Monday, September 30, 2019

Ben Lawson’s Custom Fabricators Research Essay

Question 1: How does Ben Lawson’s Custom Fabricators, Inc., create value for Orleans? Custom Fabricators, Inc. is able to create value to Orleans because Custom Fabricator’s manufacturing plant is right next to Orleans’ plant. Ben is able to minimize lead-time for Orleans. They are able to deliver parts to Orleans really fast. Quality is also something Custom Fabricators could ensure because they are able to fix something and deliver it to Orleans quicker because they are so close to each other. Custom Fabricators would also be more effective for Orleans because they’ve cooperated for so long, so Custom Fabricators know the needs and requirements of Orleans really well. They can offer Orleans better field support and problem solving. Question 2 In the past, what has been Ben Lawson’s competitive advantage in keeping the Orleans business? CFI can maintain its competitive advantage due to its propel location, it is near Orleans facility, and it also invest new machines to improve the processes of manufacture for Orleans; meanwhile, its employee loyalty is good because it pay its employees good. In this case, it make CFI have a competitive advantage. Question 3 Have Orleans’s priorities changed? From the case, it is clear to see the Orleans has changed priorities. There are trying to change base to the high quality products. Also they change products to cheaper price as a base strategy. They reduce the cost with elevators and the raw materials, also something else. Ben was concerned about some big issues, such as reducing labor costs and competing with the Mexican labor market. He also was concerned the security of his position relationship with the company.(Can Chen 9362) 4. Should Ben change his business model? Yes, Ben should change his business model because Orleans, its customers, is changing. Orleans outsourced the whole elevator. Orleans reduced its plant size from 400,000 square feet to 150,000 square feet. Recently, Orleans is reducing its material cost associated with its elevators by contracting many suppliers from Mexico. Meanwhile, Ben cannot compete with suppliers from Mexico in price. Therefore, Ben should work with some suppliers from Mexico to negotiate the material costor outsource totally. When dealing with suppliers from Mexico, Ben may face some difficulties, such as transportation and communication. Question 5: How should Ben position his company in the value chain? There are a few options for Ben to position his company in the value chain because of it’s close proximity to the Orleans plant. Inbound logistics would be one because delivery speed would be fast since they are so close. Orleans does not have to store too much inventory because of this. They can get materials from Ben in short time. Ben’s company could also easily provide service support to Orleans if any problems arise from parts manufactured by Custom Fabricators. Question 6 What should Ben do to ensure his company’s future success? I think CFI should improve their operation management to make their processes more efficient and effective, meanwhile they need to match their current marketing strategies to global market. the top management of CFI should also consider whether carry out more capital investment because these new technology could reduce cost, improve quality, therefore increase competitive advantage in the market. finally, CFI could partner with some other companies to improve overall competitiveness.

Sunday, September 29, 2019

Water Level Warning by Gsm

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. These three sensors are placed in three different threshold levels and are connected to the controller.If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instruction s given by the developer.This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment.Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very sp ecific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. The GSM p latform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world's fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer.All the featu res and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a progra m, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow.In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator.Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM.For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits a nd other devices.A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power.Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arr angement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications.Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass a lso rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection') and overheating (‘thermal protection'). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well.A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. Th e 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine.External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collecto r is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strappe d to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Al though polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the inter rupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily.That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least signifi cant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: parallel and serial.In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051’s serial communication UART circuitry divides the machine cycle f requency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the p in RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level.Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±3 0-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem inte rface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†).This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber.The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts.Subscriber carries the Mobile Station. The Base St ation Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific termina l. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that d efine a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User ManualTemperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the m odem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic]Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrode s and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line.When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) con tacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2.Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered:SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the gr ound. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses th e polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a R egulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows a utomatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAP TER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process of creating and testing an embedded app lication The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source fil es are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å"); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 && L2==1 && L3==1 && L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0);Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 && L2==0 && L3==1 && L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³);TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 && L2==1 && L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUP PLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – – – – – – – — – – – – – – – – – – – – – – – – –  œ – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H

