Friday, June 7, 2019
Books are dead Essay Example for Free
Books are dead EssayIt could be said that books are dead which leads to the question, What are people doing instead? People are buying and use modern technology indeed of reading books because books are tedious. Would you rather read through a whole chapter in a book just to consider an answer to a question, or type in key words into a search engine on a computer and the information be found instantly? Other technologies such as video, internet and DVD, pass superseded them. The more advanced technology appeals to a wider audience and society is not pressurised into enjoying it from an untimely age if they do not want to, as in the case of books. Books are seen as primitive and dated because they have less to offer the succeeding(prenominal) generation in the form of enjoyment. Furthermore, books are not fashionable in the twenty-first century. This is because popularity within the community is directly proportional to whether the individual has the newest technology or no t.The most popular individual has the most recent technological development, such as the la analyze mobile telephone, and the not so popular individual is odd behind, still reading books. Technology is a way to show off and showing off is a way of making new friends and keeping the active ones. In addition, we would not have moved forward in time without new technology. For example, in the future, we will be able to travel into space and back, which we would not be able achieve using books.Of course, the maths and science would have originated from books but you would need technology to apply it. There is not point in publishing books anymore because no one has the time to sit down and read them. This is because they are boring and it is too much effort. You also have to be in the right mood to read a book, whereas you do not need to be with technology since there are so many alternatives. Books are a waste of paper and ink, and are we not trying to save the environment? Moreover, books are made by technology, for example, the printing press is made up of machines.So why not use technology in other ways that will be appreciated more? On the other hand, books have survived every new technological development, unlike the video recorder being superseded by the DVD recorder, within a few decades. Books have, and will stand the test of time because one can escape into a story in a book and enjoy it without the need for anyone else. Disappearing into a book is an idealist fantasy because you can interpret it in so many different ways. It also makes a nice change from the more advanced technology the solid ground has to offer.
Thursday, June 6, 2019
Katherine Okikiolu Essay Example for Free
Katherine Okikiolu EssayKatherine Okikiolu comes from a mathematical family, her father is a mathematician and inventor and her come is a high school mathematics teacher. Her parents met when her father left Nigeria to study mathematics at the same college in England where her mother was studying physics. Her father, the Nigerian George Okikiolu, has pen more mathematics papers than any other Black mathematician. She is married to mathematician Hans Lindblad.Okikiolu earned her B.A. in Mathematics from Cambridge University in England before coming to the United States in 1987 to attend graduate school mathematics at UCLA the University of California, Los Angeles. There, she worked with two mentors, Sun-Yung (Alice) Chang and John Garnett, and was able to solve a problem concerning asymptotics of determinants of Toeplitz operators on the sphere and a system of Peter Jones, characterizing subsets of rectifiable curves in Euclidean n-space.After her doctorate, Kate went, in 1993 , to Princeton University where she was an Instructor and an Assistant Professor until 1995. From 1995 until 1997 she was a visiting Assistant Professor at MIT. Since 1997, she has been on the faculty in the Mathematics Department of the University of California, San Diego (UCSD), first as an Assistant Professor. Also in 1996, Dr. Okikiolu spoke as part of the twenty-fifth anniversary solemnisation for Association of Women in Mathematics (AWM).In 2002, she gave the Claytor-Woodard lecture at the NAM meeting the Joint Mathematics Meetings. In June 1997, Kate Okikiolu was the first Black to win the most esteemed award for young mathematics researchers the United States, a Sloan Research Fellowship. In 1997, UCSD promoted her to Associate Professor. The $70,000 Sloan Fellowship was not her only award of 1997.
Wednesday, June 5, 2019
Library Management System Based On Finger Prints And RFID
Library Management System establish On Finger Prints And RFIDChapter 1 IntroductionLibrary management brass take tos aras such(prenominal)(prenominal) as issuing and returning of ledgers, classification of materials, and savants console exploitation different techniques. The deuce briny features of this system include theft detection of unissued books and robotic system for issuing and returning of books for its members. The theft detection model that we pitch tendencyed though as yet merely for demonstrational purposes peck be extremely beneficial if implemented properly as a professional library system. The cost-efficient wont of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key section which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by utilise radio waves in redact to exchange the data between a indorser and an electronic punctuate which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to squ ar off out whether RFID technology offers any(prenominal) significant benefit for library management and that how does these benefits meditate to the customer satisfaction. RFID technology had its first commercial applications introduced in the young 1980s. Since t all in allyly technologies hasten advanced in different fields causing the cost of RFID grades and ratifiers to go decrease, thus making it slowly available to a broader market. For example, as RFID tails have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardw are founder in this library management system is comprised of interrogators ( similarly know as RFID sound outers), RFID get behinds (also known as labels), the reproduce staff and an alarm.The interrogators or the RFID referees direct on 125 KHz are engagement to read the tag sum up of the books when brought near to it in order to fulfill its identification number and check for its status.The tags are the crooks, small in size, less in thickness, attached to the books having a unique identification number all(prenominal) in order to distinguish between the books. These when hindquartersd near the referee sends its identification number to it for save processing.The fingerprint mental faculty is apply for the student console. The student can login his grievance for status updates using fingerprint recognition system.The alarm is apply in case if an unissued book is sensed by the RFID reader in the operate zone.The software part is composed of the database systems and an interfacing tool for database components.The students details are listed in database systems. These are automatically accessed when the student uses the student console feature.The forms of students are created in the visual studio and thi s tool is also utilise to compare the database components with the incoming string in order to update the status of the student.An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and therefore emit or send its code to the RFID reader. The reader find oneselfs tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book utilize to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its instruction to the reader, such as unique code and other data barge ind on, the reader receives those information and decodes them, and consequently sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two unit of measurement of measurements namely the main unit and the anti theft unit. on that tip is a wireless connection between these two units. The student can login his account by using the fingerprint recognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When difference through the anti theft unit in the exit zone, an RFID reader placed in this zone leave alone read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent backward to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected.Chapter 2 literature review2.1 History of RFIDA scientist, Lon Theremin invented an espionage tool for Soviet Union which genetic radio waves with audio information in 1948. The device was a passive covert listening object, non an identifi cation tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the RFID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID it was a passive radio tag with keeping. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the new-made York Port Authority and other potential users. It was consisted of a transponder with 16 bit store for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic authorize plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit fluff), security measures m easure (personnel identification, automatic gates)2.2 BackgroundRFID systems has established in a wide orbit of markets including tagging, stock identification and automated vehicle identification (AVI) systems because of its ability to track touching objects.2.2.1 RFID TAGSThe RFID tags are also known as transponders. RFID tags can come in many forms, shapes and different sizes. Some are apply which are less than 0.05mm, which were utilize to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the barbel to an RFID reader. There are two commonly utilize RFID Transponders nimble (that has an privileged power source) and Passive (that do non have an internal power source, but are externally powered from the RFID reader).2.2.2 RFID READERA reader (also both(prenominal)times called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a littleprocessor or digital signal processor. The reader ant enna captures data from tags whence passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated rophy (which is a silicon chip) and wherefore the data is sent to the host computer for further processing.2.2.3 WORKING OF RFID schooling is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatenergizes the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication portholes (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action.2.2.4 FREQUENCIES OF RFIDRFID deployments tend to use unauthorised frequencies for their obvious cost benefits. There are quaternary commonly employ frequencies The commonly utilize frequencies ar e v Low frequency (125/134.2 KHz) v risque frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v cook (2450 MHz) It is important to remember that maximum function is not inevitable in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and micro-cook tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the grow on which the tag is mounted.2.3 FUTURE OF RFIDRFID is known by many in the effort to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the issue chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house.2.4 APPLICATIONS2.4.1 Electronic Vehicle RegistrationIn many countries of the world, security of vehicles is a major concern, Government uses the RFI D system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is steadying in their retrieval also.2.4.2 Payment by mobile phonesTwo credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop specialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card.2.4.3 Transportation paymentsFor traffic management, organisation use RFID applications. Automotive companies also use various RFID tracking solutions for product management.2.4.4 crop trackingRFID is also apply in product tracking application, begins with plant-based labor processes, and then extends into post sales configuration management for large buyers.2.4.5Animal identification un markable of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become piv otal in animal identification management.2.4.6 MuseumsRFID technologies are implemented for the user also in museums. An example was the custom- knowing temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California.2.4.7 Race timingsRFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or one-on-ones in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for e truly entrant. 