Monday, January 27, 2020

Comparison of Leadership Theories

Comparison of Leadership Theories The establishment of relationship between followers and leaders that focus on real changes and outcomes that reflects through shared purposes is basically leadership. Leadership also involves in creating change not only in maintaining status quote. Another leadership important feature is to bring people and make them understanding to come together around a common vision and to bring change about desired future. In many aspects, the importance of leadership is vital without it families, communities and as well as organisations would go down apart. In other sense, the way of improving efficiency, morale, customer service and performance is the critical aspect of leadership. It is also essential for the organisations to handle critical situation and lead that effectively and only a good leader with good leadership ability can lead team successfully. There are different styles of leadership basically it is way the person deals with that in order to stay alive in his or her position. Thes e are authoritarian, democratic and laissez-faire.( Business:William M. Pride, Robert J. Hughes, Jack R. Kapoor,Cengage Learning, 2009 Political Science -p.179) In authoritarian leadership style, leader holds all the power and responsibilities. In this style, employees are assigned to specific task by the leader and expect to get it done orderly. In laissez-faire leadership style, leader gives power to employees. There are two or more alternative decisions taken by leader, employees can choose any of them from there it depends up to them. In democratic leadership styles, leader gives more importance on employees and tries to encourage them and shows attention to individuals. Historical, classical and contemporary approach to Leadership theory: Historically there are many leadership approaches that linked with different theories of leadership. Great Man theory of leadership: 1900s: This is the earliest theories of leadership. At that time most of the researchers believed that leaders are born, not made. In Great Man theory, describes that the main secrets of a great leader lies in being born great. It gives importance on the study of all the great leaders who were great, may be they are from aristocracy or from the lower classes but they had the opportunities to lead. By finding out those people who did great things such as Nepolean, Hitler, Curchill if we go further back then Lord Krisna, Gesus and Hazrat Mohammad were very easy to point out them. According to Great Man theory, it believes that leaders must have some qualities like good commanding power, cleverness, good character, courage, self-possession; fierceness and expressiveness that cant be possessed through learning or through particular taught programmes.(Organisational behaviour-by Hawa Singh,1st ed,2009-10,page-263)( Fire Service Leadership: Theories and Practices-Mitchell R. Waite, Interna tional Association of Fire Chiefs;Jones Bartlett Learning, 2008 Business Economics;page-3,4) Trait Theories of Leadership: 1900s-1940: Trait theories are similar to Great Man theories in some ways. It assumes that leaders must possess general traits or personal features that they get by born and common to all and create them better matched to leadership. In Trait Theory of leadership just tried to find traits of well-known leader that were frequent. This approach was based on the scheme that is individuality and personal intrinsic worth that distinguish successful leader form everyone else. In 1994, Yukl conducted research on traits and skills and linked to organisational effectiveness (Introduction to educational leadership organizational behavior: theory into practice,Patti L. Chance, Edward W. Chance,Eye on Education, 2002,page.87). These were- Energy and pressure patience Self-possession Inner locus of control Emotional maturity Worthiness Supremacy inspiration Reaching orientation Need for affiliation Situational Theories of Leadership: (Leadership in Organizations: There Is a Difference between Leaders and Managers, David, University Press of America, 2009, p 33) In situational theories of leadership gives more importance on the different situations like where the task to be accomplished, fit surrounded by personalities, power and perceptions. Effectiveness of leadership relies on those situations. These situational theories are also called Contingency theories because this Theory is reliant upon the requirements or the status of the situations. 1960s-70: In Contingency/situational theory argues-what leaders perform that can be determined by that situations and that behaviors must be related with that environmental situations in hand (Understanding Leadership Perspectives: Theoretical and Practical Approaches,  By Matthew R. Fairholm, Gilbert W. Fairholm,2008,page.11). A good situational leader can only apply different leadership styles with the changing situations. The best action taken by the leader depends on of the leader depends on a range of situational factors. How the model works simply to achieve results: Identification of detailed job and task Asses present performance Corresponding leader response Different leadership styles could influence by the wide range of variables depending on the different environmental situations and it creates an impact on leader behaviour, in which leader can function. There are some critical contingencies like organisational volume, complexity in task, maturity of worker and so many others. According to situational theory, situational factors are limited and vary according to that contingency and specified behaviour of leader can only work in certain kind of situations not for all. There are three most prominent theories of contingency- Path-Goal theory Feidlers Contingency theory The Vroom-Yettons model Path-Goal theory: In this theory mainly focus on leaders motivational function and it can be enhanced by increasing individual payoffs to subordinates for work goal achievement, gain personal satisfaction by escalating opportunities (House, 1971).According to these theories key occupier is that the effectiveness can be measured through the behaviours of different leaders that will be influenced by situational variables. In broader sense it focused on initial arrangement and reflection behaviour of leaders but later it extended in the form of participative and leadership behaviours in terms of achievement oriented (House and Mitchell, 1974).there are two major assumption on path-Goal theories of leadership- (Leadership  edited by Linda L. Neider, Chester Schriesheim, IAP, 2002, page-116) Firstly, it concerns with the suitability of leaders behaviour to the subordinates Secondly, it concerns with the motivational factors of leader (House and Mitchell, 1974). Suitability: Leader behaviours need to be suitable for the subordinates so that it helps them to function well with different situation. This good behaviour of leader enhances the overall satisfactions of subordinates. Motivation: The role of a leader is important in motivating of employees for particular task to increase the overall performance. Fiedlers Contingency theory: Managing organizational behaviour: Henry, Neal P. Mero, John R. Rizzo  Wiley-Blackwell, 2000 pages.461, 467 In 1971, Feidler proposed clarification on that how group performance can be affected through the relations of leadership orientation, group setting and job characteristics. Leaders situation can measure though various extents like relationships between leaders and members, structure of job and position power (Fiedler, 1978). The relationship between leader and member: This refers to how the leader is liked by the group members. When good relationship exists between leaders and members then all are get high satisfaction in work and organisations values is achieved through individual values. If the relation is going badly then there is lack of common trust. Another important term group cohesiveness, it is very difficult to make all the employees work together when it low. If it is high but bad relation with leader then group works together to harm the organisation as well as leader. Structure of jobs: It is categorised in two ways like high task and low task structure. In high task job structure leader should know what the goal is and how to achieve that. In low task structure job leader must make a decision how to perform task every time to get it done. Position power: In high position power leader has authority to take any important decisions without informing anyone to higher organisation levels. In low position power, leader has limited authority. The Vroom-Yettons model of leadership: This model is widely used in the development of leadership in corporate centre and also gets enough support from practitioners. (Industrial and organizational psychology: linking theory with practice;  By Cary L. Cooper, Edwin A. Locke, page-151,152)The most important aspects of this model is that legitimates both the autocratic and democratic leader behaviour and matching that is suitable in meticulous situations. This model also provides fruitful information about what would be the perfect time of using groups or opposed to personality decision making. This model has some limitations like leaders are always have to take decision in choosing of leadership styles, it considers each decision in term of situation but it does not depend on previous factor. Cognitive resource theory: Cognitive Resource theory is the modification of Feidlers Contingency theory. This theory focused on personality, manners and situational properties. Cognitive resource theory integrates cognitive resources like personal acumen, practical knowledge and skill, job capability, into original model. Assumptions: 1) Plans and strategies are communicated through directive behaviour by mangers. 