Saturday, September 28, 2019

Barack Obama - Victory Speech in South Carolina

Barack Obama South Carolina Democratic Primary Victory Speech delivered 26 January 2008 Thank you, South Carolina. Thank you to the rock of my life, Michelle Obama. Thank you to Malia and Sasha Obama, who havent seen their daddy in a week. Thank you to Pete Skidmore for his outstanding service to our country and being such a great supporter of this campaign. You know, over two weeks ago we saw the people of Iowa proclaim that our time for change has come. But there were those who doubted this countrys desire for something new, who said Iowa was a fluke, not to be repeated again. Well, tonight the cynics who believed that what began in the snows of Iowa was just an illusion were told a different story by the good people of South Carolina. After four great contests in every corner of this country, we have the most votes, the most delegates and the most diverse coalition of Americans that weve seen in a long, long time. You can see it in the faces here tonight. There are young and old, rich and poor. They are black and white, Latino and Asian and Native American. They are Democrats from Des Moines and independents from Concord and, yes, some Republicans from rural Nevada. And weve got young people all across this country whove never had a reason to participate until now. And in nine days, in nine short days, nearly half the nation will have the chance to join us in saying that we are tired of business as usual in Washington. We are hungry for change, and we are ready to believe again. But if theres anything, though, that weve been reminded of since Iowa, its that the kind of change we seek will not come easy. Now, partly because we have fine candidates in this field, fierce competitors who are worthy of our respect and our admiration and as contentious as this campaign may get, we have to remember that this is a contest for the Democratic nomination and that all of us share an abiding desire to end the disastrous policies of the current administration. But there are real differences between the candidates. We are looking for more than just a change of party in the White House. Were looking to fundamentally change the status quo in Washington. Its a status quo that extends beyond any particular party. And right now that status quo is fighting back with everything its got, with the same old tactics that divide and distract us from solving the problems people face, whether those problems are health care that folks cant afford or a mortgage they cannot pay. So this will not be easy. Make no mistake about what were up against. Were up against the belief that its all right for lobbyists to dominate our government, that they are just part of the system in Washington. But we know that the undue influence of lobbyists is part of the problem, and this election is our chance to say that we are not going to let them stand in our way anymore. Were up against the conventional thinking that says your ability to lead as president comes from longevity in Washington or proximity to the White House. But we know that real leadership is about candor and judgment and the ability to rally Americans from all walks of life around a common purpose, a higher purpose. Were up against decades of bitter partisanship that cause politicians to demonize their opponents instead of coming together to make college affordable or energy cleaner. Its the kind of partisanship where youre not even allowed to say that a Republican had an idea, even if its one you never agreed with. Thats the kind of politics that is bad for our party. It is bad for our country. And this is our chance to end it once and for all. Were up against the idea that its acceptable to say anything and do anything to win an election. But we know that this is exactly whats wrong with our politics. This is why people dont believe what their leaders say anymore. This is why they tune out. And this election is our chance to give the American people a reason to believe again. But let me say this, South Carolina. What weve seen in these last weeks is that were also up against forces that are not the fault of any one campaign but feed the habits that prevent us from being who we want to be as a nation. Its a politics that uses religion as a wedge and patriotism as a bludgeon, a politics that tells us that we have to think, act, and even vote within the confines of the categories that supposedly define us, the assumption that young people are apathetic, the assumption that Republicans wont cross over, the assumption that the wealthy care nothing for the poor and that the poor dont vote, the assumption that African-Americans cant support the white candidate, whites cant support the African-American candidate, blacks and Latinos cannot come together. We are here tonight to say that that is not the America we believe in. I did not travel around this state over the last year and see a white South Carolina or a black South Carolina. I saw South Carolina because in the end, were not up just against the ingrained and destructive habits of Washington. Were also struggling with our own doubts, our own fears, our own cynicism. The change we seek has always required great struggle and great sacrifice. And so this is a battle in our own hearts and minds about what kind of country we want and how hard were willing to work for it. So let me remind you tonight that change will not be easy. Change will take time. There will be setbacks and false starts, and sometimes well make mistakes. But as hard as it may seem, we cannot lose hope, because there are people all across this great nation who are counting on us, who cant afford another four years without health care. They cant afford another four years without good schools. They cant afford another four years without decent wages because our leaders couldnt come together and get it done. Theirs are the stories and voices we carry on from South Carolina the mother who cant get Medicaid to cover all the needs of her sick child. She needs us to pass a health care plan that cuts costs and makes health care available and affordable for every single American. Thats what shes looking for. The teacher who works another shift at Dunkin Donuts after school just to make ends meet she needs us to reform our education system so that she gets better pay and more support and that students get the resources that they need to achieve their dreams. The Maytag worker whos now competing with his own teenager for a $7-an-hour job at the local Wal-Mart because the factory he gave his life to shut its doors he needs us to stop giving tax breaks to companies that ship our jobs overseas and start putting them in the pockets of working Americans who deserve it and put them in the pockets of struggling homeowners who are having a tough time, and looking after seniors who should retire with dignity and respect. That woman who told me that she hasnt been able to breathe since the day her nephew left for Iraq, or the soldier who doesnt know his child because hes on his third or fourth or even fifth tour of duty they need us to come together and put an end to a war that should have never been authorized and should have never been waged. So understand this, South Carolina. The choice in this election is not between regions or religions or genders. Its not about rich versus poor, young versus old, and it is not about black versus white. This election is about the past versus the future. Its about whether we settle for the same divisions and distractions and drama that passes for politics today or whether we reach for a politics of common sense and innovation, a politics of shared sacrifice and shared prosperity. There are those who will continue to tell us that we cant do this, that we cant have what were looking for, that we cant have what we want, that were peddling false hopes. But heres what I know. I know that when people say we cant overcome all the big money and influence in Washington, I think of that elderly woman who sent me a contribution the other day, an envelope that had a money order for $3.01 along with a verse of Scripture tucked inside the envelope. So dont tell us change isnt possible. That woman knows change is possible. When I hear the cynical talk that blacks and whites and Latinos cant join together and work together, Im reminded of the Latino brothers and sisters I organized with and stood with and fought with side by side for jobs and justice on the streets of Chicago. So dont tell us change cant happen. When I hear that well never overcome the racial divide in our politics, I think about that Republican woman who used to work for Strom Thurmond, whos now devoted to educating inner-city children, and who went out into the streets of South Carolina and knocked on doors for this campaign. Dont tell me we cant change. Yes, we can. Yes, we can change. Yes, we can. Yes, we can heal this nation. Yes, we can seize our future. And as we leave this great state with a new wind at our backs, and we take this journey across this great country, a country we love, with the message weve carried from the plains of Iowa to the hills of New Hampshire, from the Nevada desert to the South Carolina coast, the same message we had when we were up and when we were down, that out of many we are one, that while we breathe we will hope, and where we are met with cynicism and doubt and fear and those who tell us that we cant, we will respond with that timeless creed that sums up the spirit of the American people in three simple words: Yes, we can. Thank you, South Carolina. I love you.

