair and this pair in CC configuration provides input impedance as high as 2Mohms. 1. 2. 7 Relays: Relays are remote control electrical switches that are controlled by another switch, such as a horn switch or a computer as in a power train control module. Relays allow a small current flow circuit to control a high current circuit. 1. 2. 8 Devices: The devices can be micro-wave oven, bulbs, fans, air cooler, etc which are far away from the user. The micro-controller plays the intelligent part in controlling these devices. 1. 3 Working: This project is used to control the appliances present at a distance using a mobile phone. The first step is the user should make a call to the mobile phone, which is in auto answer mode and thus call gets connected. The user presses the digits present over the keypad of his phone for controlling the appliances present at home or office. Whenever a button is pressed a tone is generated and it is transferred to the mobile phone present in the home or office, which is interfaced with the DTMF transceiver. The DTMF receiver decodes the tone generated and it activates the controller accordingly. The controller operates the devices according to the coding set by the user. The status of the devices whether they are ON/OFF is indicated in the LCD. CHAPTER 2 MT8888 DTMF TRANSCEIVER Introduction: The MT8888C is a monolithic DTMF transceiver with call progress filter. It is fabricated using CMOS technology and it offers low power consumption and high reliability. The receiver section is based upon the industry standard MT8870 DTMF receiver, while the transmitter utilizes a switched capacitor D/A converter for low distortion, high accuracy DTMF signaling. Internal counters provide a burst mode such that tone bursts can be transmitted with precise timing. A call progress filter can be selected allowing a microprocessor to analyze call progress tones. The MT8888C utilizes an Intel micro interface, which allows the device to be connected to a number of popular microcontrollers with minimal external logic. The applications of DTMF transceiver include credit card systems, paging systems, repeater systems, interconnector dialers, mobile radio and personal computers. In our project, it is used for decoding the tone generated by the user when he presses a button of the keypad. After decoding the tone, it is given to the microcontroller for controlling the appliances. Features: The features of MT8888 DTMF transceiver include: 20 pin DIP package Central office quality DTMF transmitter/receiver Low power consumption High speed Intel micro interface Compatible with 6800 microprocessors Adjustable guard time Automatic tone burst mode Call progress tone detection up to -30dbm Microprocessor port Pin Diagram & Description: Figure 2. 1: DTMF Pin Diagram Figure 2. 1 shows the pin diagram of MT8888 and the description of the monolithic IC is as shown in the following table 2. 1. Table 2. 1: Description of Pins of DTMF Transceiver Pin NoNameDescription 1IN+Non-inverting op-amp input 2IN-Inverting op-amp input. 3GSGain Select. Gives access to output of front end differential amplifier for connection of feedback resistor. 4VrefReference Voltage output (VDD/2). VSSGround (0V). 6OSC1DTMF clock/oscillator input. Connect a 4. 7M? resistor to VSS if crystal oscillator is used. 7OSC2Oscillator output. A 3. 579545 MHz crystal connected between OSC1 and OSC2 completes the internal oscillator circuit. Leave open circuit when OSC1 is driven externally. 8TONEOutput from internal DTMF transmitter. 9WRWrite microprocessor input. TTL compatible. 10CSChip Select input. Active Low. This si gnal must be qualified externally by address latch enable (ALE) signal. 11RS0Register Select input. TTL compatible. 12RDRead microprocessor input. TTL compatible. 3IRQ/CPInterrupt Request/Call Progress (open drain) output. In interrupt mode, this output goes low when a valid DTMF tone burst has been transmitted or received. In call progress mode, this pin will output a rectangular signal representative of the input signal applied at the input op-amp. The input signal must be within the bandwidth limits of the call progress filter. 14-17D0-D3Microprocessor Data Bus. High impedance when CS=1or RD=1. TTL compatible. 18EStEarly Steering output. Presents logic high once the digital algorithm has detected a valid tone pair (signal condition). Any momentary loss of signal condition will cause ESt to return to a logic low. 19St/GTSteering Input/Guard Time output (bidirectional). A voltage greater than V ts detected at St causes the device to register the detected tone pair and updated output latch. A voltage less than V tst frees the device to accept a new tone pair. The GT output acts to reset the external steering time-constant; its state is a function of ESt and the voltage on St. 20VDDPositive power supply (5V typical). 2. 4 Functional Description: The MT8888C Integrated DTMF Transceiver consists of a high performance DTMF receiver with an internal gain setting amplifier and a DTMF generator which employs a burst counter to synthesize precise tone bursts and pauses. A call progress mode can be selected so that frequencies within the specified pass band can be detected. The Intel micro interface allows microcontrollers, such as the 8080, 80C31/51 and 8085, to access the MT8888C internal registers. The block diagram of DTMF transceiver is as shown in figure 2. 2. Figure 2. 2: Block Diagram of DTMF Transceiver 2. 5 Call Progress Filter: A call progress mode using the MT8888C can be selected allowing the detection of various tones, which identify the progress of a telephone call on the network. The call progress tone input and DTMF input are common; however call progress tones can only be detected when CP mode has been selected. DTMF signals cannot be detected if CP mode has been selected. Figure 2. 3 indicates the useful detect bandwidth of the call progress filter. Frequencies presented to the input, which are within the ‘accept’ bandwidth limits of the filter are hard limited by a high gain comparator with the IRQ/CP pin serving as the output. The square wave output obtained from the Schmitt trigger can be analyzed by a microprocessor or counter arrangement to determine the nature of the call progress tone being detected. Frequencies which are in the ‘reject’ area will not be detected and consequently the IRQ/CP pin will remain low. Figure 2. 3: Call Progress Response 2. 6 DTMF generator: The DTMF transmitter employed in the MT8888C is capable of generating all sixteen standard DTMF tone pairs with low distortion and high accuracy. All frequencies are derived from an external 3. 