2) Experienced and smarter leaders have more priority on decision making rather than less experienced and less smart leader. The main limitation of this theory that it is not well thought-out the ability of leader. The Hersey Blanchard Theory: This situational theory developed by Paul Hersey and Kenneth Blanchard and it focuses on activity and operational environment of the organisation. Their main approach was that followers will always get favour from the leader about their willingness to do the job. In this approach leaders have to understand about the followers properly and have to identify their stage of development and according to that apply the leadership style. With taking help from Ohio State studies and develop four leadership styles that is available for managers- (Leadership in Organizations: There Is a Difference between Leaders and Managers by David I. Bertocci;University Press of America, 2009 ,pages.39,40) Directing or telling Coaching or selling Participating or supporting Delegating Directing or telling: Job responsibilities is defined by the leader and inform to followers about when to do that and where to do it and how can it be done. Coaching: Its a two way communication here leader gives supportive direction to followers and sometimes ask for ideas or suggestion from followers as well. Supporting or participating: The leader and follower share in decision accordingly to achieve a maximum values like what will be the best to compete with high worth job Delegating: Followers get little support from the leaders. Implications of this theory: one problem is that it does not matter how hard leaders try but they are against to change from one style to another. Behavioural Theories of Leadership: In this theory mainly focus on behaviour of leaders in the direction of the followers and this became a leading mode of leadership approaching within the organisation. Diverse patterns of manners were grouped together and categorized as styles. These activities of management through training became very famous. Basically these styles are- Task concern-Here leaders give important on objectives accomplishment through high level productivity, and ways to manage people and activities for achieving those objectives. People concern-Here leaders focus on their followers as people what their needs, interests, what their problems, how it can be development and so on. They are not simply units of production or means to an end. Directive leadership. This style is considered by leaders make decisions for others and desiring all the followers or subordinates will pursue that directions. Participative leadership. Here leaders take part in decision-making by sharing among others.(Wright 1996: 36-7) http://www.infed.org/leadership/traditional_leadership.htm, 6.00pm, 27th Aug 10  Wright, P. (1996) Managerial Leadership, London: Routledge.page-36-37 Charismatic Leadership: This theory is defined by Max Weber and mainly focuses on leaders charismatic characteristics. Through these characteristics leaders influence the followers and they can change anything. It is not possible to access these qualities by ordinary people generally they are extraordinary. They are like magic leaders they got special power to handle complex situations. Transactional Theories: (Introduction to educational leadership organizational behavior: theory into practice,Patti L. Chance, Chance, 2002,page.94) Ok -Leadership in Organizations: There Is a Difference Between Leaders and Managers, David I. Bertocci, University Press of America, 2009, page-48,49 This approach of leadership was most popular at that time and this is defined by Gibson, Ivancevich and Donnelly. It has some similar features with situational theories. Its a kind of leadership where leaders find out what the need of followers to achieve organisational performance as a means of rewards. In this theory has several assumptions like it motivates people through reward and get punishment for the cause of mistakes, followers know what they have to do according to direction for the purpose of getting rewards. Sometimes they use management by exception techniques. The transactional leader sometimes use Path-Goal theory as a framework but leader take all the responsibilities for setting goals, mission for gaining effectiveness. Transformational Theories: Followers are motivated and inspired by the transformation leaders and to achieve results more than desired. This is the most recent theories of leadership. This leadership ability based on different personality factors like charisma, person attention and rational recreation (page-49). Introduction to educational leadership organizational behavior: theory into practice-  By Patti L. Chance, Edward W. Chance, 2002, page-90, 95 There are several effects of transformational leadership defined by Bernard Bass and Bruce Avolio (1994) .These are as follows:- Motivating others to involve them in work from new perception Consciousness about what the mission of the organisation Developing ability of others to achieve performance at exceeds level Involved in determining the benefits of the organisations by motivating the beyond their attention as they could have. Theory X and Theory Y of Leadership: In 1960, Douglus and McGregor described this leadership theory that the activities of leaders are based on their thinking and considerations about the individuals at work. He also described the behaviour of leaders in two contrasting sets of bliefs.These are theory X and Theory Y. The assumptions of Theory X: Average individual do not like work and avoid if they can Individual need to keep pushing for achieving desired objectives by directing, controlling and threatening through giving punishment This approach can take actions The assumptions of Theory Y: People will work in their own responsibilities and control according to how they are committed. In common people have some qualities like creativeness and imaginativeness The average individuals are not only accepted but look for objectives. Leadership models currently using in different organisations: Now a day, most of the organisations are focusing on leaders behaviours, skills and attitudes that they must have and it is possible to develop those qualities. There are many leadership theories that have gained recognition in different organisational perspective. These are as follows- Situational leadership Transformational leadership Behavioural leadership (The leadership pocketbook, Fiona Elsa Dent 2003, page.09) Qualities of people in leadership positions: There are three levels of leadership positions in an organisation. These are strategic level, operational level and team level. A good leader should possess some good qualities to handle this position effectively and tactfully. These are as follows:- Good character Good personality Devotion Self confidence- this will help them to identify subordinates talent basically that will help the business to go up Good communication capability- it is very important for any business to run effectively without this it is impossible Good learner   it will help them to develop Risk taking ability Problem solving capability Relationships-this qualities need to maintain positive relationship in all areas Creative minded-this qualities help them to bring any change when there is esteem needs in order to sustain in the business for achieving high level of success Positive attitudes Servant leadership-decision making ability through considering the opinion attractiveness with business vision by stimulating the followers Bravery Innovative Good motivation power Leadership approaches for 21st century: http://www.accessmylibrary.com/article-1G1-65357214/behavioral-approach-leadership-implications.html,7:53pm,26th Aug 10 http://www.strategy-business.com/article/19405?gko=3b347,9.00pm,26th,july2010 Main points considering different leading organisations in US for the 21st century: Internationalization and Change in information Technology though change in organisational diversity. Todays most dominant leadership model is situational, transformational leadership model but these theories ignored behavioural approach. Most of the organisations now focusing on main diversity initiatives and it can tackle through behavioural approach of leadership. These diversity initiatives can only be implemented through behavioural approach in todays or tomorrows in the organisations. The main leadership challenges for 21st centurys are forces in market, issues of people and competencies of leadership. Forces in market: The organizational change at a macroeconomic level is mainly depends on market forces and as a result these forces will require further keep in eye from organizations and leaders. For these purposes, so these market forces create an impact on behaviours and desires of those in the market either in terms of demanding or supplying a good or service. These forces consist of increase in globalization as well as the formation of progressively more huge multinational organizations through mergers and takeovers. In compared to larger organizations, most industries grow economies of scale by distributing overhead expenses through production of more units. Through globalization organisations is now offering products and services in different countries and cultures, the market size is increasing and they are serving lot. The overall cost of reaching these global is reduced on the cause of technological advancement. Issues of people: People issues involve interaction with the staff of an organization. With the beginning of the 21st century, these people are involving in conventional full-time. People are now more interested on part-time jobs. Every year more and more people will be self-employed, temporary or part-time. In United States dependent work force the total number of full time worker is reducing day by In future, staff will have different hope and demands on their organizations. Mainly, the organisation will have to focus more on the employee-employer relationship than it did in the 20th century. With their increased complexity and globalization, organizations are demanding skills and abilities from their leaders that are only beginning to be understood, never mind mastered. One of the most important of these will be the ability to balance employee wants and customer requirements globally and effectively in upcoming years. Talent human capital will be the prime sources of success. Competencies of leadership: In 21st century world is going to be more competitive, more complex situations. Leaders must have to focus on vision and goals of the organisation. They will have to tackle situations on day-to-day basis, have to identify stakeholders for the purpose of developing people, have to devote in service. Another explanation of competencies will consist of: development and communication ability for maintaining it in a dynamic market and stimulating others to buy into it; helps in decision making by guiding employees at all levels; committing to a culture while aligning individual and corporate goals, gaining knowledge about development. Another new leadership approach for 21st century is Cross Enterprise Leadership. Cross Enterprise Leadership: Cross-Enterprise Leadership that can generate, capture and distribute worth not only in company but all over the network of companies. Secondly, this enterprise-leadership also meets the challenges of complex and dynamic enterprises. Thirdly, it is not possible to manage enterprise by one leader, so consequently it needs to be distributed. Finally, this approach requires changes to leadership and that must be possessed by conventional business leader. http://www.iveybusinessjournal.com/view_article.asp?intArticle_ID=629(10.00pm,26th aug10 ) The current all the theories mainly focus on physical, mental interactions of human in the organisations but spirituals contains. Spiritual leadership: This leadership supplies hope and belief in the organizations vision that will generally help followers to look forward to future. In other ways it can be described through the attitudes and behaviour of leaders that generates sense membership.      