2.5 Problems and concerns2.5.1 Data fillEach tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is necessary to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from vociferous and redundant raw data to significant processed data.2.5.2 Global criterionizationFrequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To dispense international trade concerns, it is necessary to utilize a tag that is usable within all of the international frequency domains.2.5.3 Security concernsA primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a luck to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the social united States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products.2.5.4 Temperature exposure menstruationly, RFID tags are glued with an integrated circuit (IC) to an inlay. V ibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit2.6 reproduce AUTHENTICATIONfingermark authentication refers to automated method of verifying a accord between two fingerprints. Fingerprint is one of the many forms of the biometrics used to identify an individual as easily as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different.2.6.1 Why fingerprint?In the IT world the end-users use fingerprint authentication due to some crusades, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms standardized smart cards, tokens, etc. require you to carry some thing. This is far better than a password, also easies to lose. Losing your credit card or impulsive license is worse. Information is priceless and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user attested via fingerprints can take advantage of a solid security system nominal education.Chapter 3 Requirements Specification3.1 Non- serviceal Requirements3.2 External requirements3.3 Functional Requirements3.3.1 Category 1 interest requirements should be met under given priorities3.3.2 Category 23.3.3 Category 3Chapter 4 Project Design4.1 Architecture OverviewThe design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the boilersuit interactions of the modules and their placements.4.2 Required ComponentsMicrocontroller PIC18F452RF transceiver nRF905Fingerprint module SM630RFID reader module ID20RS232 number one woo d IC MAX2324.3 MICROCONTROLLER PIC18F4524.3.1 DescriptionPIC18F452 is the member of PIC18F family. It is a low power, high performance audacious 8-bit microcontroller with 32 Kbytes of tatty platformmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. The on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit back-to-back programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embed control applications. The 8951 provides the following features. 4.3.2 surrender layout4.3.3 Features and specificationsProgram memory type flash v Program memory 32 KB v CPU urge on 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our p roject as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more sure and efficient than others.4.4 RF transceiver nRF9054.4.1 DescriptionThe nRF905 is a radio transceiver for the 433/ 868/ 915 MHz doctrine band on a single chip. This transceiver consists of fully integrated frequency synthesizer, telephone receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an product power of -10dBm, and in receive mode 12.5mA. Built-in power surmount modes makes power saving easily realizable. Its pin configuration is as follows4.4.2 FeaturesData rate 50 kbps v direct frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630SM6 30 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections4.5.1 FeaturesHigh Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v in operation(p) Voltage 4.3V6V v Fingerprint Template 768 templates v User Flash Memory 64KByte v Interface Protocol Standard resultant interface TTL train v Communication Baud Rate 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL rig which is easy to process. It can be easily controlled by the commands to get the desired produce. Adding, deleting, searching and matching commands are easy to implement in this module.4 .6 RFID reader module ID20This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string produce containing the unique ID of the card. It uses weigand26 protocol.4.6.1 Pin descriptionIts pin description is as follows4.6.2 Features5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm4.7 RS232 Driver IC MAX2324.7.1 DescriptionMAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output 7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any vol tages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as high as 25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V.Chapter 5 effectuation5.1 Designing the RFID reader moduleWe started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below5.1.1 Problems in the design of the readerThe mai n obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market.5.1.2 Antenna design of TRX7960The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows v Frequency = 13.56 MHz v resistance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v shade Factor = 6.75 v frustrate spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 HThis loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used whi ch is composed of a series capacitor, reduplicate capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna.5.2 Implementation with the RFID module ID20Due to the obstacles faced in implementing the design of the reader, the RFID reader module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also affiliated with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in whi ch the RF transceiver is machine-accessible with the microcontroller. The RFID reader module is also connected in this unit.5.3 Working of the system5.3.1 Main unitThere are 5 external dismissions attached with the main circuit board. quatern of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleting the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and al so pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connected with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functions are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa.5.3.2 Antitheft UnitThis unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microc ontroller. The microcontroller will send this id to main unitLibrary Management System Based On Finger Prints And RFIDLibrary Management System Based On Finger Prints And RFIDChapter 1 IntroductionLibrary management system includes areas such as issuing and returning of books, classification of materials, and students console using various techniques. The two main features of this system include theft detection of unissued books and automatic system for issuing and returning of books for its members. The theft detection model that we have designed though as yet merely for demonstrational purposes can be extremely beneficial if implemented properly as a professional library system. The efficient use of technology can greatly enhance the library environment and thus prove a technological milestone in the sector. The key component which plays an important role in this syetem is the Radio-frequency identification(RFID) technology. This technology establishes communication by using radio waves in order to exchange the data between a reader and an electronic tag which is attached to an object(a book), for the purpose of identification. The goal of this thesis is to find out whether RFID technology offers any significant benefit for library management and that how does these benefits reflect to the customer satisfaction. RFID technology had its first commercial applications introduced in the late 1980s. Since then technologies have advanced in different fields causing the cost of RFID tags and readers to go decrease, thus making it easily available to a broader market. For example, as RFID tags have become cheaper, libraries have started adopting this technology, thus ensuring a secure library system. The hardware part in this library management system is comprised of interrogators (also known as RFID readers), RFID tags (also known as labels), the fingerprint module and an alarm.The interrogators or the RFID readers operating on 125KHz are used to read the tag numbe r of the books when brought near to it in order to process its identification number and check for its status.The tags are the devices, small in size, less in thickness, attached to the books having a unique identification number each in order to distinguish between the books. These when placed near the reader sends its identification number to it for further processing.The fingerprint module is used for the student console. The student can login his account for status updates using fingerprint recognition system.The alarm is used in case if an unissued book is sensed by the RFID reader in the exit zone.The software part is composed of the database systems and an interfacing tool for database components.The students details are listed in database systems. These are automatically accessed when the student uses the student console feature.The forms of students are created in the visual studio and this tool is also used to compare the database components with the incoming string in ord er to update the status of the student.An RFID reader transfers energy to the RFID tag by emitting electromagnetic waves through the air. The tag uses this RF energy to charge up and then emit or send its code to the RFID reader. The reader receives tags response and sends to a host computer or any other external device for further processing. In practical applications of using RFID technology, a tag is attached to a book used to identify the target, when it passes through the area which the reader can read, the RFID tag and its reader builds up the radio signal connections, the tag sends its information to the reader, such as unique code and other data stored on, the reader receives those information and decodes them, and then sends to a host computer so as to complete the whole information processing. The whole management system can be divided into two units namely the main unit and the anti theft unit. There is a wireless connection between these two units. The student can login his account by using the fingerprint recognition