579545 MHz crystal. The sinusoidal waveforms for the individual tones are digitally synthesized using row and column programmable dividers and switched capacitor D/A converters. The row and column tones are mixed and filtered providing a DTMF signal with low total harmonic distortion and high accuracy. To specify a DTMF signal, data conforming to the encoding format shown in Table 2. 2 must be written to the transmit Data Register. Note that this is the same as the receiver output code. The individual tones which are generated (f LOW and f HIGH) are referred to as Low Group and High Group tones. As seen from the table, the low group frequencies are 697, 770, 852 and 941 Hz. The high group frequencies are 1209, 1336, 1477 and 1633 Hz. Typically; the high group to low group amplitude ratio (twist) is 2 dB to compensate for high group attenuation on long loops. The period of each tone consists of 32 equal time segments. The period of a tone is controlled by varying the length of these time segments. During write operations to the Transmit Data Register the 4 bit data on the bus is latched and converted to 2 of 8 coding for use by the programmable divider circuitry. This code is used to specify a time segment length, which will ultimately determine the frequency of the tone. When the divider reaches the appropriate count, as determined by the input code, a reset pulse is issued and the counter starts again. The number of time segments is fixed at 32; however, by varying the segment length as described above the frequency can also be varied. The divider output clocks another counter, which addresses the sine wave lookup ROM. Table 2. 2: DTMF Tones FLOWFHIGHDIGITD3D2D1D0 697120910001 697133620010 697147730011 770120940100 770133650101 770147760110 852120970111 52133681000 852147791001 941133601010 9411209*1011 9411477#1100 6971633A1101 7701633B1110 8521633C1111 9411633D0000 Note: 0= LOGIC LOW, 1= LOGIC HIGH The lookup table contains codes which are used by the switched capacitor D/A converter to obtain discrete and highly accurate DC voltage levels. Two identical circuits are employed to produce row and column tones, which are then mixed using a l ow noise summing amplifier. The oscillator described needs no â€Å"start-up† time as in other DTMF generators since the crystal oscillator is running continuously thus providing a high degree of tone burst accuracy. A bandwidth limiting filter is incorporated and serves to attenuate distortion products above 8 kHz. It can be seen from Figure 2. 4 that the distortion products are very low in amplitude. Figure 2. 4: Spectrum Plot 2. 7 Receiver Section: Separation of the low and high group tones is achieved by applying the DTMF signal to the inputs of two sixth-order switched capacitor band pass filters, the bandwidths of which correspond to the low and high group frequencies. These filters incorporate notches at 350 Hz and 440 Hz for exceptional dial tone rejection. Each filter output is followed by a single order switched capacitor filter section, which smoothes the signals prior to limiting. Limiting is performed by high-gain comparators which are provided with hysterics to prevent detection of unwanted low-level signals. The outputs of the comparators provide full rail logic swings at the frequencies of the incoming DTMF signals. Following the filter section is a decoder employing digital counting techniques to determine the frequencies of the incoming tones and to verify that they correspond to standard DTMF frequencies. A complex averaging algorithm protects against tone simulation by extraneous signals such as voice while providing tolerance to small frequency deviations and variations. This averaging algorithm has been developed to ensure an optimum combination of immunity to talk-off and tolerance to the presence of interfering frequencies (third tones) and noise. When the detector recognizes the presence of two valid tones (this is referred to as the â€Å"signal condition† in some industry specifications) the â€Å"Early Steering† (ESt) output will go to an active state. Any subsequent loss of signal condition will cause ESt to assume an inactive state. The DTMF keypad is as shown in figure 2. 5 Figure 2. 5: Typical DTMF Keypad 123A697 Hz 456B770 Hz 789C852 Hz *0#D941 Hz 1209 Hz1336 Hz1477 Hz1633 Hz 2. 8 Burst Mode: In certain telephony applications it is required that DTMF signals being generated are of a specific duration determined either by the particular application or by any one of the exchange transmitter specifications currently existing. Standard DTMF signal timing can be accomplished by making use of the Burst Mode. The transmitter is capable of issuing symmetric bursts/pauses of predetermined duration. This burst/pause duration is 51 ms ± 1 ms, which is a standard interval for auto dialer and central office applications. After the burst/pause has been issued, the appropriate bit is set in the Status Register indicating that the transmitter is ready for more data. The timing described above is available when DTMF mode has been selected. However, when CP mode (Call Progress mode)is selected, the burst/pause duration is doubled to 102 ms  ±2 ms. Note that when CP mode and Burst mode have been selected, DTMF tones may be transmitted only and not received. In applications where a non-standard burst/pause time is desirable, a software timing loop or external timer can be used to provide the timing pulses when the burst mode is disabled by enabling and disabling the transmitter. Microprocessor interface: The MT8888C incorporates an Intel microprocessor interface which is compatible with fast versions (16 MHz) of the 80C51. No wait cycles need to be inserted. Figure 2. 6 and Figure 2. are the timing diagrams for the Intel 8031, 8051 and 8085 (5 MHz) microcontrollers. By NANDing the address latch enable (ALE) output with the high-byte address (P2) decode output, CS is generated. Figure 2. 8 summarizes the connection of these Intel processors to the MT8888C transceiver. Figure 2. 6: 8031/8051/8085 Read Timing Diagram Figure 2. 7: 8031/8051/8085 Write Timing Diagram Figure 2. 8: MT8888C Interface Connections for Various Intel Micros The microprocessor interface provides access to five internal registers. The read-only Receive Data Register contains the decoded output of the last valid DTMF digit received. Data entered into the write-only Transmit Data Register will determine which tone pair is to be generated. Transceiver control is accomplished with two control registers (see Table 2. 3 and Table 2. 4), CRA and CRB, which have the same address. A write operation to CRB is executed by first setting the most significant bit (b3) in CRA. The following write operation to the same address will then be directed to CRB, and subsequent write cycles will be directed back to CRA. The read-only status register indicates the current transceiver state (see Table 2. 5). Table 2. 