Ãƒâ€šÃ‚  Ãƒâ€šÃ‚  Ãƒâ€šÃ‚  Ãƒâ€šÃ‚   In operational field, spiritual leadership deals with the values, attitudes, and behaviours of leaders that are indispensable to inherently motivate ones self and others. http://www.iispiritualleadership.com/spiritual/theory.php,8.0 pm,27th aug10 Comparison Of Leadership Theories Comparison Of Leadership Theories Leadership is the personnel ability which unites power and influence. It means that leadership not only needs power that position given but also needs inner influence that can attract the followers, change their behaviour, inspirit performance and final lead to achieve organizational goals. In the past half century, leadership theory has gone through sots of changes with continue development and improvement of trait theory, behavioral theory, contingency theory and transformational theory(Naylor.J). These four theories have substantial different in definitions; However,there is a progressive relationship that means the performance has increased though developing leadership theory. This essay will compare four leadership theories and take examples to comprehend clearly. Trait theory The trait theory in the earlier time was tend to researched some common characteristics or quality of outstanding leaders. The personal trait of the leader is the key factor of decision effectiveness of leadership.In other word, the leadership efficiency depends on the leaders traits. it has made a standard of leaders traits. therefore, an enterprise s effort could go toward this standard when cultivate leaders.Afterward,the employees will get reasonable development and the enterprise would gain benefit as well.However,as the trait theory ignore the subordinates needs, did not specify the relative importance between all kinds of characteristics , lacking of the distinction between cause and effect,and ignoring the situation factors, causes failure in explaining the leadership behavior. Example of Trait theory As a manager of a enterprise,Steve Jobs leads apple team beginning with only1300$ of Working capital to a development of Market value with 762 million dollars by the year of 2011.And from a family workshop with two people developed to nearly 50000 employees in the global.The success of Jobs is closely linked with his personal traits.In 1997,when he Became a chief executive of apple company,he made a vital decision which turn the crisis situation that he decrease the types of products from 350types to only 10types. Focus on research and development of 10 types product elaborately ,the company profit increased with high quality of productions.The leadership trait of assertiveness and decisiveness are fully presented though this example,and his intelligence, controlling with crisis can not be ignored as well. 2. Behavioural theory Behavioral theory emphasize the behavior of treating subordinates, it focus on concerning of people and production as well as the angle of superiors control and subordinates participation. Based preference of concern, it concludes tree main types of leadership which are Autocratic,Democratic and Laissez-faine.(Naylor.J)Contrast with trait theory, behavioral theory marks the leadership transformation that from single study for leaders characters tend to a wider range of leadership research.However,compare with contingency theory,behavioral theory seems less concern about the needs of situation, the influence of culture and the expectations of subordinators which are its shortage of leadership. Example of Behavioural theory A typical example of Autocratic leadership is STRONG company which is currently the worlds largest sales enterprise of jelly, pudding ,seaweed and other recreational kind of food.it has strict production chain,and concern more about production than staffs.In the workshop, the staffs just need to follow the strict standard during their work, its target is to product high quality and High output of food. Contrast to Autocratic leadership, the Democratic leadership is more friendly, an example is McDonald.Today the McDonald not only is a food industry but also a service industry,leaders need to communicate with staffs to meet their demands then they would work with enthusiasm and satisfaction, thus,gain better profit to company,staffs get more reward as well. 3.Contingency theory As the insufficient study of Trait theory and Behavioral theory , they have a common defect that ignoring the situational factors leads to disrupt in theory and practicality.Therefore,Contingency theory scholars in the study of the leadership taken situational factors into consideration. It though the interaction of personal leaders traits, behavior and work environment to explain the phenomenon of leadership.Contingency theory has the following three researches which are typical :1)Fiedlers contingency theory 2ÃÆ' ¯Ãƒâ€šÃ‚ ¼Ãƒ ¢Ã¢â€š ¬Ã‚ °Vroom and Yetton contingency theory,3)Pathgoal theory(Naylor.J). To a great extent, it closes the distance between leadership theory and the actual of leadership as well as meet the actual executives needs to leadership theory. While,there also are sots of situation need to take into the concern ,for example, the ability of leaders influence the subordinates and the role leaders play expected by subordinates. Example of contingency theory Leaders need to analysis situation elements of the different conditions and adopt different leadership to motivate subordinates, then realize effective management. For example,In the military,leaders have higher power , strict sense of discipline and high morale.The effective leadership is layer upon layer decree to make subordinate clearly of mission objectives. However, in a cooperative type of organization,using the way of commanding tasks would not work.Another example is Foxconn which is a high and new technology enterprise .Based on large scale of enterprise and hundreds of thousands of workers,it dose not have good interpersonal relations between subordinates and it have to put clearly task structure to different levels in the company, also need strong position power to lead such large number of workers. Due to these factors ,Foxconn have a military method and the task-orientated leader would be suitable to lead its workers. 4.Transformational leadership Transformational leadership theory links the role of leader and subordinates, it tries to improve both power and the moral level among leader and subordinates as well. Leaders who own transformational leadership though their behavior model like charisma, inspiration, intellectual stimulation and concern about subordinates to optimize members interaction of organization, then achieve their target and expectations. Therefore, transformational theory emphasize that leaders concern about individual demand levels and inspire work motivation of members to make maximum benefit. Since this theory attaches great importance to the human factor of management,however, human is a complex research object that means there are a lot of things worth our further to study. Example of Transformational leadership Transforming the role of leader and subordinates is a characteristic of transformational leadership that means leaders fully know their subordinates demands also though inspiration to obtain high expectation. McDonalds is one of the biggest and the most famous fast food groups à £Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â€š ¬Ã… ¡its success is closely linked with perfect human resource management, before managers choosing inspiring method, leadership style, they set up the humanist management idea and fully understand the difference between the employees demands to give full play to the initiative ,enthusiasm and creativity.Afterwards,subordinates would feel individual consideration and satisfaction with their works.eventually,McDonald would gain the benefit though its leadership. Conclusion Based on above all analysis and comparison of leadership theory, it is clearly that leadership theory has been boosted a lot from the tait theory to the latest transformational theory with the development in the past half centaury. From Trait theory which just focus on researching leaders characteristics, turn to behavioral theory which tend to concern the influence of leaders behavior to their subordinates,while the contingency theory take the factor of different situations into leadership research that fill the gap of trait theory and behavioral theory,However, transformational theory is more comprehensive and flexible than other three theories.However, refer to changeful situations, leaders should choose appropriate theory to manage their subordinates. Moreover, the research of leadership is not stop, to be more systematic is the research direction in the future.

Sunday, January 19, 2020

Competition Act :: Essays Papers

Competition Act The Competition Act at large focuses on forbidding, respective, agreements between undertakings or concerted practices which may restrict the competition within the market. It forbids all practices, which amount to the abuse of a dominant position in the Market by an undertaking where the practice could potentially, affect trade between its members. The rules of the Act set out the basic framework, providing for the maintenance of effective competition in the market. The Competition Act based on Articles 85 and 86 of the Treaty of Rome provides control to business practices within our market. "The following shall be prohibited as incompatible with the common market: all agreements between undertakings , decisions by associations of undertakings, and concentrated practices which may effect trade between member states and which have as their object or effect the prevention, restriction or distortion of competition within the common market " Therefor any agreement, decision, and practice caught by Section 5(1) must have the following conditions 1. There must be some form of collusion between the undertakings 2. Trade must be affected 3. There must be must some adverse effect on competition. This Section covers such agreements, decisions, practices which: a. Directly or indirectly fix the purchase or selling price or other trading conditions b. Limit or control production , markets, technical development or investment c. Share markets or sources of supply d. Impose the application of dissimilar conditions to equivalent transactions which other parties outside such agreement, thereby placing them at a competitive disadvantage e. Make the conclusion of contrast subject to the acceptance by the other parties of supplementary obligations, which by their nature or according to commercial usage, have no connections, which the subject of such contracts. The competition act analyzes various aspects so as to promote a healthy business environment. It gives a clear picture in respect to positioning in the market. Clearly, the narrower the definition of the relevant market, the greater the importance of an undertakings share of that market. Once one has defined the relevant market, one must determine whether the questioned undertaking has a dominant position in that market. In general, an undertaking has a dominant position if it can act on the market independently from its competitors. Thus, if a seller can ask any price for a product, even though its competitors are selling a similar product for much less, it is likely that the seller in question has a dominant position.