system. Then he can place the particular book in the area near the RFID reader in order to issue in or return from his account. When passing through the anti theft unit in the exit zone, an RFID reader placed in this zone will read the code of this book and send wirelessly to the main unit, to the PC. There the status of the book will be checked and again sent back to the anti theft unit. If it sends TRUE, the anti theft will let the book go safe and sound. If it sends FALSE, alarm will ring and thus theft will be detected.Chapter 2 literature review2.1 History of RFIDA scientist, Lon Theremin invented an espionage tool for Soviet Union which transmitted radio waves with audio information in 1948. The device was a passive covert listening object, not an identification tag, and it attributed as a predecessor to RFID technology. The RFID technology has been in use from 1921 according to one source (although same source states that the R FID systems have been around since the late 1950s). Mario Cardulistos in 1971 was the first inventor of modern RFID it was a passive radio tag with memory. Initially, it was a passive device, powered by the interrogating signal, and it was demonstrated in 1974 to the New York Port Authority and other potential users. It was consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates)2.2 BackgroundRFID systems has established in a wide range of markets including tagging, stock identification and automated vehicle identification (AVI) syste ms because of its ability to track moving objects.2.2.1 RFID TAGSThe RFID tags are also known as transponders. RFID tags can come in many forms, shapes and different sizes. Some are used which are less than 0.05mm, which were used to study the behaviour of ants. Data is stored in the tag IC which is transmitted through the antenna to an RFID reader. There are two commonly used RFID Transponders Active (that has an internal power source) and Passive (that do not have an internal power source, but are externally powered from the RFID reader).2.2.2 RFID READERA reader (also sometimes called an RFID interrogator) is basically a radio frequency (RF) transciever, which is being controlled by a microprocessor or digital signal processor. The reader antenna captures data from tags then passes the data to a computer or external source for processing. The reader decodes the data encoded in the tag integrated circuit (which is a silicon chip) and then the data is sent to the host computer for further processing.2.2.3 WORKING OF RFIDInformation is sent to and received from the RFID tags by a reader using radio waves. In systems which are passive, are the most common, an RFID reader transmits an energy field thatenergizes the tag and induces the power into the tag to respond to the reader. The data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner as data scanned from bar code stickers is captured and passed to a PC for processing, storage, and action.2.2.4 FREQUENCIES OF RFIDRFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies The commonly used frequencies are v Low frequency (125/134.2 KHz) v High frequency (13.56 MHz) v Ultra high frequency ( 869 and 915 MHz) v Microwave (2450 MHz) It is important to remember that maximum range is not required in all the applications. Tags in the LF/HF band have a range of 2.25 to 46 cm approximately, while passive UHF tags can reach up to 6.3 meters, and microwave tags can reach 0.5 to 1.9 meters. The range of the tag greatly depends on the surface on which the tag is mounted.2.3 FUTURE OF RFIDRFID is known by many in the industry to be the leading technology for automatic identification and collection of data. The biggest, as of yet unproven, benefit would ultimately be in the supply chain of goods of the customers where an RFID tag attached to a consumers product could be tracked from manufacturing to the retail store right to the consumers house.2.4 APPLICATIONS2.4.1 Electronic Vehicle RegistrationIn many countries of the world, security of vehicles is a major concern, Government uses the RFID system for Vehicle Registration. With implementing RFID systems, we can detect stolen cars and it is helpful in their retrieval also.2.4.2 Payment by mobile phonesTwo credit card companies are working with Dallals since 2009, Texas-based Device Fidelity to develop spec ialized micro cards. When these cards are inserted into the mobile phones, the mobile phone directly connects with the bank account and we can use it as credit card.2.4.3 Transportation paymentsFor traffic management, government use RFID applications. Automotive companies also use various RFID tracking solutions for product management.2.4.4 Product trackingRFID is also used in product tracking application, begins with plant-based production processes, and then extends into post sales configuration management for large buyers.2.4.5Animal identificationOne of the oldest uses of RFID technology is animal tagging. Originally meant for large ranches and rough terrain, since mad-cow disease, RFID has become crucial in animal identification management.2.4.6 MuseumsRFID technologies are implemented for the user also in museums. An example was the custom-designed temporary research application, eXspot, at the Exploratorium, a science museum in San Francisco, California.2.4.7 Race timingsRFID can also be used in racing. Till 1990 it is used in animal racing. First time it is implemented in pigeons racing. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant. 2.5 Problems and concerns2.5.1 Data floodingEach tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data.2.5.2 Global standardizationFrequencies are using for RFID in the USA currently incompatible with those of Europe or Japan. Furthermore, no standard has yet become as universal as the barcode. To address international trade concerns, it is necessary to utilize a ta g that is operational within all of the international frequency domains.2.5.3 Security concernsA primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defenses recent adoption of RFID tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products.2.5.4 Temperature exposureCurrently, RFID tags are glued with an integrated circuit (IC) to an inlay. Vibration and high temperatures can break the connection. If the IC connection break with the inlay, the RFID tag will not transmit2.6 FINGERPRINT AUTHENTICATIONFingerprint authentication refers to automated method of verifying a match between two fingerprints. Fingerprint is one of the many forms of the b iometrics used to identify an individual as well as verify their identity. Each individual has a unique pattern in his fingerprints. There are some unique points in known as minutia points in the fingerprints of the individuals. The number of these points, their location, distance from each other, vary from person to person. Every individual has these characteristics different.2.6.1 Why fingerprint?In the IT world the end-users use fingerprint authentication due to some reasons, i.e. security, and there is the reason that is why they establish, but it is very expensive to maintain. Other authentication mechanisms like smart cards, tokens, etc. require you to carry something. This is far better than a password, also easies to lose. Losing your credit card or driving license is worse. Information is valuable and harder to track than money. Fingerprints also acts as a simple, trusted and convenient user interface to a well thought security plan. A user authenticated via fingerprints ca n take advantage of a solid security system minimal education.Chapter 3 Requirements Specification3.1 Non-functional Requirements3.2 External requirements3.3 Functional Requirements3.3.1 Category 1Following requirements should be met under given priorities3.3.2 Category 23.3.3 Category 3Chapter 4 Project Design4.1 Architecture OverviewThe design of the intended product is explained graphically with the help of a block diagram shown in figure below. The diagram explains the overall interactions of the modules and their placements.4.2 Required ComponentsMicrocontroller PIC18F452RF transceiver nRF905Fingerprint module SM630RFID reader module ID20RS232 Driver IC MAX2324.3 MICROCONTROLLER PIC18F4524.3.1 DescriptionPIC18F452 is the member of PIC18F family. It is a low power, high performance flash 8-bit microcontroller with 32 Kbytes of Flash programmable and erasable read only memory (EEPROM). This device is compatible with the industry standard PIC18Fxxx instruction set and pin outs. Th e on-chip Flash allows the program memory to be quickly reprogrammed using a non-volatile memory programmer and in circuit serial programmer (ICSP). The 18F452 is a powerful microcomputer which provides a highly flexible and cost effective solution to many embedded control applications. The 8951 provides the following features. 4.3.2 Pin layout4.3.3 Features and specificationsProgram memory type flash v Program memory 32 KB v CPU speed 10 MIPS v Data EEPROM 256 bytes v RAM 1536 bytes v Digital communication peripherals 1-A/E/USART, 1-MSSP(SPI/I2C) v Ports A, B, C, D E v I/O pins 32 This microcontroller is more suitable for our project as it has more memory and instruction speed, as required by our system, than 16Fxxx family or ATMEL. The protocols used for digital communication are sort of built-in in this microcontroller. Moreover it is more reliable and efficient than others.4.4 RF transceiver nRF9054.4.1 DescriptionThe nRF905 is a radio transceiver for the 433/ 868/ 915 MHz ISM band on a single chip. This transceiver consists of fully integrated frequency synthesizer, receiver chain with demodulator, a modulator, a crystal oscillator and a power amplifier. Current consumption is very low, it transmits only 9mA at an output power of -10dBm, and in receive mode 12.5mA. Built-in power down modes makes power saving easily realizable. Its pin configuration is as follows4.4.2 FeaturesData rate 50 kbps v Operating frequency 433 MHz ISM band v Modulation technique GFSK v SPI interface v Power supply range 1.9 to 3.6 V v Channels 11 with v Channel switching time 4.5 Fingerprint Module SM630SM630 integrated fingerprint identification module is the release of Miaxis Biometrics Company. It consists of optical fingerprint sensor, a high performance DSP processor and a Flash. It boasts of functions such as fingerprint enrolment, fingerprint verification, fingerprint deletion, fingerprint download, fingerprint upload, etc. It has four pins connections4.5.1 FeaturesHigh Adaptation to Fingerprints v Easy to Use and Expand v Low Power Consumption v Integrated Design v Operating Voltage 4.3V6V v Fingerprint Template 768 templates v User Flash Memory 64KByte v Interface Protocol Standard serial interface TTL level v Communication Baud Rate 57600bps Figure 4 It was used as it is easy to interface with the microcontroller and reduces image processing coding. It gives out serial TTL output which is easy to process. It can be easily controlled by the commands to get the desired output. Adding, deleting, searching and matching commands are easy to implement in this module.4.6 RFID reader module ID20This RFID reader module is very simple to use. It has a built in antenna, the only holdup is the 2mm pin spacing (breakout board available below). Power the module, hold up a card, and get a serial string output