Friday, September 27, 2019

The problem is lack of 60% parental involvement at a local elementary Essay

The problem is lack of 60% parental involvement at a local elementary school negatively affects the academic success of the students - Essay Example This research project examines the importance of parental involvement as well as the consequences of their lack of involvement in their children education. Parental involvement in the education of their children is undoubtedly of great significance in the academic achievement of the student. This paper also investigates the reasons as to why some parents don’t get fully involved, as it has been observed that not all parents participate actively in the education process of their children. The ways through which schools and teachers can have parents get involved actively in educating their kids at home is also closely examined in this paper. Chapter one examines the background of the proposal topic (Lack of Parental Involvement in Education and how it affects children and their academic success) by bringing out the statement of the problem. The purpose of the study and research questions has also been stated. In chapter two the secondary information relating to parental involvement in their children’s academic process has been examined and related to the performance of the child. This has been based on the previous studies carried on the topic. As observed by Bryan (2005) it is very likely for student to perform below their potential if parents are not actively involved in their academic progress. However, despite this problem parents as seen still not to be fully involved in their children school activities. As revealed by Wanat (1992), this problem is mainly as a result of lack of time or expertise in the side of the parent. This project will involve a population of students from both junior primary and senior classes so as to compare the involvement across the levels. Parents’ involvement is basically thought to be more intense with younger children and reduces as the children grow up and move up through the academic ladder (Dixon, 1992). The selection of the population shall be done carefully to

Thursday, September 26, 2019

Leadership Essay Example | Topics and Well Written Essays - 500 words - 2

Leadership - Essay Example Eisenhower and President John F. Kennedy. There are a couple different styles of leadership that a leader can use. President Eisenhower was a transactional leader, in that his style of leadership was systematic and was based on the idea of rewards and punishments associated with making decisions. This comes with the fact that he had a military background, which provided him the experience and knowledge base for him to exercise his leadership authority. Many of his actions were the result of defense and competition with the Soviets as his term of presidency was during the period where the United States was operating under the containment policy of trying to prevent the spread of Communism into the democratic sphere. Thus these programs, such as the development of nuclear weapons as well as the start to the NASA program served their purpose as showing the United States’ raw power. As a result, a majority of the way in which he dictated policy both in the United States and as in foreign policy was always based on that of defense and military authority (â€Å"Dwight D. Eisenhower†, 2011). President John F. Kennedy was an enthusiastic, young leader that was more inexperienced than his predecessor President Eisenhower. He also was a soldier who served as an officer in the Untied States Navy.

Taxation Essay Example | Topics and Well Written Essays - 2750 words - 2

Taxation - Essay Example The conceptual framework of accounting holds accounting theories related to taxation together. The framework establishes goal and objectives of financial reporting by businesses. Financial accounting information provides useful information for making business and economic decision such as taxation (Riahi-Belkaoui, 2005, p. 121). The theory that financial reporting should avail significant information for taxation recognizes that reporting does not exist out of the legal, economic, political, and social environment. The conceptual framework of accounting ensures that accounting information in relation to taxation is relevant, comparable, reliable, and consistent (Bebbington, Gray & Laughlin, 2001, p. 97). Comparability and consistency of taxation benefit from having  Generally  Accepted Accounting Principles (GAAP). Adhering to financial statements to GAAP in relation to taxation means, they are consistent from year to year and the tax difference between various companies can be c ompared. Therefore, the accounting theories help in practical analysis of taxation in a business. The accounting theories of taxation function on four assumptions. The economic entity assumption illustrates that the practices of a business are distinct from the actions of the owner. It means that tax is computed separately for the company’s profit generation. In addition, the income tax of an employee is distinctively calculated in relation to the amount of salary gained. The going concern assumption states that when financial statements are prepared, the accountant assumes that the company will move without threat of dissolution or bankruptcy (Riahi-Belkaoui, 2005, p. 97). Therefore, it means that the likely taxable amount is already catered for in the financial statements hence in the event of taxation, the business does not feel any