Saturday, January 11, 2020

Intelligent Campus Using Rfid

chapter 1 introduction 1. 1GENERAL With the increasing denial of time and space the RFID technology is gaining momentum day by day. RFID is a source of identification of individuals and unique products. The budding technology RFID proves to threaten even the cloning technique, through the chip insertion. New ways of improving the existing RFID technology are being found and implemented. This advancement of RFID technology is looked beyond the security purposes. 1. 2 PRESENT SCENARIO Radio frequency identification (RFID) is a general term that is used to describe a system that transmits the identity (in the form of unique serial number) of an object wirelessly, using radio waves. RFID technologies are grouped under the more generic Automatic Identification and Data Capture (AIDC). The RFID technology is used only in security, tagging goods, inventory purposes. Since the RFID technology is not well established in India, the introduction of new methodology in the field of RFID will indeed enhance the use of RFID technology in various areas of science and technology. . 3 PROBLEM An individual should be allocated to maintain registers in all places and appointment of staffs for coordinating with students in all occasions. The ID card can be duplicated even thought it has some other advancement which will be used in rare occasions. 1. 4 SOLUTION The best solution to the above problem is to develop a single RFID tag that can be used inside the college campus. Each and every RFID tag holds a particular number and it is integrated with the id cards of each and every individuals. The RFID tag reader can be fixed anywhere in campus and it is used to collect the information about the tag location. The collected data can be sent to centralized server to handle that information. Another added advantage is that the ID cards can’t be duplicated. This has several advantages and it is a time saving one for the institution, students and staff members. 1. 5 HARDWARE AND SOFTWARE REQUIRED The hardware required is: 1) Personal computer. 2) RS 232. 3) Reader. 4) Power supply unit. 5) IR transmitter and receiver pair. 6) Buzzer. 7) LCD. 8) Tags. The software required is: 1) AVR studio 3. 5. 2) Visual studio 6. 0. 1. 6 BLOCK DIAGRAM Figure 1. 1 block diagram of intelligent campus using RFID CHAPTER 2 RFID system 2. 1 INTRODUCTION Radio Frequency Identification or RFID refers to the set of technologies that use radio waves for identifying objects or people. The RFID system is used to identify individual objects or things in the environment which can be monitored through use of wireless technology. RFID is a generic term for technologies that use radio waves to remotely store and retrieve data. In other words, it is a combined term with RF and ID where RF means a wireless communication technology and ID means identification information of tag. So it is said that RFID is theoretically a wireless networking technology to transmit identification information stored at an electronic memory space. 2. 2 COMPONENTS OF RFID SYSTEM: ? An RFID device (transponder or tag), that contains data about an item. ? An antenna used to transmit the RF signals between the reader and the RFID devices. ? An RF transceiver that generates the RF signals. A reader that receives RF transmissions from an RFID device and passes the data to the host system for processing. Figure 2. 1: RFID SYSTEM 2. 3 GENERIC RFID TAG ARCHITECTURE The tag contains circuit to both rectify DC power from the incoming RF signal as well as to detect and extract the information modulated on the signal. The antenna load is a controlled resistance that changes the impedance of the dipole, enabling the backscatter. The tag IC is mounted on a carrier known as a strap and subsequently bonded to the antenna to form the fully assembled tag. The chip itself is very small, enabled by modem CMOS technology. The mounting of the die on a carrier has been made very inexpensive and capable of large volume by either flip-flop or by other innovative technique such as the Alien Technologies Fluidic self Assembly process. [pic] Figure 2. 2: Basic Tag IC Architecture 2. 4 Components of a tag The major components of the tag are 1) Microchip. 2) Antenna. 2. 4. 1 Microchip Microchip is electronic equipment consisting of a small crystal of silicon semiconductor fabricated to carry out a number of electronic functions in an integrated circuit. The microchip used in a HF tag is a contact less read/ write passive RFID device that is optimized for 13. 56 MHz RF carrier signal. The device needs an external LC resonant circuit for wireless communication with the interrogator. The device is powered remotely by rectifying an RF signal that is transmitted from the interrogator and transmits or updates its contents from memory-based on commands from interrogator. 2. 4. 2 Antenna The antenna emits the radio signal to activate the tag and reading and writing data to it. Antennas are the conduits between the tag and the transceiver, which controls the system data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built in a door frame to receive tag data from persons or things. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continuously. If constant interrogation is not required, the field can be activated by the sensor device. 2. 5 rfid readers RFID reader is like any other device that can be connected to a PC Or might be in built like an external or internal modem. The RFID reader can be powered by a power source using an adapter †Reader† or †Interrogator†, a device that is able to locate and activate tags so that the information that has been programmed onto the tag is transmitted back to the reader and subsequently to interface computing systems. The information that is received by the reader is then passed to the backend computing system to initiate the events, transactions, workflows, etc. Not only do reader locate activate and receive transmissions from RFID tags, a reader has the ability of sending data back to read/write capable tag in order to append or replace data. Readers exist that can also scan bar codes in environments where both bar codes and RFID are used. 2. 6 COMPONENTS OF A READER The reader has the following main components: ? Transmitter and Receiver ? Microprocessor ? Memory ? I/O channels for external sensors, actuators and annunciators ? Controller ? Communication interface ? Power. [pic] Figure 2. 3: BLOCK diagram of a reader 2. 6. 1 TRANSMITTER The reader’s transmitter is used to transmit AC power and the clock cycle via antennas to the tags in its read zone. This is part of the transceiver unit, the component responsible for sending the reader signal to the surrounding environment and receiving tag responses back via the reader antennas. The antenna ports of reader are connecting to its transceiver component. One reader antenna can be attached to each such antenna port. Receiver receives analog signals from the tag via the reader antenna. It then sends the signals to reader microprocessor, where it is converted to its equivalent digital form. 2. 6. 2 MICROPROCESSOR This component is responsible for implementing the reader protocol to communicate with compatible tags. It performs decoding and error checking of the analog signal from the receiver. In addition, the microprocessor might contain custom logic for doing low level filtering and processing of read tag data. 2. 6. 3 MEMORY Memory is used for storing data such as the reader configuration parameters and list of tag reads. Depending on the memory size, however, a limit applies as to how many such tag reads can be stored at one time. If the connection remains down for an extended period with the reader reading tags during this downtime, this limit might be exceeded an part of the stored data lost. 2. 6. 4 I/O channels Readers do not have to be turned on for reading tags at all time. A sensor of some sort, such as a motion or light sensor, detects the presence of tagged objects in the readers read zone. This sensor can then set the reader on to read this tag. Similarly, this component also allows the reader to provide local output depending on some condition via an annunciators or an actuator. 2. 6. 6 CONTROLLER A controller is an entity that allows an external entity, either a human or a computer program, to communicate with and control a reader’s function and to control annunciators and actuators associated with the reader. . 6. 7 COMMUNICATION INTERFACE The communication interface component provides the communication instructions to a reader that allows it to interact with external entities, via a controller to transfers its stored data and to accept commands and send back the corresponding responses. 2. 6. 8 POWER This component supplies power to the reader component. The power sources g enerally provided to this component through a power cord connected to an appropriate external electrical outlet. 2. 7 COMMUNICATION BETWEEN A READER AND A TAG Depending on the tag type, the communication between the reader and a tag can be one of the following: †¢ Modulated backscatter †¢ Transmitter type †¢ Transponder type The area between a reader antenna and one full wave length of the RF wave emitted by the antenna is called near field. The area beyond one full wavelength of the RF wave emitted from a reader antenna is called far field. Passive rfid systems operating in LF and HF use near field communication, whereas those in UHF and microwave frequencies use far field communication. The signal strength in near field communication attenuates as the cube of the distance from the reader antenna. In far field, it attenuates as square of the distance from the reader antenna. 2. 7. 1 MODULATED BACK SCATTER Modulated backscatter communication applies to passive as well as to semi active tags. In This type of communication, the reader sends out a continuous wave (CW) RF signal containing ac power and clock signal to the tag at carrier frequency. Through physical coupling, the antennas supplies power to the microchip. About 1. 2v are generally necessary to energize the tag microchip for reading microchips. For writing, the microchip usually needs to draw about 2. 