3: Control Register A Description BITNAME DESCRIPTION b0TOUTTone Output Control. Logic high enables the tone output; a logic low turns the tone output off. This bit controls all transmit tone functions. b1CP/DTMFCall Progress or DTMF Mode Select. A logic high enables the receive call progress mode; a logic low enables DTMF mode. In CP mode a rectangular wave representation of the received tone signal will be present on the IRQ/CP output pin if IRQ has been enabled (Control Register A,b2=1). In order to be detected, CP signals must be within the bandwidth specified in the AC Electrical Characteristics for Call Progress. Note: DTMF signals cannot be detected when CP mode is selected. b2IRQInterrupt Enable. A logic high enables the interrupt function; a logic low when either 1) a valid DTMF signal has been received for a valid guard time duration, or 2) the transmitter is ready for more data (burst mode only). b3RSELRegister Select. A logic high selects control register B for the next write cycle to the control register address. After writing to control register B, the following control register write cycle will be directed to control register A. Table 2. 4: Control Register B Description BITNAME DESCRIPTION b0 BURSTBurst Mode Select. Logic high de-activates burst mode; a logic low enables burst mode. When activated, the digital code representing a DTMF signal can be written to the transmit register, which will result in a transmit DTMF tone burst and pause of equal durations (typically 51msec). Following the pause, the status register will be updated (b1-Transmit Data Register Empty) and an interrupt will occur if the interrupt mode has been enabled. When CP mode (control register A, b1) is enabled the normal tone burst and pause durations are extended from a typical duration of 51msec to 102 msec. When BURST is high (de-activated) the transmit tone burst duration is determined by the TOUT bit (control register A, b0). b1TESTTest Mode Control. Logic high enables the test mode; a logic low de-activates the test mode. When TEST is enabled and DTMF mode is selected (control register A, b1=0), the signal present on the IRQ/CP pin will be analogous to the state of the delayed steering bit of the status register. 2 S/DSingle or Dual Tone Generation. Logic high selects the single tone output; a logic low selects the dual tone output. The single tone generation function registers further selection of either the row or column tones (Low or high group) through the C/R bit (control register B,b3). b3 C/RColumn or Row tone select. Logic high selects a column tone output, a logic low selects a row tone output. This function is used in conjunc tion with the S/D bit (control register B, b2). Table 2. 5: Status Register Description BITNAMESTATUS OF FLAGSTATUS FLAG CLEARED 0IRQInterrupt has occurred. Bit one (b1) or bit two (b2) is set. Interrupt is inactive. Cleared after status register is read. b1Transmit data register empty(Burst Mode only)Pause duration has terminated and transmitter is ready for new data. Cleared after Status Register is read or when in non-burst mode. b2Receive Data Register FullValid data is in the Receive Data Register. Cleared after Status Register is read. b3 Delayed SteeringSet upon the valid detection in the absence of a DTMF signal. Cleared upon the detection of a valid DTMF signal. A software reset must be included at the beginning of all programs to initialize the control registers upon power-up or power reset (see Figure 19). Refer to Tables 4-7 for bit descriptions of the two control registers. The multiplexed IRQ/CP pin can be programmed to generate an interrupt upon validation of DTMF signals or when the transmitter is ready for more data (burst mode only). Alternatively, this pin can be configured to provide a square wave output of the call progress signal. The IRQ/CP pin is an open drain output and requires an external pull-up resistor. 2. DTMF Registers and initialization: The DTMF has two control registers, one transmits register, one receives register, and one status register. Along with this there is a data buffer which is the entry point for the data for the DTMF to communicate with the microcontroller depending upon the give control signals on the DTMF control pins like rs0,r/w, and the data from the data buffer is communicated with the DTMF. The c ombination of rs0 and r/w pins will give the following result as shown in table 2. 6. Table 2. 6: DTMF Internal Registers RS0R/WFUNCTION 00Write to Transmit Data Register 1Read from Receive Data Register 10Write to Control Register 11Read from Status Register Initialization of DTMF: A software reset must be included at the beginning of all programs to initialize the control registers after power up. The initialization procedure should be implemented 100ms after power up. Description Control Data CS RS0 R/W b3 b2 b1 b0 Read status register 0 1 1 x x x Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 1 0 0 0 Write to control register 0 1 0 0 0 0 0 Read status register 0 1 1 x x x x Transmission using DTMF: The DTMF has to receive a command to transmit and then the data to send. Consider an example of sending a 50 ms tone- 50 ms pause burst. The procedure is as follows. CS RS0 R/W b3 b2 b1 b0 1. Write to Control Register A 0 1 0 1 0 0 1 (Tone out, DTMF, IRQ, Select Control Register B) 2) Write to Control Register B 0 1 0 0 0 0 0 (Burst mode) 3) Write to Transmit Data Register 0 0 0 0 1 1 1 (Send a digit 7) Reception using DTMF: Reception is carried out by checking the status of DTMF for a valid data in receive register and then receive it by a command. The procedure is as follows. 1) Read the Status Register 0 1 1 x x x x -if bit 1 is set, the Tx is ready for the next tone, in which case†¦ Write to Transmit Register 0 0 0 0 1 0 1 (Send a digit 5) -if bit 2 is set, a DTMF tone has been received, in which case†¦. Read the Receive Data Register 0 0 1 x x x -if both bits are set†¦ Read the Receive Data Register 0 0 1 x x x x Write to Transmit Data Register 0 0 0 0 1 0 1 Thus the initialization of DTMF Transceiver is done using the internal registers according to ur requirements and then it is used for decoding the tones generated by the user. CHAPTER 3 THE MICROCONTROLLER 3. 1 Introduction: Phillips 89C51 contains a non-volatile FLASH program memory that is both parallel programmable and serial in system and in application programmable. It is an 8-bit micro controller from MHS-51 Intel family with 4K bytes of flash and 128 bytes of internal RAM. It has 40-pin configuration and it takes input from the external sources and routes them to the appropriate devices as programmed in it. Features: The features of PHILIPS 89C51 include: 80C51 Central Processing Unit On-chip FLASH Program Memory Speed up to 33 MHz Fully Static Operation RAM expandable externally up to 64 Kbytes Four interrupt priority levels Six interrupt sources Four 8-bit I/O ports Full-duplex enhanced UART Framing error detection Automatic address recognition Power Control Modes Clock can be stopped and resumed Idle Mode Power down Mode Programmable clock out Second DPTR register Asynchronous Port Reset Watchdog Timer Pin Diagram & Description: VCC: Supply voltage. GND: Ground. Port 0: Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification. Figure 3. 