Wednesday, September 25, 2019

Reflected Summery Essay Example | Topics and Well Written Essays - 500 words

Reflected Summery - Essay Example vities that occur within the organizational environment, models like McKinsey 7-S help to secure better methodology for many different university activities. These include marketing, employee relationship development, training, and developing better core competencies to give the university more enrollment and better brand presence. Consultation with literature regarding risk management identified that many for-profit businesses struggle with identifying risks proactively. However, models like the McKinsey 7-S model provide opportunities to expand beyond just the internal structural and operational environments and view the impact of activities on the outside world. At the same time, it helps to understand what forces pull or push new decision-making when considering external forces, such as customers, partnerships with external consultants, and building relationships with outside stakeholders. These understandings are vital for universities that are always in a constant state of change and for one like Heriot that is looking for new methods to stay competitive and meet student needs effectively. The core competency of culture is another important identity for Heriot since it is necessary to gain inter-organizational support to meet the objective of a more future-focused and student-centered philosophy. The attitudes, values and activities of staff, administration and students, as well as external partners, require a variety of cohesive strategies to ensure that the entire organization is aligned to meeting tomorrow’s goals. There is so much of strategy involved in university operations, upon reflection, based on the mission and vision of a change objective and trying to project where the organization might be five or even 10 years into the future. The Focus on the Future project provided knowledge about the long-term consequences of improper change, inability to gain cultural support from within, and putting too much reliance on the expertise of outside

Tuesday, September 24, 2019

Final Examination Term Paper Example | Topics and Well Written Essays - 1000 words

Final Examination - Term Paper Example They then undertake a video exam where they watch a scenario and give their feedback. The applicants then undergo a physical fitness test. A background investigation is then conducted. A drug test, psychological test, polygraph oral interview and medical examination are taken to determine the suitability of the candidate. A background investigation is conducted to ensure applicants with criminal pasts and current criminal dealings are barred from being recruited. Police recruitment agencies have invested huge resources to ensure thorough background checks are conducted to determine the integrity of the applicants. The credit histories, history of drug use, academic records employment history are reviewed. This to establish any issue from the past that might jeopardize the applicant’s ability to perform their duties should they is recruited to the force. 3. The three main branches of our federal government are equal and each has their own individual checks and balances they can exert over the other two. Name the three branches and give some examples of each of their individual checks and balances. The U.S government is made up of three parts, the Executive, the Legistrature and the judicially. The three branches of government share power between them through clearly stipulated checks and balances that provide the separation of powers. The legistrature exerts influence on the executive through several ways. They include the power to override presidential vetoes; it has the power to declare war, allocate state funds and to impeach the president. It also influences the judicially through the senate’s role of approving federal judges and the power to set the court’s jurisdiction. The executive checks on the legistrature through its ability to call either of the houses or both of them for an emergency session. The

Monday, September 23, 2019

Nuclear Energy Essay Example | Topics and Well Written Essays - 6000 words

Nuclear Energy - Essay Example Solar energy is the biggest source of energy. Electrical energy can be generated directly from solar energy by employing solar photo voltaic panels. Electrical energy can also be produced by focusing multiple beams of light at a point to generate electrical energy using the thermal energy produced by focused beams. Solar energy has the biggest potential among all the renewable sources of energy. A photo voltaic solar panel employs semiconductor material, which generate electricity when photons strike its surface. If there are solar panels on every home, the need of energy can be fulfilled (West 2011). A wind generator generates electrical power by utilizing aerodynamic energy of the wind and converting it to electrical energy. When wind strikes the turbine blazes of a wind generator, it runs the generator. An electrical power generator, if a permanent magnet type, rotates magnets around a coil in such a way, that the magnets cut the flux, thus generating electrical power. There a two common designs of a wind turbine horizontal axis wind turbine and vertical axis wind turbine. Both of the designs are enough efficient to generate electrical power even in a low wind conditions. Wind power holds the second biggest potential of energy. A hydro power plant captures the hydrodynamic energy of running water and utilized it to generate electrical power. Dams are constructed as reservoirs of water, where water is collected from rivers and streams but mostly rivers. That water run through a number of turbines to collect hydrodynamic energy from water and convert it to mechanical energy. The mechanical energy is then converted back to the electrical energy. There are many hydro power stations all over the world and they are being in use for over more than eighty years (Renewable Energy World .com 2011). Tidal energy generator converts tidal energy to electrical energy. A tidal generator works on the principle of high tide and low tide. It has the same mechanism as that of a horizontal axis wind turbine but in tidal energy generator, turbines are submerged under the water to collect the energy from the low or high tide. These types of generators can also be utilized to collect energy from running water as in the rivers, streams and other running water sources. Large tidal units can be placed at shores and at the rivers. Geothermal energy can be captured from geothermal grounds. This type of energy is basically a thermal energy and a geothermal power plant acts as a thermal power plant, where water is converted into steam which then runs the turbine to generate electrical power. Long pipes are bored into the earth where geothermal grounds are present. Water is passed through these pipes, where it is heated by the thermal energy from the ground and converted into steam (West 2011). There are several geothermal grounds in the world and energy can be generated by employing these geothermal plants. Biomass energy can be extracted from biomass or from organ ic waste. Biomass is gasified to produce a gas that can be burnt to generate electrical energy. These methods are not new, they are being utilized in many countries for many years. Biomass can be produced from raw wood, organic waste and other organic sources. Sometimes micro organisms are involved in the process to capture bio methane or bio gas from biomass. In this way the byproduct can be utilized as a fertilizer,