2v from the reader signal. The microchip now modulates or breaks up the input signal in to a sequence of on and off patterns that represents its data and transmits it back. When the reader receives this modulated signal, it decodes the pattern and obtains the data. Thus, in modulated backscatter communication, the reader always â€Å"talks† first, followed by the tag. A tag using this scheme cannot communicate at all in the absence of a reader because it depends totally on the reader’s power to transmit its data. pic] Figure 2. 4: backscatter communication 2. 7. 2 TRANSMITTER TYPE This type of communication applies to active tags only. In this type of communication, the tag broadcasts its message to the environment in regular intervals irrespective of the presence or absence of a reader. Therefore, in this type of communication, the tag always â€Å"talks† first rather than the reader. [pic] Figure 2. 5: T RANSMITTER communication 3. 4. 3 TRANSPONDER TYPE In this type of communication, the tag goes to a â€Å"sleep† or in to dormant stage in the absence of interrogation from a reader. In this stage, the tag might periodically send a message to check any reader is listening to it. When a reader receives such a query message, it can instruct the tag to â€Å"wake up† or end the dormant stage. When the tag receives this command from the reader, it exits its current state and starts to act as a transmitter tag again. The tag data is sent only the reader specially asks. [pic] Figure 2. 6: TRANSPONDER communication chapter 3 microcontroller 3. 1 INTRODUCTION The hardware includes the following components: ? Atmega162 (micro controller). ? Power supply. ? In system programming. ? Buzzer. Liquid crystal display. ? Reset. ? Max 232. 3. 2 Hardware details of ATMEGA162 controller Utilizes the AVR – RSIC architecture. 3. 2. 1 Features ? High-performance and Low-power Advanced RISC Architecture. ? Most single clock execution. ? 32 x 8 general purpose working registers. ? Fully static operation. ? On chip 2 cycle multiplier. ? Up to 16 MIPS throughput at 16 MHz. ? 131 powerful instructions. 3. 2. 2 Non-volatile Program and Data Memories ? 16K Bytes of In-System Self-programmable Flash. ? Endurance: 10,000 Write/Erase Cycles. ? 512 Bytes EEPROM. ? 1K Bytes Internal SRAM. Up to 64K Bytes Optional External Memory Space. ? Programming Lock for Flash program and EEPROM data Security. 3. 2. 3 Peripheral Features ? Two 8-bit Timer/Counters with Separate Modes. ? Two 16-bit Timer/Counters with Separate Compare Modes, and Capture Modes. ? Real Time Counter with Separate Oscillator. ? Six PWM Channels. ? Dual Programmable Serial USARTs. ? Master/Slave SPI Serial Interface. ? Programmable Watchdog Timer with Separate On-chip Oscillator. ? On-chip Analog Comparator. ? External and internal interrupt sources. 3. 2. 4 SPECIFICATION ? Low power high speed CMOS process technology. Fully static operation. ? Power consumption at 4 MHz, 3v, 25c. ? Active: 3. 0 MA. 3. 2. 5 Special Microcontroller Features ? Power-on Reset and Programmable Brown-out Detection. ? Internal Calibrated RC Oscillator. ? External and Internal Interrupt Sources. ? Five Sleep Modes: Idle, Power-save, Power-down, Standby, and Extended Standby. 3. 2. 6 I/O and Packages ? 35 Programmable I/O Lines. ? 40-pin PDIP, 44-lead TQFP, and 44-pad MLF. 3. 2. 7 Operating Voltages ? 1. 8 – 5. 5V for ATmega162V. ? 2. 7 – 5. 5V for ATmega162. 3. 2. 8 Speed Grades ? 0 – 8 MHz for ATmega162V. ? 0 – 16 MHz for ATmega162. 3. ATMEGA162 architectural overview The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR enhanced RISC architecture. By executing powerful instructions in a single clock cycle, the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system designer to optimize power consumption versus processing speed. The AVR core combines a rich instruction set with 32 general purpose working registers. All the 32 registers are directly connected to the Arithmetic Logic Unit (ALU), allowing two independent registers to be accessed in one single instruction executed in one clock cycle. . 3. 1 features OF ATMEGA162 The 16K bytes of In-System Programmable Flash with Read-While-Write capabilities, 512 bytes EEPROM, 1K bytes SRAM, an external memory interface, 35 general purpose I/O lines, 32 general purpose working registers, a JTAG interface for Boundary-scan, On-chip Debugging support and programming, four flexible Timer/Counters with compare modes, internal and external interrupts, two serial programmable USARTs, a programmable Watchdog Timer with Internal Oscillator, an SPI serial port, and five software selectable power saving modes. The fast-access Register File contains 32 x 8-bit general purpose working registers with a single clock cycle access time. This allows single-cycle Arithmetic Logic Unit (ALU) operation. In a typical ALU operation, two operands are output from the Register File, the operation is executed, and the result is stored back in the Register File – in one clock cycle. Six of the 32 registers can be used as three 16-bit indirect addresses register pointers for Data Space addressing – enabling efficient address calculations. One of these address pointers can also be used as an address pointer for look up tables in Flash Program memory. These added function registers are the 16-bit X-, Y-, and Z-register, described later in this section. The ALU supports arithmetic and logic operations between registers or between a constant and a register. Single register operations can also be executed in the ALU. After an arithmetic operation, the Status Register is updated to reflect information about the result of the operation. [pic] Figure 3. 1: BLOCK Diagram. Program flow is provided by conditional and unconditional jump and call instructions, able to directly address the whole address space. Most AVR instructions have a single 16-bit word format. Every program memory address contains a 16 or 32-bit instruction. [pic] Figure 3. 2: BLOCK Diagram of the AVR Architecture Program Flash memory space is divided in two sections, the Boot Program section and the Application Program section. Both sections have dedicated Lock bits for write and read/write protection. The SPM instruction that writes into the Application Flash memory section must reside in the Boot Program section. During interrupts and subroutine calls, the return address Program Counter (PC) is stored on the Stack. The Stack is effectively allocated in the general data SRAM, and consequently the Stack size is only limited by the total SRAM size and the usage of the SRAM. All user programs must initialize the SP in the reset routine (before subroutines or interrupts are executed). [pic] Figure 3. 3: Data Memory Map 3. 3. 2 ALU – Arithmetic Logic Unit The high-performance AVR ALU operates in direct connection with all the 32 general purpose working registers. Within a single clock cycle, arithmetic operations between general purpose registers or between a register and an immediate are executed. The ALU operations are divided into three main categories – arithmetic, logical, and bit-functions. 3. 3. 3 Status Register The Status Register contains information about the result of the most recently executed arithmetic instruction. This information can be used for altering program flow in order to perform conditional operations. Status Register format [pic] Bit 7 – I: Global Interrupt Enable: The Global Interrupt Enable bit must be set for the interrupts to be enabled. The individual interrupt enable control is then performed in separate control registers. If the Global Interrupt Enable Register is cleared, none of the interrupts are enabled independent of the individual interrupt enable settings. The I-bit is cleared by hardware after an interrupt has occurred, and is set by the RETI instruction to enable subsequent interrupts. Bit 6 – T: Bit Copy Storage: The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T bit as source or destination for the operated bit. Bit 5 – H: Half Carry Flag: The Half Carry Flag H indicates a half carry in some arithmetic operations. Half Carry is useful in BCD arithmetic. Bit 4 – S: Sign Bit, S = N. V: The S-bit is always an exclusive or between the Negative Flag N and the Two’s Complement Overflow Flag V. Bit 3 – V: Two’s Complement Overflow Flag: The Two’s Complement Overflow Flag V supports two’s complement arithmetic. Bit 2 – N: Negative Flag: The Negative Flag N indicates a negative result in an arithmetic or logic operation. Bit 1 – Z: Zero Flag: The Zero Flag Z indicates a zero result in an arithmetic or logic operation. Bit 0 – C: Carry Flag: The Carry Flag C indicates a carry in an arithmetic or logic operation. 3. 3. 4 Stack Pointer The Stack is mainly used for storing temporary data, for storing local variables and for storing return addresses after interrupts and subroutine calls. The Stack Pointer Register always points to the top of the Stack. The Stack Pointer points to the data SRAM Stack area where the Subroutine and Interrupt Stacks are located. This Stack space in the data SRAM must be defined by the program before any subroutine calls are executed or interrupts are enabled. Stack Pointer FORMAT pic] The Stack Pointer is incremented by one when data is popped from the Stack with the POP instruction, and it is incremented by two when data is popped from the Stack with return from subroutine RET or return from interrupt RETI. The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The number of bits actually used is implementation dependent. 3. 3. 5 Reset and Interrupt Handling The AVR provi des several different interrupt sources. These interrupts and the separate Reset Vector each have a separate program vector in the program memory space. All interrupts are assigned individual enable bits which must be written logic one together with the Global Interrupt Enable bit in the Status Register in order to enable the interrupt. There are basically two types of interrupts. The first type is triggered by an event that sets the Interrupt Flag. For these interrupts, the Program Counter is vectored to the actual Interrupt Vector in order to execute the interrupt handling routine, and hardware clears the corresponding Interrupt Flag. Interrupt Flags can also be cleared by writing a logic one to the flag bit position(s) to be cleared. If an interrupt condition occurs while the corresponding interrupt enable bit is cleared, the Interrupt Flag will be set and remembered until the interrupt is enabled, or the flag is cleared by software. The second type of interrupts will trigger as long as the interrupt condition is present. These interrupts do not necessarily have Interrupt Flags. If the interrupt condition disappears before the interrupt is enabled, the interrupt will not be triggered. 