1: Pin Diagram of 89C51 Micro Controller Port 1: Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 1 also receives the low-order address bytes during Flash programming and verification. Port 2: Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @DPTR). In this application, it uses strong internal pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash programming and verification. Port 3: Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also serves the functions of various special features of the AT89C51 as listed below: Port 3 also receives some control signals for Flash programming and verification. The alternate functions of Port 3 are as shown in table 3. 1. Table 3. 1: Alternate Functions of Port 3 Port PinAlternate Functions P3. 0RXD(serial input port) P3. 1TXD(serial output port) P3. 2INT0(external interrupt 0) P3. 3INT1(external interrupt 1) P3. 4T0(Timer 0 external interrupt) P3. 5T1(Timer 1 external interrupt) P3. WR(external data memory write strobe) P3. 7RD(external data memory read strobe) RST: Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG: Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programmin g. In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode. PSEN: Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP: External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require12-volt VPP. XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2: Output from the inverting oscillator amplifier. Oscillator Characteristics: XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 3. 2. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven . There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed. Figure 3. 2: Crystal Oscillator Architecture of PHILIPS 89C51: The architecture of PHILIPS 89C51 is as shown in figure 3. 3 below and the modes of operation include idle mode and power down mode. Idle Mode: In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. It should be noted that when idle is terminated by a hardware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory. Figure 3. 3: Architecture of PHILIPS 89C51 Micro-controller Power-down Mode: In the power-down mode, the oscillator is stopped, and the instruction that invokes power-down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power-down mode is terminated. The only exit from power-down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize. Table 3. 2: Idle and power down modes ModeProgram MemoryALEPSENPORT0PORT1PORT2PORT3 IdleInternal11DataDataDataData IdleExternal11FloatDataAddressData Power downInternal00DataDataDataData Power downExternal00FloatDataDataData Timer 0 and Timer 1: The â€Å"Timer† or â€Å"Counter† function is selected by control bits C/T in the Special Function Register TMOD. These two Timer/Counters have four operating modes, which are selected by bit-pairs (M1, M0) in TMOD. Modes 0, 1, and 2 are the same for both Timers/Counters. Mode 3 is different. Memory Organization: During the runtime, micro controller uses two different types of memory: one for holding the program being executed (ROM memory), and the other for temporary storage of data and auxiliary variables (RAM memory). Depending on the particular model from 8051 family, this is usually few kilobytes of ROM and 128/256 bytes of RAM. This amount is built-in and is sufficient for common tasks performed â€Å"independently† by the MCU. However, 8051 can address up to 64KB of external memory. CHAPTER 4 SERIAL COMMUNICATION 4. 1 Introduction: When a micro processor communicates with the outside world, it provides data in byte-size chunks. In some cases, such as printers, the information is simply grabbed from the 8bit data bus of the printer. This can work only if the cable is not too long, since long cables diminish and ever distort signals. Furthermore, an 8-bit data path is expensive. For these reasons, serial communication is used for transferring data between two systems located at distances of hundreds of feet to millions of miles apart. The fact that in serial communication a single data line is used instead of the 8bit data line of parallel communication makes it not only much cheaper but also makes it possible for two computers located in two different cities to communicate over the telephone. Serial data communication uses two methods, asynchronous and synchronous. The asynchronous method transfers a block of data at a time while the synchronous data transfers a single byte at a time. It a mean possible to write software to use either of these methods, but the programs can be tedious and long. For this reason, there are special IC chips made by many manufacturers for serial data communications. This chips are commonly referred to as UART (Universal Asynchronous Receiver Transmitter) and USART (Universal Synchronous Asynchronous Receiver Transmitter). The ARM has built in UARTs. Figure 4. 1: Serial Communication 4. Asynchronous Serial Communication & Data Framing: The data coming in at the receiving end of the data line in a serial data transfer is all 0’s and 1’s; it is difficult to make sense of data unless the sender and receiver agree on a set of rules, a protocol, on how the data is packed, how many bits constitute the character, and when the data begins and ends. Start and Stop bits: Asynchronous serial data communication is widely used for character orientation transmissions. In the asynchronous method, each character is placed in between start and stop bits. This is called framing. In data framing for asynchronous communications, the data, such as ASCII characters, are packed in between a start bit and a stop bit. The start bit is always one bit but the stop bit can be one or two bits. The start bit is always a 0 and the stop bit is 1. Parity bit: In some systems in order to maintain data integrity, the parity bit of the character byte is included in the data frame. This means that for each character we have a single parity bit in addition to start bit and stop bits. The parity bit is odd or even. In case of an odd parity bit the number of data bits including parity bit is even. Data transfer rate: The rate of data transfer in serial data communication is stated in bps(bits per second). Another widely used terminology for bps in baud rate. Baud rate is defined as the number of signal changes per second. As far as the conductor wire is concerned, the baud rates as bps are the same. Data framing: Figure 4. 2: Data Framing 4. 