Saturday, September 21, 2019

The many hardships of society Essay Example for Free

The many hardships of society Essay Victor does not show love and domestic affection to the creature after he has given it life he just abandons it without some one to look after it and care for it as Victors family has done. Unable to endure the aspect of the being I had created I rushed out of the room and continued along time traversing my bedchamber. Victor does not show any love for the creature he has created. He is unable to endure this gives the reader the image that the creature has become so ugly. Even though he has collected the body parts from beautiful people the creature is still hideous. This shows a complete lack of love and domestic affection that has been shown to Victor in abundance by his parents. Victors parents show that there is a strong family bond between them and their son. I was there playing their idol, and something better than their child, the innocent and helpless creature bestowed on them by heaven. In this paragraph Victor describes himself as their plaything their idol. Him and his parents are inseparable and they looked up to Victor although he is a small child. They wanted him to be safe and happy. Victor is also described as small and innocent helpless creature. Victor does not show the same affection for the creature. I beheld the wretch- the miserable monster whom I created. Victor describes the creature as a wretch, this shows that Victor as a young child was shown love and affection but he is now incapable of showing the same love that was shown to him by his parent to the creature the baby that he has created. These adjectives describe the monster as physically ugly this is one of the reasons why victor rejects him, because he wanted to make a beautiful creature. Victor is also described as helpless and innocent and that he cannot fend for himself and he needs an older figure to be responsible for his actions and to keep him safe. Victor abandons the creature as soon as he realizes that he has made a mistake in trying to play god. But what has he abandoned he has abandoned a young inexperience, defenseless, innocent helpless creature. So again we see Victor being shown great love and domestic affection by his family. But when he grows up he is unable to show the same love and domestic affection towards the creature. Victor is brought up in a protective bubble when he is younger. I was so guided by a silken cord that all seemed but one train of enjoyment for me. Using the word silken cord refers to the umbilical cord that gives the entire growing child what it needs to survive. This is directly linked to Victor parents and the fact that they are providing him with so much love and domestic affection that he does not have to do anything he does not have to fend for himself. This Silken cord of tender love and affection is not there when the creature is brought to life. He has to learn to find his own way because he is an outcast of society so he would find it hard to fit in. He is on his own because victor has not got the mental strength to own up and shows this creation to the rest of the world. He also does not want to show any affection or love to this creature because he finds it physically repulsive. Victor is shown the way by his Parents they are always making decisions for him even as a young adult. When I was seventeen my parents resolved that I should become a student at he university of Inglostadt. He still has a protective bubble around him even though he is seventeen. This shows that his parents are still making choices for him that can provide him happiness or sorrow in the years to come. The creature is deprived of this from victor this is shown, as he does not know about the dangers of fire. The creature is attracted to the warmth of the fire and it is like the tender warm love that he is not receiving. I thrust my hand into the live embers but draw it quickly out again crying in pain. The creature has had no guidance from victor or anybody of higher intelligence than himself. This is why he burns his hand on the fire. If victor was about to do that either his Mother or Father would have stopped him from burning himself because they want to protecting him so he does not get harmed mentally or Physically. The creature then goes off in search of another family or someone who can nurture him properly. He finds a village he is curious to see this type pf village with cottages, which he has never seen before. Shortly after entering the village he is confronted by a mob throwing stones and various items at him. The creature is amazed at how polite and loving the people he is observing are. There gentle manners and beauty of these cottagers greatly endured me. He means that he is amazed that even though they are so poor they are still happy and show great love and affection for each other and he wants to become apart of that family. He observes the family and notices a new addition to the family called safie she is from a distant country. This gives the creature hope that maybe he may be able to be accepted into the family as safie is an outsider and she has been accepted. The creature then finds out how ugly he is and starts to doubt his reasons for being in the world. I had admired the perfect form of my cottagers- their grace, beauty, and delicate complexions; but how was I terrified when I viewed myself in a transparent pool! At first I stared back, unable to believe that indeed I who was reflected in the mirror; and when I became fully convinced that I was in reality the monster that I am. He realizes that he is a monster and that he would never fit in if he wanted to have a family that loved him and nurtured him. He starts to realize that this is the end for his hopes of a normal life. The creature tries to be accepted into the family by speaking to the blind man, the blind man is oblivious to any faults the creature may have. Agatha fainted, and safie unable to attend his friend rushed out of the cottage. Felix darted forward and with a supernatural force tore me from his father, to whose knees I clung; in a transport of fury, he dashed me to the ground with a stick . I could have torn him limb form limb, as a lion rends the antelope. He now realizes that all hope is lost of ever finding a family that will love him and show him domestic affection and so wallows in self pity. He then burns down the delaceys house at it is a symbol of a nice warm family that he is not apart of so he destroys it. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Mary Shelley section.