3. 3. 6 In-System Reprogrammable Flash Program Memory The ATmega162 contains 16K bytes On-chip In-System Reprogrammable Flash memory for program storage. Since all AVR instructions are 16 or 32 bits wide, the Flash is organized as 8K x 16. For software security, the Flash Program memory space is divided into two sections, Boot Program section and Application Program section. [pic] Figure 3. 4 Programmable Memory Map The Flash memory has an endurance of at least 10,000 write/erase cycles. The ATmega162 Program Counter (PC) is 13 bits wide, thus addressing the 8K program memory locations. 3. 4 EEPROM Data Memory The ATmega162 contains 512 bytes of data EEPROM memory. It is organized as a separate data space, in which single bytes can be read and written. The EEPROM has an endurance of at least 100,000 write/erase cycles. The access between the EEPROM and the CPU is described in the following, specifying the EEPROM Address Registers, the EEPROM Data Register, and the EEPROM Control Register. 3. 4. 1 EEPROM Read/Write Access The EEPROM Access Registers are accessible in the I/O space. A self timing function, however, lets the user software detect when the next byte can be written. If the user code contains instructions that write the EEPROM, some precautions must be taken. In heavily filtered power supplies, VCC is likely to rise or fall slowly on Power-up/down. This causes the device for some period of time to run at a voltage lower than specified as minimum for the clock frequency used. In order to prevent unintentional EEPROM writes, a specific write procedure must be followed. The EEPROM Address Register [pic] Bits 15. 9 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bits 8. 0 – EEAR8. 0: EEPROM Address The EEPROM Address Registers – EEARH and EEARL specify the EEPROM address in the 512 bytes EEPROM space. The EEPROM data bytes are addressed linearly between 0 and 511. The initial value of EEAR is undefined. A proper value must be written before the EEPROM may be accessed. The EEPROM Data Register –EEDR [pic] Bits 7. 0 – EEDR7. 0: EEPROM Data For the EEPROM write operation, the EEDR Register contains the data to be written to the EEPROM in the address given by the EEAR Register. For the EEPROM read operation, the EEDR contains the data read out from the EEPROM at the address given by EEAR. The EEPROM Control Register – EECR [pic] Bits 7. 4 – Res: Reserved Bits These bits are reserved bits in the ATmega162 and will always read as zero. Bit 3 – EERIE: EEPROM Ready Interrupt Enable Writing EERIE to one enables the EEPROM Ready Interrupt if the I bit in SREG is set. Writing EERIE to zero disables the interrupt. The EEPROM Ready interrupt generates a constant interrupt when EEWE is cleared. Bit 2 – EEMWE: EEPROM Master Write Enable The EEMWE bit determines whether setting EEWE to one cause the EEPROM to be written. When EEMWE is set, setting EEWE within four clock cycles will write data to the EEPROM at the selected address. If EEMWE is zero, setting EEWE will have no effect. When EEMWE has been written to one by software, hardware clears the bit to zero after four clock cycles. See the description of the EEWE bit for an EEPROM write procedure. Bit 1 – EEWE: EEPROM Write Enable The EEPROM Write Enable signal EEWE is the write strobe to the EEPROM. When address and data are correctly set up, the EEWE bit must be written to one to write the value into the EEPROM. The EEMWE bit must be written to one before a logical one is written to EEWE; otherwise no EEPROM write takes place. The following procedure should be followed when writing the EEPROM (the order of steps 3 and 4 is not essential): 1. Wait until EEWE becomes zero. 2. Wait until SPMEN in SPMCR becomes zero. 3. Write new EEPROM address to EEAR (optional). 4. Write new EEPROM data to EEDR (optional). 5. Write a logical one to the EEMWE bit while writing a zero to EEWE in EECR. 6. Within four clock cycles after setting EEMWE, write a logical one to EEWE. The EEPROM can not be programmed during a CPU write to the Flash memory. The software must check that the Flash programming is completed before initiating a new EEPROM write. Step 2 is only relevant if the software contains a Boot Loader allowing the CPU to program the Flash. If the Flash is never being updated by the CPU, step 2 can be omitted. Caution: An interrupt between step 5 and step 6 will make the write cycle fail, since the EEPROM Master Write Enable will time-out. If an interrupt routine accessing the EEPROM is interrupting another EEPROM access, the EEAR or EEDR Register will be modified, causing the interrupted EEPROM access to fail. It is recommended to have the Global Interrupt Flag cleared during all the steps to avoid these problems. When the write access time has elapsed, the EEWE bit is cleared by hardware. The user software can poll this bit and wait for a zero before writing the next byte. When EEWE has been set, the CPU is halted for two cycles before the next instruction is executed. Bit 0 – EERE: EEPROM Read Enable The EEPROM Read Enable Signal EERE is the read strobe to the EEPROM. When the correct address is set up in the EEAR Register, the EERE bit must be written to a logic one to trigger the EEPROM read. The EEPROM read access takes one instruction, and the requested data is available immediately. When the EEPROM is read, the CPU is halted for four cycles before the next instruction is executed. The user should poll the EEWE bit before starting the read operation. If a write operation is in progress, it is neither possible to read the EEPROM, nor to change the EEAR Register. 3. 5 Timing External memory devices have various timing requirements. It is important to consider the timing specification of the external memory device before selecting the wait-state. The most important parameters are the access time for the external memory in conjunction with the set-up requirement of the ATmega162. [pic] Figure 3. 5: External Data Memory Cycles without Wait-state. 3. 6 Crystal Oscillator XTAL1 and XTAL2 are input and output, respectively, of an inverting amplifier which can be configured for use as an On-chip Oscillator. Either a quartz crystal or a ceramic resonator may be used. C1 and C2 should always be equal for both crystals and resonators. The optimal value of the capacitors depends on the crystal or resonator in use, the amount of stray capacitance, and the electromagnetic noise of the environment. The Oscillator can operate in four different modes, each optimized for a specific frequency range. [pic] Figure 3. 6: Crystal Oscillator Connections 3. 6. 1 Low-frequency Crystal Oscillator The Low-frequency Crystal Oscillator must be selected by setting the CKSEL Fuses to â€Å"0100†, â€Å"0101†, â€Å"0110† or â€Å"0111†. The crystal should be connected as shown in Figure. If CKSEL equals â€Å"0110† or â€Å"0111†, the internal capacitors on XTAL1 and XTAL2 are enabled, thereby removing the need for external capacitors. The internal capacitors have a nominal value of 10 pF. When this Oscillator is selected, start-up times are determined by the SUT Fuses (real time-out from Reset) and CKSEL0 (number of clock cycles) as shown in below tables [pic] Table 4. 1 Start-up DELAYS from Reset when Low-frequency Crystal Oscillator is selected . 7 Watchdog Timer If the Watchdog Timer is not needed in the application, this module should be turned off. If the Watchdog Timer is enabled, it will be enabled in all sleep modes, and hence, always consume power. In the deeper sleep modes, this will contribute significantly to the total current consumption. Chapter 4 Intelligent campus using rfid 4. 1 INTRODUCTION This project describes about the efficient used of RFID technology around us, it also describes about the use of both hardware and software. In addition we also focus on monitoring every individual inside the campus. 4. 2 Basic setup [pic]Figure 4. 1 basic setup The basic external setup for the project is shown in figure 8. 1. The HF reader is connected to microcontroller through RS-232 cable and the IR pairs are connected to the port pins of microcontroller. The microcontroller is then connected to the host computer (server) through RS-232 cable. The detailed explanation of the blocks are given below 4. 3 PERIPHERALS 4. 3. 1 I/O PORTS All AVR ports have true read-modify-write functionality when used as general digital I/O ports. This means that the direction of one port pin can be changed without unintentionally changing the direction of any other pin with the SBI and CBI instructions. Port A Port A is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port A, one each for the Data Register – PORT A, SIB($IB($3B), Data Direction Register – DDRA, $1A($3A) and the Port A. Input Pins – PINA, $19($39). The Port A Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port B Port B is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port B, one each for the Data Register – PORT B, $18($38), Data Direction Register – DDRB, $17($37) and the Port B Input Pins – PINB, $16($36). The Port B Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port C Port C is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port C, one each for the Data Register – PORT C, $15($35), Data Direction Register – DDRC, $14($34) and the Port C Input Pins – PINC, $13($33) The Port C Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. Port D Port D is an 8-bit bi-directional I/O port. Three I/O memory address locations are allocated for the Port D, one each for the Data Register – PORT D, $12($32), Data Direction Register – DDRD, $11($31) and the Port D Input Pins – PIND, $10($30). The Port D Input Pins address is read only, while the Data Register and the Data Direction Register are read/write. 4. 