containing the unique ID of the card. It uses weigand26 protocol.4.6.1 Pin descriptionIts pin description is as follows4.6.2 Features5V supply v 125kHz read frequency v EM4001 64-bit RFID tag compatible v 9600bps TTL and RS232 output v Magnetic stripe emulation output v Read range of 16+ cm4.7 RS232 Driver IC MAX2324.7.1 DescriptionMAX232 is an integrated circuit. It converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. It is a dual driver or receiver and it converts the RX, TX, CTS and RTS signals typically. This provide at output 7.5 from 5v supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0V to +5V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as high as 25V), to standard 5V TTL levels. These receivers have a typical threshold of 1.3V, and a typical hysteresis of 0.5V.Chapter 5 Implementation5.1 Designing the RFID reader moduleWe started our project with designing the RFID reader/writer module. The standard we followed was ISO15693 used in library for theft detection of unissued books. The standard frequency used in it was 13.56 MHz. The PCB layout was designed. The IC used in this reader was TRF7960. Its dimension was 4.854.85 mm. The PCB design of the reader was not accurate and of high quality as required. Later on, we came to know that SMD components were required when working with high frequency. Then SMD components were used to design the reader. Its PCB is shown in the figure below5.1.1 Problems in the design of the readerThe main obstacle we faced in the designing of this RFID reader was that its PCB design required tinning process as the IC consisted of 32 SMD pins, each separated 0.5 mm apart. The size of the TRF7960 IC was very small thus requiring a very accurate PCB. This would require 2-3 months and the time we had was short for this. Thus we switched to ID20 RFID module. This was quiet simple to use and easily available in the market.5.1.2 Antenna design of TRX7960The loop antenna used in the previous reader was designed and printed on PCB. Its parameters were found using the formulas and equations of loop antenna. Its parameters were as follows v Frequency = 13.56 MHz v Impedance = 50 Ohms v Antenna size = 0.027wavelength v Wavelength = 22.123894 m v Quality Factor = 6.75 v Track spacing=0.0508 cm v Track width= 0.127cm v L = 1.2608 HThis loop antenna is required to match with the 50 Ohm and has to be tuned to radiate with a high Q value. Therefore a matching and resonator circuit is used which is composed of a series capacitor, parallel capacitor and a parallel resistor. The capacitances are used to match the inductive load as well as to build a resonator. The resistor is used to decrease the Q-value of the resonant circuit for a better design of antenna.5.2 Implementation with the RFID module ID20Due to the obstacles faced in implementing the design of the reader, the RFID reade r module was used which gives out serial output. It has a built-in antenna as well as reasonable range. It is placed in the main unit and directly interfaced with the microcontroller. The fingerprint module SM630 and the RF transceiver nRF905 are also connected with the microcontroller. The former has the serial TTL serial input/output while the later has SPI interface. The RS232 is used to connect the main unit with the PC. The database application is installed in the PC which has a record of the student details. For the detection of unissued books, an anti-theft unit is designed in which the RF transceiver is connected with the microcontroller. The RFID reader module is also connected in this unit.5.3 Working of the system5.3.1 Main unitThere are 5 external buttons attached with the main circuit board. Four of them execute fingerprint module commands and two for the RFID reader. The fingerprint command buttons include Add button for adding new fingerprint, Delete button for deleti ng the fingerprint, Delete all button for deleting all fingerprint database and a Match button for matching the fingerprint. The function of the one button of the RFID reader is to issue and return the book from the students account. The main unit is operating on 3.3V and 5V. The RF transceiver and the microcontroller are operating on 3.3V. The MAX232, fingerprint module and RFID reader are operating on 5V. The LF33CV regulator IC is used to maintain 3.3V. For 5V, LM7805 is used in the power supply circuit board. Pin number 1 is pulled up by using 1Kohm resistor and also pulled down using 0.1uF capacitor. Pin number 11 and 32 are connected to VCC and pin number 12 and 31 to the ground. The crystal oscillator IC of frequency 20MHz is connected with the pin number 13 of the microcontroller. It generates clock pulses for executing the microcontroller instructions. Thus 5MHz is the operating frequency of the microcontroller. The external buttons for executing fingerprint and RFID functi ons are connected to port D, with pins from 19, 20, 21, 22 and 27. These buttons are pulled down by using 10kohm SIP. SIP is an integrated circuit consisting of resistors on a single chip having one point common. This common point decides the functionality of the SIP. If this point is connected with the VCC, it acts as pull up and vice versa.5.3.2 Antitheft UnitThis unit consists of a microcontroller (PIC18F452), RFID reader (ID-20), RF Transceiver (nRF 905) and some other same components. If any book will pass through this unit RFID will read its ID and send to microcontroller. The microcontroller will send this id to main unit
Tuesday, June 4, 2019
Measuring Zinc Intake Among Children in Luwelezi Mzimba
Measuring zinc Intake Among Children in Luwelezi MzimbaTITLE Validating the Zinc intake amongst Children fourth-year 24-36 months in Luwelezi Mzimba victimization fare frequency questionnaire.INTRODUCTIONOur bodies contain 1.5 to 2.5 grams of atomic number 30, found in all organs, tissues, and body fluids .Zinc is essential for the harvest-tide and repair of tissues because it is involved in the synthesis of DNA and RNA, therefore making Zinc Very primal for the Developing child (24-36 months). Zinc intake correlates directly with protein consumption, groups are at jeopardy because of limited meat intake. Zinc deficiency in children effects harvest-home retardation, skeletal abnormalities, impaired immunity and Poor wound healing. Zinc deprivation impairs harvest and development of infants and children. Evidenced with studies that showed zinc supplements produced highly significant improvements in linear growth and tip gain of children .Consequently Zinc intake estimate are important both for epidemiological studies and in the clinical setting. A reliable sound judgment of nutrient intake is a difficult task, and the choice of method depends on the begin of the study. Food frequency questionnaires (FFQs) is a practical tool for validating nutrient consumption, however can the same be noted when validating Zinc intakes. accusatory To assess the Validity of zinc intake using a food frequency questionnaire for children between 24-36 months.MATERIALS METHODSA longitudinal survey design was conducted, information was quiet twice over the year.Calculation of sample Size. Total number = 96, using error of mean 10%, 50% CV and 95% confidence level.Exclusion Criteria was used, this include the ability to keep a diet record therefore only Parents and Guardians that were literate, no previous involvement in a diet assessment study, and no major diet changes in the past 6 months. Leading to the study recruiting n=85 Children (age range 24 36 months) from Lu welezi in Mzimba. Participants were selected using fair random sampling. Informed consent was obtained from participating parent/guardian, and a special effort was made by the Nutritionist to illuminate the importance of an accurate and not manipulated 3 day diet record. Collecting biological samples is a good deal culturally unacceptable, moreover with children (aged 24 36 months) to rural populations in countries like Malawi and opportunistically getting samples from children already compromised at Hospitals/Clinics cannot offer the correct materialisation of Zinc intake due to some already being Zinc deficient. According to a study by Gibson he found that Zinc level findings of dietary recall to biochemical indexes were significantly similar of 60 women in southern Malawi, therefore this study leave al unrivaled not be using biochemical markers. Ethical approval was sorted from Local, District and National authorities.Zinc FFQAlthough the FFQ is apt to self-administration, in this study it was administered by a trained audienceer, this was d peerless due to low literacy rates and thus to improve accuracy. The operation required less than 10 min for each interview. Biasness arises when collecting data using FFQ d unity once a year, which may introduce a seasonal bias because certain foodstuffs are untold consumed only at one time of the year. Therefore, this study collected data during both seasons rather than just at one time then calculated the average.The steps that were taken to better internal validity of the FFQ included, Assembled and calibrated equipment a selection of local anaesthetic utensils were purchased and calibrated with a mensuration measuring cup. Acquirement of Picture charts depicting the foods most often eaten in Mzimba. Translated and pretested the FFQ was translated into local Language Chichewa Tumbuka, a pilot draft of the questionnaire was tested on a smaller sample, using respondents similar to actual population. Trained the interviewers qualified training for the interviewers is critical. The interviewing techniques should always be consistent both among the interviewers and over time.Estimating portion sizes is the most challenging part of the recall interview but also one of the most critical for ensuring high-quality results. This study used clay molded into the correct size and shape of the food to help estimation. Converting portion sizes to weight equivalents ,portion sizes was converted into weight equivalents by using dietary scales and using leftover portions to Calculated the proportion of edible percentage. FFQ usually suffer from overestimations or underestimation, this will reduce them errors. Reviewed the recall interview data at the end of the interview with respondent being present.Atomic Absorption SpectroscopySome nutrient composition values for a local staple food could not be derived, therefore the study obtained direct chemical analysis. This approach is especially desirable for zinc because their content in plant-based Staples often depends on local trace element levels in soil, agronomy practices. The principle of analysis is to place zinc using flame atomic absorption spectrum analysis (AAS) based upon the absorption of radiation by free atoms .This was done by preparations of troika replications of each concentration in order to get an average using one hundred-mL volumetric flasks. In order to determine the total amount of zinc, multiply the concentration obtained by the dilution factor (100mL).3 day food record later completing the FFQ, subjects were asked to keep a 3 day estimated diet diary (food record), preserve everything they ate and drank, at the time of eating. A list of household measures was enfold with the diary form. Comprehensive verbal and written instructions were given