Friday, September 20, 2019

Peer Pressure And How It Affects Behaviour Philosophy Essay

Peer Pressure And How It Affects Behaviour Philosophy Essay What is social influence? Social influence is the change in behaviour that one person causes in another, intentionally or unintentionally, as a result of the way the changed person perceives themselves in relationship to the influencer, other people and society in general. Types of social influence on behaviour are a very interesting and an important topic in social psychology. It goes on to show us that even though individuals might consider themselves to possess qualities of uniqueness, when studied, their behavioural patterns are not very different from other individuals. The purpose for this study is to determine if social influence is bad or not. The two types of social influence that will be discussed are conformity and obedience. Conformity is the tendency to change ones behaviours or beliefs to match others. Why do people change because of social influence? Social psychologists provide two main reasons for the effects of social influence which are normative social and informational social influence ( Deutsch Gerard, 1995 ). Obedience is obeying an order from someone that you accept as an authority figure. Obedience can be constructive and destructive. How social influence can affect peoples behaviour will be discussed in this study. . Conformity Peer Pressure and how it affects behaviour Peer pressure is an example of normative social influence. This form of influence stems from our need to be liked by others. That is why we will follow certain behavioural patterns in order to conform to others expectations. Depending on how influential or popular a person or group is and how important their approval is for one, they will follow suit just so that they are liked by them. Teenagers especially face many issues related to conformity and peer pressure. They are pulled between the desire to be seen as individuals of unique value and the desire to belong to a group where they feel secure and accepted. As a result, teenagers reject family or general society values, while feeling pressure to conform rigidly to the values of their peer group. For example, this can be seen when young people join gangs. By joining the gang they are rejecting the communitys way of dressing and behaving. They have to conform to the gangs own style of dress, behaviour, and speech. They must follow what the other gang members are doing. Sometimes, they are involved in all kinds of negative activities such as smoking, drinking, taking drugs and so on. Peer pressure by itself is neither positive nor negative. For example, both high and low academic achievements are closely linked to peer influences. Several studies say that the values of the peer group with whom the high school student spends the most time are a stronger factor in the students level of academic success than the values, attitudes, and support provided by the family. Some students who spent time with an academically oriented peer group got better grades despite the fact that their families were not so supportive. People get influenced easily when they join gangs. They start drinking, smoking, taking drugs and doing all kinds of negative activities. For them, it is fun doing such things because they are in a gang. They influence one another to do bad things. Peer pressure also influences the degree to which children conform to expected gender roles. For example, girls get better grades in science and mathematics compared to boys up to grade six, but during adolescence girls test scores and level of expressed interest in these two subjects tend to decline. The tendency is to abandon competition with boys in favour of placing more emphasis on relationships and on physical appearance. In expressed peer pressure, a boy may be challenged by the group to prove his manhood by having sex or performing a risky stunt such as car racing. On the other hand, girls may be told that if they want to be part of a group they must do something illegal such as taking drugs. Studies show that both girls and boy take risks they do not want to take because they believe the risky behaviour will increase their standing in the eyes of their peers, make them more popular and assure their acceptance in the group. They can feel safe and secure in the group. Implied peer pressure is more subtle and can be harder to combat. For example, a group of boys may make fun of the way another boy is dressed, pressuring members of their group to dress only in one acceptable style. Because of this, people who look, dress, act in a different way or have different interests from those of their age group become outcasts. Pressure groups place on their members not to associate with anyone unlike themselves . This can lead the rejected person to feel desperate and depressed. However peer pressure isnt all bad. You and your friends can pressure each other into some things that will improve your health and social life and make you feel good about your decisions. Think of a time when a friend pushed you to do something good for yourself or to avoid something that wouldve been bad. There are some good things friends can pressure each other to do such as be honest, avoid alcohol, avoid drugs, not smoke, and respect others. One good example is group studies. In a group study, friends are able to encourage one another to study well. They are able to help one another by discussing difficult topics, solving problems and also understanding a particular topic well by actually interacting with one another. These are all the good sides of peer pressure. These types of behaviours are influential. One can be influenced but in a good way. One is influenced to do good things rather than doing bad things. Peer pressure provides individuals with a yard stick for self evaluation, leading individuals to being more competent. Interaction among peer groups who exchange different viewpoints for example political, religious or educational can promote moral development and independence in personal expression. Internet and how it affects behaviour Informational influence is a form of conformity which occurs when an individual turns to another in order to obtain information. It occurs when the person does not know what to do and turns to another person or other sources of information and believes the information from this person or source is true. This particular phenomenon takes on specific qualities on the Internet. On the Internet there is nobody standing in front of the room speaking or guiding the group. Nonetheless informational influence certainly occurs.      