4 USART (Universal Synchronous and Asynchronous serial Receiver and Transmitter): The Universal Synchronous and Asynchronous serial Receiver and Transmitter (USART) is a highly flexible serial communication device. The main features are: ? Asynchronous or Synchronous Operation ? Master or Slave Clocked Synchronous Operation ? Odd or Even Parity Generation and Parity Check Supported by Hardware ? Data Overrun Detection ? Framing Error Detection ? Three Separate Interrupts on TX Complete, TX Data Register Empty and RX Complete ? Multi-processor Communication Mode ? Double Speed Asynchronous Communication Mode The ATmega162 has two USARTs, USART0 and USART1. USART0 and USART1 have different I/O Registers. Portd0 is the receiver pin and portd1 is the transmitter pin. Here we are using IC MAX232 as a UART driver. [pic] Figure 4. 2 uart driver. 4. 4. 1 AVR UART – Compatibility The USART is fully compatible with the AVR UART regarding: ? Bit locations inside all USART Registers ? Baud Rate Generation ? Transmitter Operation ? Transmit Buffer Functionality ? Receiver Operation 4. 4. 2 USART Initialization The USART has to be initialized before any communication can take place. The initialization process normally consists of setting the baud rate, setting frame format and enabling the Transmitter or the Receiver depending on the usage. For interrupt driven USART operation, the Global Interrupt Flag should be cleared (and interrupts globally disabled) when doing the initialization. The TXC Flag can be used to check that the Transmitter has completed all transfers, and the RXC Flag can be used to check that there are no unread data in the receive buffer. 4. 5 SENSOR Sensors are the devices that are used to convert the physical parameter into signal that can be measured electrically and it can be easily given as an input to the microcontroller. The effectual sensor should have the following properties namely, ? Sensor should be sensitive to measured property. ? It should be insensitive to any other property. ? It should not influence any other property. An IR sensor is used. It uses IR LED as an IR transmitter, which emits IR rays in the wavelength of 940 nm and a phototransistor is used as IR receiver, which detects IR rays and the output comes in collector. If the receiver is receiving IR rays the output will be low otherwise output is high. The output of the receiver is given to the comparator chip LM393, which compares the receiver output with the prefixed voltage signal. The output of the comparator is given to microcontroller. [pic] Figure 4. 3 CIRCUIT DIAGRAM OF IR SENSOR 4. 5. 1 IR TRANSMITTER LED, a special type of semiconductor diode that has a pn junction acts as a transmitter. The wavelength and the color of the light depend on the band gap energy of the material forming pn junction. The materials used for a LED have a direct band gap energy corresponding to near IR, but Germanium and silicon are indirect band gap materials resulting in a non – radiative recombination. Hence does not emit light. The advantages of LED over incandescent sources are: ? Less costly Long life span ? Insensitive to vibration and shocks. 4. 5. 2 IR RECEIVER A phototransistor is used to detect the IR rays from the LED. It is a bi polar junction that is encased in a transparent case so that light can reach the base collector junction. The phototransistor works like a photodiode with a very high very high sensitivity for light, because the electrons that are gene rated by photons in the base collector junction are injected to base and amplified like a transistor. It has a slower response time than photodiode. [pic] Figure 4. 4 BLOCK DIAGRAM OF IR SENSOR 4. 5. 3COMPARATOR The comparator is a circuit which compares a signal voltage applied at one input of an op-amp with a known reference voltage at the other input. For an inverting comparator the reference voltage is applied to the (+) input and input is given to the (-) terminal. The common mode voltage range includes ground, and the differential input voltage equals power supply voltage. [pic] Figure 4. 5: PIN CONFIGURATION OF LM 393 4. 6 BUZZER It is a transducer which converts electrical signal to sound signal. Piezoelectricity is the ability of certain crystals to produce a voltage when subjected to mechanical stress. The effect is reversible (i. . ) crystals when subjected to external applied voltage can change shape by a small amount and the effect is of nanometers. [pic] Figure 4. 6 circuit diagram of buzzer 4. 7 RS-232C RS-232 stands for Recommend Standard number 232 and C is the latest revision of the standard. The serial ports on most computers use a subset of the RS-232C standard. [pic] Fig ure: 4. 7. RS-232 CONNECTOR 4. 7. 1 DB9 INFORMATION The DB9 connection has 9 pins which are each described in the below table. The illustration below is an example of the female serial connector, which would usually be located on the connector that would connect to the computer. 9 pin connector on a DTE device (PC connection) | |Pin No |Direction of the signal | |1 |Carrier(CD) ( from DCE) incoming signal from the modem | |2 |Received data (RD) incoming data from DCE | |3 |Transmit data (TD) outgoing data to a DCE | |4 |Data terminal ready (DTR) outgoing handshake signal | |5 |Signal ground common reference voltage | |6 |Data set ready (DSR) incoming handshaking signal | |7 |Request to send (RTS) outgoing flow control signal | |8 |Clear to send (CTS) incoming flow control signal | |9 |Ring indicator (RI) (from DCE) incoming signal from a modem | Table: 4. 1: DB9 connector DTE stands for Data Terminal Equipment, and DCE stands for Data Communications Equipment. These terms are used to indicate the pin-out for the connectors on a device and the direction of the signals on the pins The RS-232 standard states that DTE devices use a 9-pin male connector, and DCE devices use a 9-pin female connector. 4. 8 LCD LCD is an output device which is used to display a character or a text through microcontroller. So, the LCD is connected in the output port pins of microcontroller. A 2 line LCD display has totally 32 pins. 32 characters can be displayed in our LCD. [pic] Figure 4. 8: 16Ãâ€"2 LCD DISPLAY The starting address for the first line is $80 and for end address is $8F and for second line the starting address is $C0 and the end address is $CF. Pin no |Pin name |I/P or O/P |External connection |Function | |1 |VSS |– |Power supply |GND | |2 |VDD |– | |+5V | |3 |VO |– | |V lcd adjustment | |4 |RS |I/p |MPU |Register select signal | |5 |R/W |I/p |MPU |Read/write select signal | | | | | |Read-1; write-2. | |6 |E |I/p MPU |Operation enable signal | |7-10 |DB0-DB3 |I/p |MPU |Lower order lines | |11-14 |DB4-DB7 |I/p |MPU |Higher order lines | |15-16 |LED,,+,, |I/p |LED backlight power supply |LED,,+,, voltage | | |LED,,-,, | | |type : 4. 2V;Max: 4. 5V | | | | | |LED,,-,, : GND | Table 4. 2 discription of lcd terminals Chapter 5 VISUAL BASIC 5. 1 INTRODUCTION The Visual Basic language is quite powerful – if one can imagine a programming task; it can probably be accomplished using Visual Basic. Once the basics of Visual Basic are understood then one becomes productive. 5. 2 About Visual Basic The â€Å"Visual† part refers to the method used to create the graphical user interface (GUI), Rather than writing numerous lines of code to describe the appearance and location of interface elements, simply add pre built objects into place on screen. The â€Å"Basic† part refers to the BASIC (Beginners All-Purpose Symbolic Instruction Code) language, a language used by more programmers. Visual Basic has evolved from the original BASIC languages and now contains several hundred statements, functions, and keywords, many of which relate directly to the Windows GUI. Beginners can create useful applications by learning just a few of the keywords, yet the power of the language allows professionals to accomplish anything that can be accomplished using any other Windows programming language. The Visual Basic programming language is not unique to Visual Basic. The Visual Basic programming system, Applications Edition included in Microsoft Excel, Microsoft Access, and many other Windows applications uses the same language. The Visual Basic Scripting Edition (VB Script) is a widely used scripting language and a subset of the Visual Basic language. The investment one makes in learning Visual Basic will carry over to many other areas. Whether the goal is to create a small utility for an individual, a work group a large enterprise-wide system, or even distributed applications spanning the globe via the Internet, Visual Basic has the required tools. 5. 3 ADVANTAGES ? Data Access features allow you to create databases, front-end applications, and scalable server-side components for most popular database formats, including Microsoft SQL Server and other enterprise-level databases. ? ActiveXTM Technologies allow you use the functionality provided by other applications, such as Microsoft Word Processor, Microsoft Excel spreadsheet, and other Windows applications. Even applications can be automated and objects can be created using the Professional or Enterprise editions of Visual Basic. ? Internet capabilities make it easy to provide access to documents and applications across the Internet or intranet from within the application, or to create Internet server applications. ? The finished application is a true. exe file that uses a Visual Basic Virtual Machine that you can freely distribute. 5. 4 Program description The front end is visual basic and this programming concept is chosen because it is more users friendly. The information or the status about the persons is displayed and the same can be stored in a database so that it can be accessed later. [pic] Figure 5. : output and database creation, checking form Chapter 6 conclusion RFID technology is a budding technology that is fast growing world wide. RFID proves to be cutting edge technology through its applications. This project moves a step ahead in RFID’s application and presents a new dimension to view through. This project proves to be entirely different and innovative of RFID technology with the existing components. Such an introduction of a new methodology in the RFID technology enhances its use and improves the present knowledge. The project â€Å"INTELLIGENT campus using RFID† will sure make a great difference in the present industrial applications of RFID. It will provide the ultimate solution for the problems that exists in various cases. This is a prototype of the proposed idea wherein the entire reason behind it is to provide a fully compact, covering larger distance. 