3 RS232 Standard: To allow compatibility among the data communication equipment made by various manufacturers; an interfacing standard called RS232, was set by the Electronic Industries Association (EIA) in 1960. RS232 is the most widely used serial input-output interfacing standard. In RS232, a 1 is represented by -3 to -25v, while a 0 bit is +3 to +25v. To connect any RS232 to a micro controller, voltage converters such as MAX232 are used. Max 232 IC chips are commonly referred to as line drivers. RS232 connectors: The RS232 connector is as shown in figure 4. 3 and the working of pins is described in table 4. 1 Figure 4. 3: RS232 Connector Table 4. 1: Pin description of RS232 Connector Pin noFunction 1CD-Carrier Detector 2RxD-Receive Data 3TxD-Transmit Data DTR-Data Terminal Request 5GND-Signal Ground 6DSR-Data Set Ready 7RTS-Request To Send 8CTS-Clear To Send 9RI-Ring Indicator MAX 232: The RS 232 is not compatible with microcontroller, so a line driver converts the RS 232’s signals to TTL voltage levels. The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply TIA/EIA-232-F voltage levels from a single 5v supply. Each receiver converts TIA/EIA-232 -F inputs to 5v TTL/CMOS levels. These receivers have a typical threshold of 1. 3v, a typical hysteresis of 0. v, and can accept  ±30v inputs. Each driver converts TTL/CMOS input levels into TIA/EIA-232-F levels. Transfer between microcontroller and RS 232c: Figure 4. 4: RS232 Level to TTL Level Conversion CHAPTER 5 LIQUID CRYSTAL DISPLAY 5. 1 Introduction: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80-byteDD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. The LCD unit incorporates a character generator ROM which produces 160 different 5Ãâ€"7 dot-matrix character patterns. The unit also provides a character generator RAM (64 bytes) through which the user may define up to eight additional 5Ãâ€"7 dot matrix character patterns, as required by the application. To display a character, positional data is sent via the data bus from the microcontroller to the LCD unit, where it is written into the instruction register. A character code is then sent and written into the Data register. The LCD unit displays the corresponding character pattern in the specified position. The LCD unit can either increment or decrement the display position automatically after each character entry, so that only successive characters codes need to be entered to display a continuous character string. The display/cursor shift instruction allows the entry of characters in either the left-to-right or right to left direction. 5. 2 Features: The features of liquid crystal display include: Interface with either 4-bit or 8-bit microprocessor. Display data RAM. 80 x8 bits (80 characters). Character generator ROM 160 different 5 x7 dot-matrix character patterns. Character generator RAM. different user programmed 5 x7 dot-matrix patterns. Display data RAM and character generator RAM may be accessed by the microprocessor. Numerous instructions. Clear Display, Cursor Home, Display ON/OFF, Cursor. ON/OFF, Blink Character, Cursor Shift, Display Shift. Built-in reset circuit is triggered at power ON. 5. 3 Pin diagram: Figure 5. 1: LCD Pin Diagram 5. 4 Pin description: VCC, VSS and VEE: While VCC and VSS provide + 5 V on and ground, respectively, VEE is used for controlling LCD contrast. RS: register select There are two very important registers inside LCD. The RS pin is used for their selection as follows. Is RS= 0, the instruction command code register is selected, allowing the user to send a command such as clear display, Cursor at home, etc. if RS=1 the data register is selected, allowing the user to send data to be displayed on the LCD. R/W: read/write R/W input allows the user to write information to the LCD or read information from it. R/W=1 when reading; R/W=0 when writing. E: enable The LCD to latch information presented to its data pins uses the enable pin. When data is supplied to data pins, a high to low pulse must be applied to this pin in order for the LCD to latch in the data present at the data pins. This pulse must be a minimum of 450 ns wide. D0-D7: The 8-bit data pins, D0-D7, are used to send information to the LCD or read the contest of the LCD internal registers. To display letters and numbers, we send ASCII codes for the letters A-Z, a-z, and numbers 0-9 to these pins while making RS=1. We also use RS= 0to check the busy flag bit to see if the LCD ready to receive. The busy flag isD7 and can be read when R/W=1 and RS= 0, as follows: if R/w=1 and RS = 0. When D7 =1, the LCD is busy taking care of internal operations and will not accept any new information. WhenD7=0, the LCD is ready to receive new information. . 5 LCD Commands: The commands given to the LCD are as shown in table 5. 1 Table 5. 1: LCD Commands HEXREGISTER 01Clear display screen 02Return home 04Decrement cursor (shift cursor to left) 06Increment cursor (shift cursor to right) 05Shift Display right 07Shift display left 08Display off, cursor off 0ADisplay off, cursor on 0CDisplay on, cursor off 0EDisplay on, curs or blinking 0FDisplay on, cursor blinking 10Shift cursor position to left 14Shift cursor position to right 18Shift the entire display to the left 1CShift the entire display to the right 80Force cursor to beginning of 1st line C0Force cursor to beginning of 2nd line 382 lines and 5Ãâ€"7 matrix 5. 6 Power Supply Unit: The input to the circuit is applied from the regulated power supply. The a. c. input i. e. , 230V from the mains supply is step down by the transformer to 12V and is fed to a rectifier. The output obtained from the rectifier is a pulsating d. c voltage. So in order to get a pure d. c voltage, the output voltage from the rectifier is fed to a filter to remove any a. c components present even after rectification. Now, this voltage is given to a voltage regulator to obtain a pure constant dc voltage. Figure 5. : Power Supply Unit 5. 6. 1 Transformer: Usually, DC voltages are required to operate various electronic equipment and these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly. Thus the a. c input available at the mains supply i. e. , 230V is to be brought down to the required voltage level. This is done by a transformer. Thus, a step down transformer is employed to decrease the voltage to a required level. 5. 6. 2 Rectifier: The output from the transformer is fed to the rectifier. It converts A. C. into pulsating D. C. The rectifier may be a half wave or a full wave ectifier. In this project, a bridge rectifier is used because of its merits like good stability and full wave rectification. 5. 6. 3 Filter: Capacitive filter is used in this project. It removes the ripples from the output of rectifier and smoothens the D. C. Output received from this filter is constant until the mains voltage and load is maintained constant. 