A cue used in forums, which can be dedicated to any subject ranging from music to international politics, is the post counter. To know how many times they have written a post, a small number under the users screen name will be able to indicate it. Ranking sytems can be found in some forums. As they become more involved in the community and continue making new posts, they will be ranked as experts. So, people tend to get influenced and think that the contributions written by users with the most posts and has a higher ranking are more valid than those of new users. Users often believe in information provided by these individuals rather than others. The information stored in the Internet is portrayed and interpreted in a different way than by exposure through meetings in person. The influence physical appearance such as clothing has on the perception of authority is a different social psychological phenomenon, yet it is an important factor in informational influence. There are many different things that can be done by the web designer to improve the visual aspects of the site, which replaces the physical appearance of the individual. This is done since people are not able to see how an individual behind a website appears. This in turn gives the impression that the information on the website is more credible and reliable. A well designed website can be particularly effective if it organizes and portrays information in a particular way. Older individuals or those who have limited experience with computers are easily influenced. The mere fact that the Internet is text based is also a form of informational influence in itself. People often feel that information conveyed through text is more reliable than information passed through word of mouth. The influence of the Internet has caused an impact on the way we communicate, learn and even shop. Through the Internet, all kinds of information can be easily spread. The introduction of mail service has changed the way people connect to others in their social world. Mail made possible connections among people without physical proximity. On the one hand, since the main use of the Internet is for communication, some people might speculate that the Internet will have positive social consequences in peoples everyday lives because it increases the frequency and quality of interpersonal communications among people. People with easy access to others would feel better connected and more strongly supported by others, leading to happiness and engagement in families, organizations, communities, and society more generally. People are able to communicate more easily. The Internet also allows people to work more easily from their home, to search for any information that they need, to form and sustain friendships and even romantic attachments from their home, to vote and engage in political and social issue based discussions with others. Some people are able to maintain long distance relationships through the Internet. For example, people are able to communicate through social networks such as Facebook, Twitter, Skype and so on. In this variety of ways, Internet communications can potentially displace face-to-face communications. According to some psychologists, social media networks such as Facebook and Twitter demonstrate that group polarization can occur even when a group is not physically together. Blindly trusting information that they find online can be bad. As we know, not all information that is online can be reliable. There are many fake websites that are created by web designers in order to influence people and they also have all kinds of schemes that can trick people of their money. Besides, information that we get through forum websites on the Internet are sometimes not reliable and not true. Some users tend to simply post information out of nowhere and that brings no meaning at all. So, people that are searching for information on a certain topic for example would belief such posts and think that its true. They will think that the information on that website is true and reliable when it actually is not that reliable. Besides, social networks can influence people in a bad way. For example, Facebook. Mark Zuckerberg started the website with the intention of helping students to get to know each other better. As we can see nowadays, people are so addicted to Facebook. Children that spend more time on the Internet tend to develop anxiety, more stomach aches and more sick days from school. Besides, as we can see students that spend most of their time with the Internet, like using Facebook get lower grades in their exams. Facebooks applications can be really addicting. Facebook is giving people the chance to turn to another person to obtain information. We can even form our own group and invite others to join it. There is even an anti group group. As we can see, Facebook is actually influencing people to create and join such groups that can bring harm to themselves and the society. (James M.Henslin, Third Edition,2009 ,Pearson International Edition, Sociology ) Obedience Obedience to authority and how it affects behaviour An example is the classroom authority. Teachers use a different set of techniques for fostering obedience than they do for facilitating personal responsibility. Most obedience techniques rely on punishment and reward. Teachers try to demonstrate consistency in applying these positive and negative consequences to maintain a safe and orderly classroom. Students are to honour their teacher. This goes beyond obedience. It means to hold high or to give a special place of respect. Obedience will be the result of such honour, but obedience can be performed without honour. This is a simple situation where obedience to authority can be seen. Primary 2 students for example were told to memorize their times table and they were told that their task was to help another subject like themselves learn the times table (in pairs). Each time one made a mistake, they would be punished together by the teacher. For example, standing in midfield or running around the field. They would then be given a second chance by which if they made a mistake a second time the punishment would be more severe. Besides, there are some teachers that use positive reinforcement to get their students to obey them. For example, a teacher rewards his or her student with a chocolate when he or she memorises the times table correctly. Positive reinforcement always works better on a child than punishment for negative behaviour or disobedience. From this, we can say that students will definitely obey the teacher and memorise the times table properly in order to avoid the punishment. A social psychologist, Philip Zimbardo carried out the Stanford Prison experiment (1971) showing a fine example of perception of authority to social roles. Zimbardo selected volunteers and randomly assigned them to either a prison guard or a prisoner role to observe their interaction. Zimbardo believed that the behaviour in prisons could be best explained using a situational attribution. In particular he believed that the conditions were influenced by the social roles that prisoners and prisoner guards are expected to play. Not even Zimbardo foresaw how the study would turn out. Students were then selected from a response to an advertisement in a newspaper asking for volunteers to participate in a psychological study into prison life. Guards were