6. 1 PROCESS EXPLANATION The various processes that take place during the working of the project are as follows: The RFID tag is a passive, high frequency device in which some unique data’s can be stared in the form of serial numbers known as ELECTRONIC PRODUCT CODE (EPC). Whenever the RFID tag comes in the field of a particular reader, the reader detects the tag and sends the detected information about the EPC to the microcontroller. ACTIVITY FLOWCHART Figure 6. 1: activity flow chart The received information will be fed into the microcontroller which compares the epc number to specific information’s about group of individuals. If the received information is already in the list, it will allow the user to enter inside the campus and also maintains a database for storing this information. The reader refreshes its data continuously checks after certain amount of time interval and when the RFID reader detects the absence of a tag it will remove the tag details from the list. The database can be created with the help of visual basic programming. [pic] Figure 6. 2: database creation of persons entering into the campus Whenever the tag enters into a specific location such as class rooms, library etc, the reader present in that location will detects the tag. Two IR transmitter – receiver pairs are used for the purpose of monitoring whether the person is entering the room or leaving the room. The IR rays interfering sequence is fed to the microcontroller and it is used for detecting the status of the person having that particular tag. The details or the status are also saved into database using visual basic coding. The databases can be shared in the network and it can be used for finding or monitoring each and every individual belonging to that campus. [pic] Figure 6. 3: database creation of persons entering into PARTICULAR LOCATION. The same can be used to find the individual location using search option. 6. 2 FUTURE ENHANCEMENTS The project could further be developed and enhanced in an effective way by suitable polarization RFID reader antennas and increasing the frequency range so that it would not only provide the solution for monitoring persons in a smaller area as mentioned in this model. The security can also be increased by replacing IR devices by some bio-metric ideas. ———————– 162- MICRO CONTROLLER LCD I/O P O R T S I/O P O R T S BUZZER IR 1 IR 2 USART USART PC RFID END CREATES A DATA BASE (In/Out) 1-2 OR 2-1 Yes No Interruption Occurred CHECHS FOR IR SIGNAL CREATES A DATA BASE (Present inside the campus) INFORMATION TRANSFER FROM RFID READER TO M162 Yes RFID TAG PRESENT No READER SIGNAL TRANSMIT START

Friday, January 3, 2020

The Great Gatsby By F. Scott Fitzgerald - 932 Words

The American Dream, a concept coined at a time when wealth, power, and prosperity was the ultimate goal. In, The Great Gatsby, Fitzgerald illustrates a situation where the dream in the end turns into a complete nightmare. Jay Gatsby’s love of Daisy contributed to his hunger for a wealthy lifestyle, which finally brings Gatsby to his failure. The affection that Gatsby had for Daisy Buchanan made him thirst for the affluent that he believed would earn her love back. â€Å"He talked a lot about the past, and I gathered that he wanted to recover something. Some idea of himself perhaps, that had gone into loving Daisy. His life had been confused and disordered since then, but if he could once return to a certain starting place and go over it all slowly, he could find out what that thing was† (Fitzgerald 117). Gatsby wanted to gain the love of Daisy, trying to go back to the position they once were before he was enlisted into the war. When Jay and Daisy met time stood still while he was falling in love with her, or at least the idea of her. After they had separated nothing seemed to be perfect with Gatsby goes off to serve in the war and Daisy meeting Tom, almost calling off her wedding for Gatsby. â€Å"Can’t repeat the past? Why of course you can. I’m going to fix everything just the way it was befor e† (Fitzgerald 116-7). Jay tells Nick that just because Daisy loves someone else, Tom, that does not imply they cannot love each other once more, attempting to go back to the stage whereShow MoreRelatedThe Great Gatsby by F. Scott Fitzgerald1393 Words   |  6 PagesF. Scott Fitzgerald was the model of the American image in the nineteen twenties. He had wealth, fame, a beautiful wife, and an adorable daughter; all seemed perfect. Beneath the gilded faà §ade, however, was an author who struggled with domestic and physical difficulties that plagued his personal life and career throughout its short span. This author helped to launch the theme that is so prevalent in his work; the human instinct to yearn for more, into the forefront of American literature, where itRead MoreThe Great Gatsby By F. Scott Fitzgerald1343 Words   |  6 PagesHonors English 10 Shugart 18 Decemeber 2014 The Great Gatsby F. Scott Fitzgerald s 1925 novel The Great Gatsby is a tragic love story, a mystery, and a social commentary on American life. The Great Gatsby is about the lives of four wealthy characters observed by the narrator, Nick Carroway. Throughout the novel a mysterious man named Jay Gatsby throws immaculate parties every Saturday night in hope to impress his lost lover, Daisy Buchanan. Gatsby lives in a mansion on West Egg across from DaisyRead MoreThe Great Gatsby By F. Scott Fitzgerald1155 Words   |  5 PagesThe Great Gatsby The Jazz Age was an era where everything and anything seemed possible. It started with the beginning of a new age with America coming out of World War I as the most powerful nation in the world (Novel reflections on, 2007). As a result, the nation soon faced a culture-shock of material prosperity during the 1920’s. Also known as the â€Å"roaring twenties†, it was a time where life consisted of prodigality and extravagant parties. Writing based on his personal experiences, author F. ScottRead MoreThe Great Gatsby By F. Scott Fitzgerald1166 Words   |  5 Pagesin the Haze F. Scott Fitzgerald lived in a time that was characterized by an unbelievable lack of substance. After the tragedy and horrors of WWI, people were focused on anything that they could that would distract from the emptiness that had swallowed them. Tangible greed tied with extreme materialism left many, by the end of this time period, disenchanted. The usage of the literary theories of both Biographical and Historical lenses provide a unique interpretation of the Great Gatsby centered aroundRead MoreThe Great Gatsby by F. Scott Fitzgerald845 Words   |  3 PagesIn F. Scott Fitzgerald’s novel, The Great Gatsby, colors represent a variety of symbols that relate back to the American Dream. The dream of being pure, innocent and perfect is frequently associated with the reality of corruption, violence, and affairs. Gatsby’s desire for achieving the American Dream is sought for through corruption (Schneider). The American Dream in the 1920s was perceived as a desire of w ealth and social standings. Social class is represented through the East Egg, the WestRead MoreThe Great Gatsby By F. Scott Fitzgerald Essay970 Words   |  4 Pagesrespecting and valuing Fitzgerald work in the twenty-first century? Fitzgerald had a hard time to profiting from his writing, but he was not successful after his first novel. There are three major point of this essay are: the background history of Fitzgerald life, the comparisons between Fitzgerald and the Gatsby from his number one book in America The Great Gatsby, and the Fitzgerald got influences of behind the writing and being a writer. From childhood to adulthood, Fitzgerald faced many good andRead MoreThe Great Gatsby By F. Scott Fitzgerald2099 Words   |  9 Pagesauthor to mirror his life in his book. In his previous novels F. Scott Fitzgerald drew from his life experiences. He said that his next novel, The Great Gatsby, would be different. He said, â€Å"In my new novel I’m thrown directly on purely creative work† (F. Scott Fitzgerald). He did not realize or did not want it to appear that he was taking his own story and intertwining it within his new novel. In The Great Gatsby, by F. Scott Fitzgerald, he imitates his lifestyle through the Buchanan family to demonstrateRead MoreThe Great Gatsby By F. Scott Fitzgerald1607 Words   |  7 Pages The Great Gatsby is an American novel written in 1925 by F. Scott Fitzgerald. One of the themes of the book is the American Dream. The American Dream is an idea in which Americans believe through hard work they can achieve success and prosperity in the free world. In F. Scott Fitzgerald s novel, The Great Gatsby, the American Dream leads to popularity, extreme jealousy and false happiness. Jay Gatsby’s recent fortune and wealthiness helped him earn a high social position and become one of the mostRead MoreThe Great Gatsby By F. Scott Fitzgerald1592 Words   |  7 PagesMcGowan English 11A, Period 4 9 January 2014 The Great Gatsby Individuals who approach life with an optimistic mindset generally have their goals established as their main priority. Driven by ambition, they are determined to fulfill their desires; without reluctance. These strong-minded individuals refuse to be influenced by negative reinforcements, and rely on hope in order to achieve their dreams. As a man of persistence, the wealthy Jay Gatsby continuously strives to reclaim the love of hisRead MoreThe Great Gatsby By F. Scott Fitzgerald1646 Words   |  7 PagesThe 1920s witnessed the death of the American Dream, a message immortalized in F. Scott Fitzgerald’s The Great Gatsby. Initially, the American Dream represented the outcome of American ideals, that everyone has the freedom and opportunity to achieve their dreams provided they perform honest hard work. During the 1920s, the United States experienced massive economic prosperity making the American Dream seem alive and strong. However, in Fitzgerald’s eyes, the new Am erican culture build around that