to the subjects on the methods of recording data. Emphasis was put during the explanatory phase prior to diet recording to just record the actual intake withou t any fear of judgment relative to nutrition.Estimation of Zinc nutrient scoresFor each food item, zinc nutrient content per average unit was compiled. Using Nutritional composition of each food derived from the US Department of Agriculture (USDA) food composition tables and victuals Master 2100 software when necessary was developed allowing the total Zinc intake for the FFQ and 3 sidereal day Record to be calculated and compared to AAS.STATISTICAL ANALYSISZinc intakes were calculated separately for FFQ, 3 day Record and AAS, and only then were comparisons made ( pertain to Fig 1). Calculating total zinc intakes Once the day by day food intake has been measured, total zinc intakes can be calculated by multiplying the amount (g) of each food consumed by its zinc content (mg zinc/100 g). Specificity was defined as the proportion of those with a daily Zinc intake below 0.80mg on the FFQ. Sensibility was defined as the proportion of those with a daily Zinc intake above 0.8mg on the F FQ. Confidence intervals at 95% were also calculated using Excel 2013 software, ANOVA single factor refer to Fig 1.RESULTSThe study had 85 respondents of which 47 (55.3%) were females and 38 (44.7%) were boys refer to graph 1. The average age of the Respondents was 29.0 1.2 months. Mean dietary Zinc intake from the 3 Day diet records was 0.909 mg=day with a variance of 0.041, whilst FFQs was 0.90mg=day with a variance of 0.0366 and AAS was 0.89mg=day with a variance of 0.0366. The normal distribution of Zinc data from both diet AAS, 3 day record and FFQ revealed no significant variance between mean intakes (P0.064).Fig 1 Anova Single Factor for zinc Intake for the children diets, with P-value of 0.91.Results shows they is a no significant difference in zinc intake between the 3 methods used.DISCUSSIONThe study findings showed that all the assessment tools used to assess zinc intake were equally precise as evidenced by Figure 1 (F= 0.093.03, p = 0.91), this shows that they is no s ignificant difference in findings, the different assessment tools were able to come up with similar results in zinc intakes of all the n=85 respondents . Hence increasing the reliability of FFQ, since it is one of the most used instruments in the majority of large-sample studies in nutritional epidemiology. Validation studies are carried out to measure the extent to which a method real measures the aspect of the diet it was designed to measure with the group being measured. Validity and reliability are currently used criteria for selecting dietary assessment tools for observational research. tho it is important to note that validation procedure of a dietary assessment tool is essentially impossible, as there is no absolute gold standard for measuring dietary intakeCONCLUSIONThe purpose of this study was to validate Zinc intake for children in Luwelezi Mzimba using the FFQ. It was found that they was a significant coefficient of correlation of Zinc intakes between all the methods used to calculate zinc intake, therefore the study justifies that FFQ is a valid tool in assessing dietary intake of Zinc. submit LIMITATIONSUsing FFQ is depends solely upon the respondents memory.Calculating procedures based on estimation and assumptions. QUESTION 2INTRODUCTIONSystematic universal approach to determine nutrition status is an essential to achieve global health, recommended by the World Health Organization (WHO). This assessment allows explanation of present and past occurrences, hence indicates likelihoods of prox possibilities to childs health. For this purpose, growth charts are adopted, in April 2011 Malawi also joined the 125 Countries across the world shifting from National Center for Health Statistics (NCHS/1978) to WHO/ 2006.This musical theme aims to explore why it was necessary for Malawi to make this outstanding change.The recommendation for adopting the WHO standards for Malawi are based on several considerations includingIMPROVED METHOLODY AND TECHNOL OGY ADVANCEMENT.The production of the WHO child growth curves underwent a careful, methodical process. Which included vicious methods of data collection, standardized across sites has to be followed during the entire study, thus exclusion criteria develop. Sound procedures for data management and cleaning were applied). The selection of the best statistical approaches and State-of-the-art statistical methodologies used to generate these standards making them the highest conceivable quality Smoothed curves and empirical methods indicating a true description of the growth of healthy children, in contrast the NCHS/WHO data was collected from 1929 to 1975 and does not even match current national birth weight distributions. Also, the statistical methods functional at the time the NCHS/WHO growth curves were constructed were too limited to correctly model the pattern and variability of growth. As a result, the NCHS/WHO curves do not adequately playact early childhood growth. The equip ment by NCHS in 1977 cannot be matched to State-of-the-art statistics used by WHO in 2004. Equally evidenced by differences between recumbent length measurements from the Fels data and the stature measurements from the NCHS data sets were larger than expect when the transition was made from recumbent length to stature between 24 and 36 months compared to WHO standard.IMPROVED diagnostic AND MONITORINGWHO and UNICEF have developed a network with facilitators which aim at supporting training and other technical aspects of the standards implementation at regional and land level. They provide training packages emphasizing the importance of accurate measurement, plotting and interpretation, plus documentation of growth problems. A child that has a nutritional growth problem, is identified and provide action should be determined to address it. Growth assessments by NCHS/WHO is not supported by appropriate response actions to prevent and treat excessive or inadequate growth, hence it i s not effective in improving child health. Some Malawian settings where parents are not able to seek and afford interposition plus no presence of an NGO leaves the diagnosed child in grave danger. Another plus for WHO growth charts is that their study was followed incrementally, with each infant measured 21 times between birth and two years. The shorter measurement intervals results in a better tool for monitoring the rapid and changing rate of growth in early infancy However, the NCHS/WHO infants were measured once every 3 months and used supplemental data due unavailable data for the first two to three months of life. The cross-sectional nature of the NCSH/WHO charts represents achieved size of infants, it does not describe rates of growth as accurately as growth represented in longitudinal growth chartsBREASTFEEDINGThe WHO growth standard promotes breast provide as the custom that should be followed to attain optimal growth among children grievous bodily harmly or predominantly breastfed. This is consistent with the Malawis Baby-friendly Hospital approach. infant feeding guidelines recommend breastfeeding as the peak source of nutrition during infancy. Thus, the WHO standards provides a platform for advocating the protection, promotion and support of breastfeeding and adequate complementary feeding. In this regard, the WHO standards are expected to make meaningful contributions to reducing child morbidity and mortality in Malawi. This will now allow accurate assessment, measurement and evaluation of breastfeeding and complementary feeding because it recognizes the adequacy of human milk to support healthy growth and development. However the NCHS/WHO nearly all infants included in the sample were formula-fed resulting in a reflection different to the pattern of growth typically observed in healthy breastfed infants. This makes it gravely suitable for Malawi due to most of our infants being Breastfed, therefore exposing them the many benefits exclusive bre astfeeding come with promoting optimal child health.GROWTH STANDARD NOT GROWTH REFERENCEChildren in the WHO standards were raised under ideal circumstances and health conditions. As a result the WHO growth charts are designated as the Golden standard identifying how children should grow when provided with optimal conditions .On contrast with NCSH/WHO charts which shows a snapshot of weight and heights of the sampled population, disregarding of whether their rate of growth was optimal or not. Therefore the NCSH/WHO charts potentially show the growth of some infants who may have been fed sub-optimally, raised in subscript environmental circumstances or had infections, chronic illness or disease. Adopting this Golden Standard is helpful for Malawi as it allows the comparison to be made with the very best. foreign SAMPLE POPULATIONThe origins of the children included in the WHO standards were widely diverse. They included peoples from Europe, Asia, Africa, Latin America and the Middle East In this respect they are similar to a lot of populations ,due being ethnic diverse. The growth of the children in the 6 various sites was very similar because their environments were similarly healthy. This indicates that we should expect the same potential for growth in any country. Traditionally it was believed that different ethnic groups show different patterns of growth. However WHO standards has refuted this belief showing that variability in infant growth was greater within population groups than between the different country groups. The major Concern with NHCS charts is that the sample consisted primarily of white middle-class infants from southwestern Ohio (USA). So making the data obtained unrepresentative, WHO charts operator Malawians are also capable of growing to these heights under optimal conditions. Osati zungu simuthu, amakula kwambiri kuposa ife Amalawi.NEW ELEMENTSWHO Standard approach goes beyond the development of growth references towards a standard, inclusion of motor development milestones provide a solid instrument for helping to meet the health and nutritional needs of the worlds children. A and set of charts comprising MAUCZ, HCZ, SSFZ and TSFZ were released early in 2007. All charts are available both percentiles and Z-scores, making it easier than ever before to record and assess Nutritional status of infants, one can just get a paper, pen and MAUC tape fold in the pocket and off they go into the Community. Then generate reports using WHO Anthro, which is an evoke software in itself.CONCLUSIONAfter sensible and carefully evaluation the adoption of the WHO charts for usage in Malawi appears more helpful for the childrens nutritional concealment and hence hospital admission than NCSH/WHO growth References. This is due it enables the detection of a higher number of malnourished children or at nutritional risk, thus allowing the much needed beneficial early intervention to be undertaken. Also the Development of WHO charts were promoted and supported by Stakeholders (NGOs, Governments etc.) that are currently active in Malawi and contribute significantly to our National Budget, WHO charts makes it easier for steadfast interventions and communication between these stakeholders and Malawi .