5. 6. 4 Voltage Regulator: As the name itself implies, it regulates the input applied to it. A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. In this project, power supply of 5V and 12V are required. In order to obtain these voltage levels, 7805 and 7812 voltage regulators are to be used. The first number 78 represents positive supply and the numbers 05, 12 represent the required output voltage levels. Three-Terminal Voltage Regulator: Fig 5. 3 shows the basic connection of a three-terminal voltage regulator IC to a load. The fixed voltage regulator has an unregulated dc input voltage, Vi, applied to one input terminal, a regulated output dc voltage, Vo, from a second terminal, with the third terminal connected to ground. For a selected regulator, IC device specifications list a voltage range over which the input voltage can vary to maintain a regulated output voltage over a range of load current. The specifications also list the amount of output voltage change resulting from a change in load current (load regulation) or in input voltage (line regulation). GND4 Figure 5. 3: Fixed Positive Voltage Regulator CHAPTER 6 RELAY DRIVER, RELAYS & DEVICES 6. 1 Introduction: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance we may use two ransistors to form a Darlington pair. This pair in CC configuration provides input impedance as high as 2Mohms. The input signal varies with the base current of the first transistor this produces variation in the collector current in the first transistor. The emitter load of the first stage is the input resistance of the second stage. The emitter current of the first transistor is the base current of the second transistor. The IC is as shown in figure 6. 1. . Figure 6. 1: ULN2003 Relay driver 6. 2 Features: The features of ULN2003 relay driver are: Output current (single output) 500mA MAX High sustaining voltage output 50v MIN Output clamp diodes Input compatible with various types of logic 6. 3 Pin Diagram & Description: Fig 6. 2: Pin diagram of ULN 2003 The IC is of 16-pin and is a monolithic linear IC. It has 7darlington pairs internally of 7 inputs and 7 outputs i. e. 1 to 7 are inputs of Darlington pairs and 10 to 16 are the outputs, 8-pin is ground and 9-pin is common freewheeling diode. Applications: The ULN 2003 driver is used in Relays Hammer Lamps Display (LED) drivers 6. 4 Relays: 6. 4. 1 Introduction: The relay is a device that acts upon the same fundamental principle as the solenoid. The difference between a relay and a solenoid is that a relay does not have a movable core (plunger) while the solenoid does. Where multiple relays are used, several circuits may be controlled once. Relays are electrically operated control switches, and are classified according to their use as POWER RELAYS or CONTROL RELAYS. Power relays are called CONTACTORS, control relays are usually known simply as relays. The function of a contactor is to use a relatively small amount of electrical power to control the switching of a large amount of power. Control relays are frequently used in the control of low power circuits. . 4. 2 Electromagnetic Relay: Relays in which the relative movements of their mechanical components produce preset responses under the effect of the current in the input circuit are called electromagnetic relays. The relay used in this project is electromagnetic relay which is shown in figure 6. 4. 2. Figure 6. 3: Electromagnetic Relay 6. 4. 3 Operation: OperationAndWhen a certain voltage or current is applied to both ends of the coil of an electromagnetic relay, the magnetic flux passes through the magnetic circuit composed of iron core, yoke iron, armature iron and the magnetic circuit operation air gap. Under the influence of magnetic field, armature iron is attracted to iron core pole face thus propelling normally closed contact to open and normally open contact to close, when the applied voltage or current at both ends of the coil is lower than a certain value and mechanical reactance is greater than electromagnetic attraction, armature iron is restored to the original state and normally open contact opens and normally closed contact closes. 6. 4. 4 Components of Electromagnetic Relay: Electromagnetic relay is composed of magnetic circuit system, contact system and return mechanism. Magnetic circuit system is made up of such parts as iron core, yoke iron, armature iron and coil. Contact system is composed of such parts as static contact spring, movable contact spring and contact seat. Return mechanism is made up of return springs of draw springs. Figure 6. 4: Components of Electromagnetic Relay 6. 5 Devices: The devices include microwave oven, electric bulbs, fans, motors, coolers, etc. Any of the devices can be operated from anywhere by interfacing them to the microcontroller. CHAPTER 7 COMPONENTS INTERFACING WITH MICROCONTROLLER 7. MT8888C Interfacing With Microcontroller: The MT8888 DTMF transceiver is interfaced to the microcontroller port P2. The data pins of transceiver are interfaced with P2. 0-P2. 3 and the control pins are connected to P2. 4-P2. 7 as shown in figure 7. 1. PHILIPS 89C51MT8888 Figure 7. 1: Interfacing MT8888 with the microcontroller 7. 2 LCD Interfacing with the Microcontroller: Depending on how many lines are used for connection to the m icrocontroller, there are 8bit and 4bit LCD modes. The appropriate mode is determined at the beginning of the process in a phase called â€Å"initialization†. In the first case, the data are transferred through outputs D0-D7 as it has been already explained. In case of 4-bit LED mode, for the sake of saving valuable I/O pins of the microcontroller, there are only 4 higher bits (D4-D7) used for communication, while other may be left unconnected. Consequently, each data is sent to LCD in two steps: four higher bits are sent first (that normally would be sent through lines D4-D7), four lower bits are sent afterwards. With the help of initialization, LCD will correctly connect and interpret each data received. Besides, with regards to the fact that data are rarely read from LCD (data mainly are transferred from microcontroller to LCD) one more I/O pin may be saved by simple connecting R/W pin to the Ground. Such saving has its price. Even though message displaying will be normally performed, it will not be possible to read from busy flag since it is not possible to read from display. Here we used 8 bit LCD. The LCD is interfaced with microcontroller port P0. The data pins of LCD are interfaced with the Port 0 pins P0. 0-P0. 7 and the control pins of LCD are interfaced with Port 1 pins P1. -P1. 7 as shown in figure 7. 2. PHILIPS 89C51 LCD Figure 7. 2: Interfacing LCD to the Microcontroller Algorithm to send data to LCD: 1. Make R/W low 2. Make RS=0; if data byte is command RS=1; if data byte is data (ASCII value) 3. Place data byte on data register 4. Pulse E (HIGH to LOW) 5. Repeat the steps to send another data byte 7. 