told about their duties and the prisoners were arrested and blindfolded. This experiment was carried out at The Stanford University Psychology Department. The experiment was supposed to be for 2 weeks. Unfortunately, it only lasted for about 6 days due to the situation becoming all too realistic. They became engulfed by role that they were acting out. The guards became abusive to the point where they would humiliate and push the prisoners around. The prisoners were depressed and some were even released few days after the experiment had begun. Zimbardos study shows that the roles we play as members of a group can have a powerful effect on behaviour. ( Taylor S.E , Peplau L.A, Sears D.O ( Social Psychology, twelfth edition ) ) The question whether obedience is good or bad arises. Our society raises us to believe that obedience is good and disobedience is bad. We are taught to obey others and to be disobedient is something that is not good. Society tells us this, but it is not really true. Obedience is required for our society to function, yet, because of the power of authority, individuals may obey in ways which are destructive and against their personal, moral values. Most people will even be obedient to the point of causing harm to others, because to be disobedient requires the courage to be alone against authority. In Stanley Milgrams Perils of Obedience experiment, his studies showed that sixty percent of ordinary people would agree to obey an authority figure even to the point of severely hurting another human being. Zimbardos prison guards were abusing their power and controlling the prisoners. This shows that those in higher positions tend to influence others immorally. In this experiment, the priso ners became traumatized, depressed and dehumanized. Zimbardos prison experiment is a form of destructive obedience. The trauma inflicted being large or small seems to be unnecessary or avoidable and arguably unethical. Zimbardo failed to question the morality of what was going on and what the prisoners were going through. Was he showing any regard as to the well being of the participants? He had become a participant rather than the observer to his work. Being disobedient is not always wrong. As we can see in Hebrew mythology, human history began because of an act of disobedience. Adam and Eve gained independence from nature by disobeying God and eating an apple. Mans development has largely been affected by being disobedient to authority. Its as though we are allowing society to imprison us by accepting the roles assigned to us. Obedience is a behaviour deeply ingrained in us. It can be seen as an impulse that overrides ethics and sympathy. The tendency to locate the source of behaviour disorders in a particular person or group underestimates the power of situational forces. Constructive obedience benefits society. Without obedience to authority, society could not function. Constructive obedience is building upon obedience in a positive way. It uses positive reinforcement to get results using positive psychological methods. For example the teacher rewards the student for good behaviour and does not punish them for bad behaviour. Destructive obedience is when we obey blindly. We obey to do things that will harm us or others. We tend to obey easily because when we are obedient to an authority, we tend to feel safe and protected. We cant make mistakes because the authority decides for us and we cant be alone, because the authority watches over us. No matter what our behaviour is, it can be justified on the ground that we are only following orders, doing what were told from above. We can easily be brought to view ourselves as an instrument for carrying out another persons wishes, and so we no longer feel responsible for our actions. Unfortunately, that can make us feel responsible to the authority, instead of the content of the orders the authority is giving. The focus is changed although there is still morality there. However, this does not necessarily mean that all disobedience is good and all obedience is bad. That would ignore the relationship between obedience and disobedience. Acts of obedience to one principle is usually and act of disobedience to another. If a man can only obey, then therefore he is a slave and will accomplish very little. But, if a man can only disobey, he is a rebel and does not act in the name of a conviction or principle. We have to obey authority otherwise there would be chaos. This scenario would be far worse as you wouldnt be as safe and many of your basic rights could easily be violated. There have been people throughout history who have challenged authority to great effect. This occurs because the people in authority issue laws and rules that are unfair. Simple rule is, we obey to societys rules because they normally benefit us. Conclusion Is social influence bad? Well, as we have discussed, social influence has its pros and cons. Therefore, social influence can be good and it can be bad. As for peer pressure, the difference between good peer pressure and bad peer pressure is often summed up with a simple comparison. When it is good, you are a member of the crowd and when it is bad, you are part of a mob. If peer pressure is telling you to act in a generally appropriate way, to do the right thing when you may not otherwise, or to do more good than harm, experts say it is safe to say this is good. As long as following the crowd does not cause one to act without consideration, following is not always a bad thing to do. In a situation where peer pressure is good, individuals in the groups would be acting as individual parts of a whole, each working with the other. We have also discussed about the Internet and how it influences behaviour. Well again, it has its pros and cons. It can be a bad influence but at the same time it can be a good influence too. It all depends on the individual himself. If you look at it as something good and beneficial, then yes it would be beneficial to you and it would influence you in a good way but if you chose to use it in the wrong way then it can be a bad influence on your behaviour. For example, like Facebook. If you chose to use Facebook for communication purpose or as a faster way for exchanging information with someone else, then it could be a good thing. But if you use it for the wrong reasons, then you could be influenced to do things that are not so good and that could leave a bad impact on your behaviour and others. Regarding obedience, if our minds are so quick to obey an authority, we should channel our obedience towards our knowledge. Transform morals into authority, make decisions and carry out actions which affect our society in a positive and effective way. If we can accomplish this, our morals, values and critical discourse will determine our contribution to society. The danger comes when we blindly obey such figures and as a result behave in an immoral way as a result. Again, obedience has its pros and cons. Therefore, we conclude that social influence can be good and can be bad.