Monday, June 3, 2019
The Challenges Faced By Kingfisher Airlines Commerce Essay
The Challenges Faced By Kingfisher conductlines Commerce EssayWhile starting this assignment, I was required to conduct my research based on any family or validation. This could prove to be actually tricky as the company selected should bring been both challenging as well as with some stretch for applying conductorial theories.Kingfisher-Kingfisher is an Kingfisher based in Mumbai, India, and cerebratees primarily on domestic routes, along with several international overhaul to neighboring countries in Asia. Kingfisher is state-owned, and is administered by the Ministry of Civil Aviation. It is angiotensin-converting enzyme of the two flag carriers of India, the different being Air India. The Kingfisher was rebranded as Indian for advertising purposes as a part of a program to revamp its compass in preparation for an initial public offering (IPO). The Kingfisher operates closely with Air India, Indias national carrier. Alliance Air, a fully-owned subsidiary of Kingfisher, was renamed Air India Regional. In 2007, the Government of India announced that Kingfisher would be merged into Air India. As part of the merger dish, a new company called the National Aviation Company of India Limited (NACIL) was established, into which both Air India (along with Air India Express) and Kingfisher (along with Alliance Air) will be merged. Once the merger is complete, the Kingfisher which will be called Air India will continue to be headquartered in Mumbai and will have a fleet of over 130 aircraft.CDocuments and SettingskamalDesktop64748.jpgHistory- Kingfisher Kingfisher is a private airline based in Bangalore, India. Currently, it traveling bags the status of Indias largest domestic airline, providing world-class facilities to its customers. owned by Vijay Mallya of United Beverages Group, Kingfisher Kingfisher started its operations on May 9, 2005, with a fleet of 4 brand new Airbus A320, a flight from Mumbai to Delhi to start with. The airline shortly oper ates on domestic as well as international routes, covering a number of major cities, both in and outside India. In a short span of date, Kingfisher Kingfisher has carved a niche for itself in the civil aviation industry. Kingfisher Kingfisher proved to be a stiff competition for other domestic Kingfisher of India, with its brand new aircraft, stylish red interiors, stylishly dressed cabin crew and ground staff. The airline introduced in-flight entertainment (IFE) systems, for the first time to Indian consumers. The IFE systems were tenderd on every seat, even on the domestic flights. The airline offers attractive services to its on board passengers. Years following its inception proved to be well(p) for the airline, in terms of its booming problem, with a good track record of customer triumph. However, it faced a worsening economic scenario in 2008MANAGEMENT circumspection in all note areas and human organization activity is the act of getting people together to accomplish d esired goals and objectives. charge comprises computer programning, organizing, staffing, lead-in or directing, and controlling an organization (a group of unmatchable or more people or entities) or effort for the purpose of accomplishing a goal. Resourcing encompasses the deployment and manipulation of human resourcefulnesss, financial resources, technological resources, and natural resources. Because organizations can be viewed as systems, guidance can withal be qualifyd as human action, including design, to facilitate the production of serviceable outcomes from a system. This view opens the opportunity to manage oneself, a pre-requisite to attempting to manage others focus can also refer to the person or people who perform the act(s) of focussing. fundamental functions of focal point-Management operates through various functions, often classified as planning, organizing, leading/directing, and controlling/monitoring.* Planning Deciding what needs to happen in the fut urity (today, next week, next month, next year, over the next 5 years, etc.) and generating plans for action.* Organizing (Implementation) do optimum use of the resources required to enable the successful carrying out of plans.* Staffing Job analyzing, recruitment, and hiring individuals for inhibit jobs.* Leading/Directing Determining what needs to be done in a situation and getting people to do it.* Controlling/Monitoring Checking nestle against plans, which may need modification based on feedback.Management hierarchy In an organization-The management of an organization may have three levels- superior management (or top management or upper management)Middle managementLow-level management, such as supervisors or aggroup-leadersTop-level management-* Require an extensive noesis of management roles and skills.* They have to be very aware of external factors such as markets.* Their decisions are generally of a long-term character* Their decisions are make using analytic, direc tive, conceptual and/or behavioral/participative processes* They are answerable for strategic decisions.* They have to chalk out the plan and see that plan may be effective in the future.* They are executive in nature.Middle management-* Mid-level managers have a specialized empathiseing of certain managerial tasks.* They are trustworthy for(p) for carrying out the decisions made by top-level management.Lower management-* This level of management ensures that the decisions and plans taken by the other means employees.* Lower-level managers decisions are generally short-term ones.Management Theories-These are three basic management theories-Classical Viewpoint (scientific management, bureaucratic management, administrative management)Behavioral Viewpoint (Hawthorne studies, human relations movement, behavioral recognition approach) quantifiable Viewpoint (management science, operations management, management info systems)1. Classical Viewpoint-It includesscientific managementBu reaucratic managementAdministrative managementscientific management Scientific management is defined as the use of the scientific method to define the one best way for a job to be done.Taylors Four Principles of Scientific Management-1. Study each part of the task scientifically, and develop a best method to perform it.2. Carefully select surveyers and train them to perform a task using the scientifically developed method.3. Cooperate fully with figureers to ensure they use the proper(ip) method.4. Divide dress and responsibility so management is responsible for planning work methods using scientific principles and workers are responsible for executing the work accordingly.Bureaucratic management-GENERAL ADMINIST Characteristics of Webers precedent bureaucracyThe major characteristics of Webers ideal bureaucracy include for an organization-a. Specialization of a laborb. Formalization of rules and proceduresc. Impersonality in application of rules and sanctionsd. Formalization of lines of authority into a hierarchical structureEffectively. goop WeberTheory of Administrative Management-The role of administrative management concludes that all activities that occur in business organizations could be divided into six main(prenominal) groups-Technical (production, manufacturing)Commercial (buying, selling, exchange)Financial (obtaining and using capital)Security (protection of property and persons)Accounting (balance sheet, stocktaking, statistics, costing)Managerial (planning, organizing, dominationing, coordinating, controlling).Fayals 14 principles of management-Division of labor work must be subdivided to facilitate specializationAuthority authority and responsibility should go hand in handDiscipline discipline is all-important(prenominal) to develop obedience, diligence, energy and esteemUnity of command subordinates must report to one superiorUnity of direction all operations with the same objective must have one manager and one planSubordination of individual interest to general interest the interest of one individual or group should not rein the interest of the enterprise as a wholeRemuneration remuneration and all other methods of brave outment should be bewitchingCentralization managers always hold final responsibility but should delegate certain authority to subordinatesScalar chain a clear line of authority or chain of command should extend from the highest to the lowest level of an enterprise. This helps to ensure an nightspotly commingle of breeding and complements the principle of unity of commandOrder there is a place for everything and everything in its place. Proper scheduling of work and timetables to complete work is important. This can facilitate the channeling of materials to the adept place at the right timeEquity employees should be treated with kindness and justiceStability of tenure of personnel management should work towards obtaining long-term commitments from staff and avoid unnecessary turnover of staff which is costly and working against overall goal accomplishmentInitiative workers should feel like an active part of the organization through conceiving and executing plans in order to develop their capableness to the fullestEsprit de corps harmony and union help to build the strength of an enterprise. It is an extension of the principle of unity of command, emphasizing the need for teamwork and the importance of communication.Contribution of the classical stand for an organization-Highlights the need for a scientific approach to management.Points out that work methods often can be improved through study.Identifies a number of important principles that are useful in running organization efficiently.2. Behavioral Viewpoint -From this viewpoint of management of personal reactions (thoughts, feelings, and behaviors) rather than solely from the problem-solving perspective, this orientation involves conceptual foreplay and feedback interwoven with trainee self-examination an d practice of new behaviors in a structured human relations training context.Hawthorne studies -The Hawthorne studies, initially undertake to investigate the relationship amid work-place conditions and worker productivity, introduced a wide range of topics to the field of management study. individual work behavior is driven by a complex set of factors, work groups develop norms which mediate between the needs of the individual and institution, employees should not be considered appendages of machinery, awareness of employee sentiments and participation can reduce resistance to change, the workplace is an interlocking kind system, not simply production system, social structure maintained throughSymbols of prestige and power These findings opened the door to the study of client-centered therapy, small group behavior, and organization theory and research methodology.Human Relations Movement It is defined as a movement in management thinking and practice that show satisfaction of em ployees basic needs as the key to increased worker productivity. Because it is impossible to cover all aspects of the human relations movement, I will relate the Hawthorne Studies and focus on three key points to discuss the advantages and problems1. Respecting and concerning with workers2. Understanding and satisfying the employees wants and needs3. wricking together and encouraging workers.The reason workers are motivated by such things is that individuals have a deep psychological need to believe that their organization cares about them, is open, concerned, and willing to listen.Human Relations MovementBehavioral science approach The behavioral approach to view management from