3 Interfacing devices with the microcontroller: The devices that are t o be controlled are interfaced with port 1 of microcontroller. Here we used four devices and they are interfaced to P1. 0-P1. 3 as shown in figure 7. 3. Figure 7. 3: Interfacing devices with the microcontroller CHAPTER 8 SOFTWARE DETAILS 8. 1 Keil  µVision 4: Keil was founded in 1986 to market the add-on products for development tools provided by many of the silicon vendors. Keil implemented the first C compiler designed from the ground up specifically for 8051 microcontroller. Keil provides broad range of development tools like ANSI C Compiler, macro assembler, debuggers and simulators, linkers, IDE library managers, real time operating system & evaluation boards for 8051 & ARM families. It is used to write programs for an application. The programs can be written in embedded C or in assembly language. 8. 1. 1 Evaluation of Keil Software: Start the  µVision Program Select new  µVision Project from the project menu Give the project name: prjname and save it with extension*. uvproj as shown in fig 8. 1. 1a After saving another window will be displayed to select the target device. In that select LPC 2478 from NXP (founded by Philips) from the data base given Select it and click OK a new project with target file will be created. Select the new†¦ from the file menu Type your c file Select save†¦ from file menu. The first time you save the program a dialog box will pop-up and allow you to name your file and file type. Save program with file name: xxxx. c The file type mentioned at last (. c) means embedded c language. Right click on source group and click add files to source group. This will add files to project as shown in figure 8. 1. 1(b) Right click on source group and select build all target files. This will create HEX file needed for ARM. Figure 8. 1: Starting a New Project in KEIL Figure 8. 1 indicates how to start a new project in KEIL software to develop a program. Select the name of the project ant save it as . v2, then a new project is created as shown in figure. Figure 8. 2: Adding Files to the Source Group Figure 8. 2 shows how we should add files to the source group after we created a new project using KEIL micro vision. Figure 8. 3: Program written in the File added to the Source Group Figure 8. 3 shows the picture after the program file is being added to the source group so t hat an ASM file is created for the source file where code is written. 8. 1. 2 Using the Keil dscope Debugger: Select start /stop debug session from debug menu The debug program will start a new session as shown in figure 8. 1. 1(d) Select File, load object file from the program menu. Change the file type to HEX Select your hex file, e. g. xxxx. Hex Click OK You should now see the source code of the file typed in earlier Select Peripherals, GPIO Fast Interface, Ports required from the program menu. So that you can see the how output varies on ports. Select Port 0, Port 1, Port 2, Port 3 and port 4. Select Peripherals, UART, UARTs required from the program menu. So that you can see the how output varies on UARTs. Select UART0, UART1, UART2 and UART3. Click on go to see the real time update of the I/O ports. Click on stop when you are finished. You can also single step through you program or set break points at locations that you want the debugger to stop at. To set a breakpoint, double click on the line. Figure 8. 4: Debugging the code using Start/Stop Debug Session Figure 8. 4 shows that after the ASM file is created, it should be debugged using Start/Stop Debug Session. The program debuuging starts when we press the start and it can be ended using stop. Figure 8. 5: After Debugging, the value of the registers 8. 2 Flash Magic Software: The flash magic software is one of the best known microcontroller programs dumping software. It has the compatibility with the KEIL software. The HEX file generated by the KEIL is used by the FLASH MAGIC to program the microcontroller. The software uses the computer serial port to transmit data into microcontroller. It has many options like appending the code, erasing the memory, reading from the microcontroller etc to dump the code program first the FLASH MAGIC has to be provided with necessary information about the target, the band rate supported, the clock frequency,etc. ,then the software checks for the device connected to the computer serial port. If the target is not connected, an error is generated. The software then checks for the available memory and the size of file to be dumped. Then it checks whether the target (microcontroller) is in ISP (In –system programming) mode or not. If everything is fine then, it starts writing into the microcontroller using the serial data transfer pins Txd and Rxd pins on the microcontroller. After the code is loaded into the microcontroller, even the power goes off , the code will not be lost as it is stored in the EEPROM which is not volatile. Giving the RESET will restart the program execution from the beginning. We have seen that using a high level language improves the readability of the program, makes the programming process more efficient, and makes it possible to write portable code. The compiler generates the assembly code and therefore places a large role in determining the actual CPU operation. Because compilers are not as smart as programmers are, the machine code generated by compiler if typically larger and less efficient than the machine code generated from assembly source code. This may be disconcerting to some programmers, but it is not a good enough reason to avoid high level languages. Instead, it means that you must know yourcompiler and know how the different parts of your C code will be implemented. Figure 8. 2: Flash Magic for dumping the code into the microcontroller Flow Chart: NO YES YESYES NO YES YES NO YESYES NO YESYES NO 8. 4 Source Code: /***DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE***/ /*****************************BATCH – A2***********************************/ /********DTMF INITIALISATION********/ Dtmf_data equ p2 Dtmf_wr equ p2. 7 Dtmf_cs equ p2. 6 Dtmf_rs0 equ p2. 4 Dtmf_rd equ p2. 5 /********LCD INITIALISATION*********/ Lcddata equ p0 Lcd_rs equ p1. 5 Lcd_rw equ p1. 6 Lcd_en equ p1. 7 /*******DEVICES INITIALISATION********/ dev1 equ p1. 0 dev2 equ p1. 1 dev3 equ p1. 2 dev4 equ p1. 