a social and psychological perspective. This concern about the well-being of the workers and wants them to be treated as people, not as a part of the machines. Introduction to the behavioral science approach Advocates of the human relations movement believe that if managers foc utilise on employees rather than on mechanical production, then workers would become more satisfied and thus, more racy. They supported the notion that managers should be paternalistic and nurturing in order to build work groups that could be productive and satisfied. The behavioral science movement stressed the need for scientific studies of the human element of organizations.This model for management emphasizes the need for employees to grow and develop in order to maintain a high level of self-respect and remain productive workers. Theory X and Theory Y developed by Douglas McGregor also emphasized about these things.3. Quantitative Viewpoint -Quantitative Management (also known as trading operations Research) of a systematic and scientific approach to problem solving and decision making in complex Environments and situations of uncertainty and conflict act.Quantitative Management is a practical field. It can be applied in many areas manufacturing, businesses management, banking, environmental planning, mining, lodgment and engineering projects, management consultancy in fact, in every situation where numerical data are available and management or decision making takes place.Management Science-A discipline(a branch of knowledge)that attempts to aid managerial decision making by applying a scientific approach to managerial problems that involve quantitative factors ,management science is also called operations research (OR).A rational, structured approach to problem solving and often takes a quantitative view of decision making.Operations management -Operations management is an area of business concerned with the production of goods and services, and involves the responsibility of ensuring that business operations are efficient in terms of using as little resource as needed, and effective in terms of meeting customer requirements. It is concerned with managing the process that converts in put togethers (in the forms of materials, labor and energy) into outputs (in the form of goo ds and services).Operations traditionally refer to the production of goods and services separately, although the distinction between these two main types of operations is increasingly difficult to make as manufacturers tend to merge product and service offerings.More generally, Operations Management aims to increase the content of value-added activities in any given process. Fundamentally, these value-adding creative activities should be aligned with market opportunity (see Marketing) for optimal enterprise performance.Management information system -A management information system (MIS) is a subset of the overall internal controls of a business covering the application of people, documents, technologies, and procedures by management accountants to solve business problems such as costing a product, service or a business-wide strategy systems applied in operational activities in the organization. Academically, the term is commonly used to refer to the group of information management m ethods tied to the automation or support of human decision making, e.g. Decision Support Systems, proficient systems, and Executive information systems. Information is the livingblood of all organizations now more than ever. MIS professionals work as systems analysts, project managers, systems administrators, etc., communicating directly with staff and management across the organization.APPLICATION OF MANAGEMENT THEORIESThe above mentioned theories play an active role in framing any organization and company nowadays. If well-implemented, these theories can bring out the best in an organization leading to tremendous progress, both financially and productively. Kingfisher is one such company utilizing the merits offered by these management and administrative theories.Implementation of Scientific managementEmployee Recruitment Kingfisher follows a very transparent policy in its employee recruitment system. For the job to be done it is of almost importance that the individual must b e well-qualified and should possess the right skills or tools and this is exactly what Kingfisher considers during its selection-process.Training and developmentKingfisher followed by detailed training and development programmer for their new recruits, they are familiar with the operating environment, and trained to provide the company wants and needs.Employees are trained in their specific areas such as company decides the tasks to be performed by workers.Division of laborKingfisher goes a well integrated Hierarchy of authority to cause minimum fuss management. Work here is evenly divided between management and Employees, as each is given work appropriate to them. In Kingfisher, no particular section is to Burdened with excessive work, in a proper division of labor.StandardizationA specific human body is set for the work to be carried out at Kingfisher and everyone is well-aware of their duties and responsibilities. Before starting any job, our company first decides the way to ca rry out that job, resulting in standardization.Work place environmentKingfisher competitive and creative attempt to exceed an employees ability to protect them across borders and good spirit of cooperation between workers Companion spirit of fair play, the companys smooth operation and a healthy work environment.IMPLEMENTATION OF BUREAUCRATIC MANAGEMENTDistribution of workloadOur company, Kingfisher completely concurs with Max Weber when he describes diffusion of work as one of the traits in bureaucracy. Here at Kingfisher, there is even division of workload and no extra stress in put on our employees.Defined hierarchyWork done really effectively and professionally at Kingfisher as we followed a very well-defined hierarchy.Our institution is a full hierarchy of structure and, therefore, highly proficientWe Kingfisher fully working manners and ethics, which is vital for all organizations.Detailed rules and regulations are strictly according to our life and work is always done with e stablished and appointed.Impersonal relationshipAbandoned in favor of strictly on our company as we believe that a person should hold office based on their work and not because of personal contacts or social status.Corruption is an aspect that can never be found in kingfisher.Due to the transparency of our company.Formal authorityThe position that each and every employee holds is made clear in our company so that the manager can exercise his/her formal authority at the workplace.Technical competenceOnly those who meet the conditions sufficient for the job is placed in the position of our company.The work-related concerns with other responsibilities and authority that does not interfere with the proper development to four companies. Thus, by applying the theory of manaeaucracy by Weber always, our organization has successfully reachd the maximum production utilise and our employees, while maintaining good employees satisfaction corruption andfavoritism are not really pleasedIMPLEME NTATION OF ADMINSTRATIVE MANAGEMENTForecasting and planningKingfisher has a team of dedicated professionals working on the future of our organization.We always plan ahead and predict any kind of obstacle or obstacles in our path and plan to remove them accordingly.Strategic planning is important.OrganizationOur concept of organization is one of the most famous one, companies in the world.We are aware of the extensive development of our people, and service resources.Co-ordinationAs our business is distributed in various regions, there is a high priority as well coordinated, and thats exactly what we are trying to do with Kingfisher.Without proper coordination, the company has not reached the heights, where we are today.Teamwork is very badCommandingWe are the king, who was scheduled to due to the different commands to be run smoothly and our work processes.It is responsible for as they get the job, which means that the body knows that these people.ControllingFor companies to motivate employees and their location to their needs.They motivate employees to run the programmer.Employees or reward your efforts, simply ask them to fulfil the objectives of the mission.To increase the motivation of the staff and very useful discussion about incentiveAPPLICATION OF BEHAVIORAL VEOPOINTApplication of Hawthorne studiesFor companies to motivate employees, their needs for their position.They run employee motivation programmer.Employees to achieve the objectives of their duties or simply for your efforts rewarded well ask.To maximize employee motivation, the motivation of employees through a very useful discussion about following procedures and staff.The company is Changing the pay rules so that the group was paid for overall group production, not individual production.Providing food during the breaks.shortening the day by 1 hourParts time jobs available for newcomers.Application of human relation movementThe company Kingfishers approaching each employee as a source of uniqu e knowledge with something valuable to digest to the company.The company is taking care of employees needs to do the job in Mechatronics.Communication of expectation of employees keeping the goal in mind.Knowing their goals, their stressors, what excites them and how they each define success?By providing good training.The company takes feedback of employees.Providing Reward and recognizing employees in ways that are meaningful to themKeeping success story aliveBeing legitimate in every work which is related with employees.Application of behavioral science approachJob rotationCross training staff, teaching staff or each others work. Expand your knowledge and ability to work Expansion of jobs in Mechatronics employees are given a wider breadth of tasks and responsibilities within our jobber close to work and increase the depth of the responsibilities of employees.Organizational Behavior This is my understanding of organisational behavior is the way people communicate he work environ ment. Through the study of organizational behavior,we can know each other kick downstairs and in ways to cooperate.Kingfisher depends on the individual services, as well as the organizations management. Therefore, it can help understand the individuals prize of work.I found my organization Kingfisher all these things. Contribute a better translationMarketing and Consumer Behavior Kingfisher marketing attempt to influence this process with examples of marketing when consumers evaluate a brand they are trying to get an overview of installation services allows the consumer to decide whether to think about it.Some brands of evaluation criteria may include price, brand, flavor, functional features, style, and sometimes the way consumers feel of an enterprise of an organization of their choice.Resolving Conflicts The case is structured so that you understand why and how the kingfisher was constantly plague by HR problems.We should be able to see the pilots and other workers using arm t actics to get back to IA to accept all their demands.This case also provides insight into how his treatment IA HR issues in dreams have contributed to the overall mess that found themselves in kingfisherTraining Generally the training in Kingfisher. Happens in these terms-a) Managing Teamsb) Managing Emotionsc) Strategies for raising Performanced) Managerial Wisdome) Problems Solving Decision MakingApplication of Quantitative ManagementApplication of Management ScienceIn the Kingfisher the management system is used byScheduling Kingfishers, both planes and crew,Deciding the appropriate place to site new facilities such as a warehouse or factory,Managing the flowing of water from reservoirs,Identifying possible future development paths for parts of the telecommunications industry,Establishing the information needs and appropriate systems to supply them within the health service, andIdentifying and understanding the strategies adopted by companies for their information systems.Appl ication of operational managementOperations managementis an area of business concerned with the production of goods and services, and involves the responsibility of ensuring thatbusiness operationsareefficientin terms of using as little resource as needed, andeffectivein terms of meeting customer requirements. It is concerned with managing the process that converts inputs Operations management focuses on carefully managing the processes to produce and distribute products and services. great deal of focus is on efficiency and effectiveness of processes. Therefore, operations management often includes substantial bar and analysis of internal processes. Ultimately, the nature of how operations management is carried out in an organization depends very much on the nature of products or services in the organization, for example, retail, manufacturing, wholesale, etcSections of This Topic Include-Procurement (Purchasing) PracticesThis topic reviews guidelines for buying various materials from suppliers and vendors materials, including computers, services from lawyers, insurance, etcManagement Control and Coordinating FunctionManagement control and coordination includes a unsubtle range of activities to ensure that organizational goals are consistently being met in an effective and efficient fashion.Product and Service ManagementAs noted above, the major activities involved in product and service management are similar to those in operations management. However, operations management is focused on the operations of the stainless organization, rather than managing a product or service.Quality ManagementQuality management is crucial to effective operations management, particularly continuous improvement. More young advancements in quality, such as benchmarking and Total Quality Management, have resulted in advancements to operations management as well.Logistics and Transportation ManagementLogistics is focused on the flow of materials and goods from suppliers, throu gh the organization and to the customers, with priority on efficiency and cost effectivenessFacilities ManagementEffective operations management depends a great deal on effective management of facilities, such as buildings, computer systems, signage, lighting, etc.Configuration ManagementIts important to track the various versions of products and services. Consider the various versions of software that continually are produced, each with its own version number. Tracking these versions is configuration management.Distribution ChannelsThe means of distribution depend very much on the nature of the product or serviceApplications of management information systemThe company is implementing Management Information Systems (MIS) is the term given to the discipline focused on the integration of computer systems with the aims and objectives on an organizationThe development and management of information technology tools assists executives and the general workforce in performing any tasks rela ted to the processing of information. MIS and business systems are especially useful in the insect bite of business data and the production of reports to be used as tools for decision making. Applications of MIS With computers being as omnipresent as they are today, theres hardly any large business that does not rely extensively on their IT systemsStrategy Support- While computers cannot create business strategies by themselves they can assist management in understanding the effects of their strategies, and help enable effective decision-making.Data Processing- Not only do MIS systems allow for the collation of vast amounts of business data, but they also provide a valuable time saving benefit to the workforce. Where in the past business information had to be manually processed for filing and analysis it can now be entered quickly and easily onto a computer by a data processor, allowing for high-velocity decision making and quicker reflexes for the enterprise as a whole.Benefits of MIS- The field of MIS can deliver a great many benefits to enterprises in every industry. Expert organizations such as the Institute of MIS along with peer reviewed journals such as MIS Quarterly continue to find and report new ways to use MIS to achieve business objectCore Competencies- Every market leading enterprise will have at least one core competency that is, a function they perform better than their competition.Enhance Supply Chain Management- Improved reporting of business processes leads inevitably to a more streamlined production process. With better information on the production process comes the ability to improve the management of the supply chain, including everything from the sourcing of materials to the manufacturing and distribution of the finished product.CONCLUSIONAfter completing my report on Aviation Industry take the example of Kingfisher World Corporation, a leader in the provision of flight simulators I found that all companies use the four-management la ws, which I have discussed only three.Kingfisher Systems, Incorporations designs and manufactures flight training devices and flight simulators.It offers pilot training tools for ground school, distance learning and flight training, Nova, a car park management system that provides access to information such as occupancy or the status of parked vehicles Valorous, a treatment for municipal and industrial sludge generated by wastewater treatment plants.The company serves aviation market, including commercial and general aviation.It serves customers in North and Latin America, Europe, Asia, Africa, Middle East and Oceania markets.Kingfisher Inc. was founded in 1953.The company uses all managerial laws in accordance with their employees.The company has so many different flight simulators, so many different flight training equipment solutions for all types of flights, to customer support media centers, technical center, take it in progressive way.Ultimately we learned after completing thi s project, it is easy to manage an organization, resources, if we know all about governance.REFRENCESAirline quality of Kingfisher http//www.airlinequality.com/Forum/kingfisher.htm , last accessed on 29, March 2010Books at red
Sunday, June 2, 2019
Fish Crate Christmas :: English Literature Essays
Fish Crate ChristmasThis is the time of year I same(p) to sit back and take a visit to my earlier days when times were really tough. When I was a kid, we were so poor the people on Welfare were considered better off. My father usually got laid off from his bricklaying job around this time so things got really got tight. We had coal and wood burning stoves to stool and keep warm. My grandfather would go to the fish market and get old crates to chop up for firewood. My Grandfather always cut extra wood to make do so he could buy our turkey. Meanwhile, my brother and I would take our wagon and go to the coal yard to buy a bag of coal for 60 cents. My family would never accept charity from anyone so we were left to our own resources. My Mother and Grandmother would buy a crate of celery and go gateway to door selling it. My brother and I would run errands for the businesses uptown to make money for Christmas gifts. On the day before Christmas, my Great Grandmother would start the co oking and baking. Everybody in the family had a part to do. In my thoughts, I can clearly smell once again the delightful smell of the cookies and that wonderful turkey. I can looking the warmth of that old coal stove, and most of all, I can still feel the warmth of the love within the family. Right up the alley from my house, was the Zion Lutheran Church, where the Boy Scouts sold Christmas trees every year. Somehow they always had one too many and they would ask us to take it off their hands. My Father, brother, and I would sit for hours changing light bulbs trying to find the one that was bad in the string of lights from last year. After much frustration, we finally got them to work. Then we finally felt want it was really Christmas and we promised each other that somehow next year, we would get new lights. Around 430 P.M., my brother and I would head up the highroad to the Woolworth five and dime store to buy our presents. There were the oversized ties that nobody would ever wear and the hair pins that would sit in a drawer for years to come. But everybody was happy to receive the presents because a lot more went into buying them than just money.
Saturday, June 1, 2019
Living Through God: The Meaning of a Christian :: social issues
Living Through God The Meaning of a ChristianWithout God, the thinkers of the adult male will never grasp the meanings of life, origin and destiny, so the fast(a) spirited young woman remarks about life. Teenagers today appraise their lives through school, work, and friends. Often times, there is one type of teenager that displays a greater attitude, in which whom goes beyond the obvious by simply shining a little brighter. A courageous teen of determination, providing inspiration, possesses such positive attributes, gives reason to classify her by inspiring and strengthening the youth of today. On October 25, 1985, an individual, so concise, diminutive, or what seemed to be not much of great impact of this world, was born. Subsequently, becoming one that gives profound immenseness in the hearts of those she will touch. Arica Helaine Ingratta, a teenager of uniqueness in every way, persists by perceiving life by one entity, God. Initially, Arica procures from a family consisting o f a younger brother, an older sister, a set of parents, one dog, two cats, and a hamster. Indeed, one may perceive this family to be a little unconventional it is. Born and increase in Windsor, Ontario, Arica grew up with a strong grasp on life from the very beginning. Her story entitles one to be unique, inspiring, and meaningful. Arica Helaine, derives from her fathers name, Ericolino, and Helen, the name of her mother. Her beginnings of discipline sets out at St. Gabriels catholic school where, in grade 4, she transferred schools to the Maranatha Christian Academy and later to First Lutheran Christian Academy where she essential a fundamental Christian basis. She was an intelligent, little princess that was often called peanut. An asset to her character is her genuine smile. Filled with energy and ambitions, she carries a strong spirit in whatever she does or is determined in becoming soon to discover the meaning of life. Having acquired from a Christian family, she learns th e meaning of God through her parents and school. While the world celebrated the coming of the New Year on December 31st of 1998, Arica was celebrating a rather different event. At a Christian concert, she became saved by accepting God into her life. She developed a personal relationship with God while continuing to live through Him. While many young teenagers were comfortable about their girlfriends or boyfriends, their physical appearances, or the newest pop artist, Arica, by age 14, determined in becoming a youth Evangelist.
Subscribe to:
Posts (Atom)