3 psswrd bit 21 org 00h mov p1,#0f0h mov r0,#50h call Dtmf_init call Lcd_init /*call DispLine1 mov dptr,#Proj_name call Disp_string call delay call DispLine2 mov dptr,#Proj_name1 call Disp_string call delay call DispLine3 mov dptr,#Proj_name2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#College_name call Disp_string call delay call Clr_Display call DispLine2 mov dptr,#College_location call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#TEAM call Disp_string call DispLine2 ov dptr,#NAME1 call Disp_string call DispLine3 mov dptr,#NAME2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#NAME3 call Disp_string call DispLine2 mov dptr,#NAME4 call Disp_string call DispLine3 mov dptr,#NAME5 call Disp_string call DispLine4 mov dptr,#NAME6 call Disp_string call delay call Clr_Display */ main: call Clr_Display mov dptr, #myname call Disp_string clr psswrd Rx_tone: mov a,#8fh call Lcd_cmnd mov r0,#50h mov r7,#00h store_tone: call delay50ms clr a call read_sta_reg jnb acc. 2,store_tone call read_rx_data_reg anl a,#0fh jb psswrd,compare mov @r0,a mov a,#†*† call Lcd_data_out inc r0 inc r7 jne r7,#04,store_tone mov r0,#50h mov a,@r0 cjne a,#1,invalid_Tone inc r0 mov a,@r0 cjne a,#2,invalid_Tone inc r0 mov a,@r0 cjne a,#3,invalid_Tone inc r0 mov a,@r0 cjne a,#4,invalid_Tone call Clr_Display mov dptr,#yesOk call Disp_string setb psswrd jmp store_tone invalid_Tone: call Clr_Display mov dptr,#NotOk call Disp_string clr psswrd call delay50ms call delay50ms jmp main /***********************************************/ compare: cjne a,#01,label1 setb dev1 call Clr_Display call DispLine1 mov dptr,#labela call Disp_string setb psswrd jmp store_tone label1:cjne a,#02,label2 setb dev2 call Clr_Display call DispLine2 mov dptr,#labelb all Disp_string setb psswrd jmp store_tone label2:cjne a,#03,label3 setb dev3 call Clr_Display call DispLine3 mov dptr,#labelc call Disp_string setb psswrd jmp store_tone label3:cjne a,#04,label4 setb dev4 call Clr_Display call DispLine4 mov dptr,#labeld call Disp_string setb psswrd jmp store_tone label4:cjne a,#05,label5 clr dev1 call Clr_Display call DispLine1 mov dptr,#labele call Disp_string setb psswrd jmp store_tone label5:cjne a,#06,label6 clr dev2 call Clr_Display call DispLine2 mov dptr,#labelf call Disp_string setb psswrd jmp store_tone label6:cjne a,#07,label7 clr dev3 call Clr_Display call DispLine3 mov dptr,#labelg all Disp_string setb psswrd jmp store_tone label7:cjne a,#08,label8 clr dev4 call Clr_Display call DispLine4 mov dptr,#labelh call Disp_string setb psswrd label8: jmp store_tone /*————-Dtmf_init———————-*/ Dtmf_init: call read_sta_reg mov a,#00h call write_cnt_reg mov a,#00h call write_cnt_reg mov a,#08h call write_cnt_reg mov a,#00h call write_cnt_reg ca ll read_sta_reg ret read_sta_reg: mov Dtmf_data,#0ffh setb Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret write_cnt_reg: mov Dtmf_data,a setb Dtmf_rd clr Dtmf_wr setb Dtmf_rs0 clr Dtmf_cs nop nop etb Dtmf_cs setb Dtmf_wr ret read_rx_data_reg: mov Dtmf_data,#0ffh clr Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret /***********Lcd Display*******************/ Lcd_init: mov a,#30h call Lcd_cmnd mov a,#38h call Lcd_cmnd mov a,#06h call Lcd_cmnd mov a,#0ch call Lcd_cmnd mov a,#01h call Lcd_cmnd ret Lcd_cmnd: call delay_50ms mov Lcddata,a clr Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Lcd_data_out: call delay_50ms mov Lcddata,a setb Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Disp_string: clr a movc a,@a+dptr jz exit call delay_50ms call Lcd_data_out nc dptr jmp Disp_string exit:ret /*****************************************************/ /***************************** ************************/ ;routine for clearing display Clr_Display: mov a,#01h call lcd_cmnd ret /****************************************************/ /****************************************************/ ;this routine is for display in different lines DispLine1: mov a,#80h call LCD_Cmnd ret DispLine2: mov a,#0C0h call LCD_Cmnd ret DispLine3: mov a,#94h call LCD_Cmnd ret DispLine4: mov a,#0D4h call LCD_Cmnd ret /*****************************************************/ delay: call Delay50ms call Delay50ms all Delay50ms call Delay50ms call Delay50ms ret delay50ms: mov r2,#5 back2:mov r1,#200 back1:mov r5,#250 back:djnz r5,back djnz r1,back1 djnz r2,back2 ret delay_50ms: mov r4,#20 back4:mov r3,#250 back3:djnz r3,back3 djnz r4,back4 ret /*————————————-*/ ;Display String data Proj_name: DB â€Å"DTMF REMOTE APPLIANCE â€Å",0 Proj_name1: DBâ€Å"CONTROL SYSTEM†, 0 Proj_name2:DB†USING MOBI LE PHONE†, 0 College_name:DB â€Å"MIC COLLEGE OF TECHNOLOGY â€Å", 0 College_location: DB † KANCHIKACHERLA â€Å", 0 TEAM:DB † DEVELOPED â€Å", 0 NAME1: DB † BY â€Å", 0 NAME2: DB † A2 BATCH â€Å", 0 NAME3: DB † LAVANYA â€Å", 0 NAME4: DB † SIRISHA â€Å", 0 NAME5: DB † PAVAN KUMAR â€Å", 0 NAME6: DB † KISHORE â€Å", 0 myname: DB â€Å"ENTER PASSWORD:†,0h yesOk: DB â€Å"VALID PASSWORD†,0h NotOk: DB â€Å"INVALID PASSWORD†, 0h labela:db † DEVICE1 ON â€Å",0 labelb:db † DEVICE2 ON â€Å",0 labelc:db † DEVICE3 ON â€Å",0 labeld:db † DEVICE4 ON â€Å",0 labele:db † DEVICE1 OFF â€Å",0 labelf:db † DEVICE2 OFF â€Å",0 labelg:db † DEVICE3 OFF â€Å",0 labelh:db † DEVICE4 OFF â€Å",0 end CHAPTER 9 ADVANTAGES & APPLICATIONS 9. 1 Advantages: Increased productivity Low cost Reduces power consumption Virtual control of appliances High security 9. Disadvantages: No acknowledgement Switch-device pair should be known Network failure 9. 3 Applications: Other applications of this circuit include Agriculture Industry Colleges Schools Future Enhancement: Acknowledgement of the deviceâ⠂¬â„¢s initial condition through SMS. This system can be expanded to provide control over the GPRS. CONCLUSION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† overcomes the limitations of Wireless Domestic Automation which uses a transmitter and receiver to control the home appliances. It resembles a virtual human controlling the remote appliances using a control unit and a mobile phone. It mainly uses DTMF transceiver for decoding the tones generated by the mobile phone, which is given to the micro-controller to control the appliances. The remote appliances control system using mobile phone will one day become a reality and it may revolutionize our way of living. The wide areas of application include controlling the appliances like microwave oven, lighting fans, lights, etc. Another major application is industrial automation as it reduces the power consumption and is of low cost. As this system is implemented using in 2G communication network, the video data cannot be obtained. Future work includes research on the robot control system in 3G communication networks which facilitates controlling the remote robot using DTMF of mobile phone, with video data from the remote mobile robot’s camera. The Future enhancement also includes control of GPRS system using this system. REFERENCES Text Books: The 8051 Micro Controller architecture and embedded systems by Mazidi and Mazidi. Other References: www. atmel. com www. alldatasheets. com www. electronicshub. com www. philips. com International Journal of Electrical & Computer Sciences IJECS Vol: 9 No: 10