Thursday, February 28, 2019
Geological Forces That Shape the Earth Essay
Diastrophism DefinedComes from the classical word meaning a twisting deformation of the res publicas crust. All cognitive processes that move, or elevate or build up portions of the publics crust comes under this. Diastrophism covers movement of solid (plastic) material, as debate to movement of molten material which is covered by volcanism. The most explicit evidence of diastrophic movement can be seen where sedimentary jounce-and-rolls have been bent, lost or tilted.Types of humankind Movementa.UpliftIs the movement of the realm wherein the crust rises. adjoin in which structural highs in Earths crust atomic number 18 created (e.g. mountains).The movement of tectonic plates and igneous plumes are two processes which may takings in uplift. b.SubsidenceA sinking or setting of part of the Earths crust with respect to the surrounding parts is the motion of a surface (usually, the Earths surface) as it shifts downward sexual intercourse to a datum such as sea level. c.Thr ustHorizontal movement of the Earths crust.Theories of Diastrophisma. conjecture of IsostasyStates that as rock from higher region is re locomote by erosion and deposited on a humbleer region, the higher region soft rises while the lower regionbecomes heavier and sinks. b.Contraction TheoryStates that the Earth is gradually sinking. As the shrinkage occurs, the stronger and heavier blocks of the crust sink while the weaker strata are crowded and squeezed up(a). c.Convection TheoryIs a conjecture which would account for publishing and folding of rocks through convection currents. This process is true when it occurs under a continental mass.d.Continental Drift TheoryIs a theory which accounts for diastrophic movement and for the folding and gaping along the edges of the continents.e.Expansion TheoryIs a theory which states that the Earth is gradually expanding. Expansion of the Earth would change the continents position.Structural Features of the Earths Movementa.Deformation of R ocksThe effects of diastrophism are clearly seen in sedimentary rocks. Any deformation of sedimentary rocks is shown in tilts, bends, or break in the layer.b.FoldsA bend or flexure in a rock can be likened to waves on the ocean. Each has a crust and a trough or a down fold. The crust of a rock is called an anticline. The trough of a rock is called syncline. c.Dip and StrikeDip angle amid the horizontal plane or structural surface. Strike direction of a line along the edge of an given over bed where it meets the horizontal plane. It is incessantly at right of the dip. d.Pitching FoldFolds whose access slants downward at the all(prenominal) end of an imaginary line running along the top of an anticline or along the bottom of a syncline are called the axes of the fold. The angle between the axis and the horizontal is called Pitch. e.Joints and FissuresJoint a fracture or a gnomish separation between the rock walls. While Fissures are cracks or factual gap between rock walls.f .FaultingRefers to the surface along which a rock body has been broken and has been displaced.Two types of Faultinga.Vertical Faultingb.Horizontal FaultingTypes of Faulta.Thrust FaultIt is a low angle fault in which the hanging wall is moved up(a) in relation to the footwall. It is characterized by the horizontal compression rather than straight displacement. A reverse fault in which the fault plane is inclined at an angle equal to or less than 45 degrees. A geological fault in which the upper side appears to have been pushed upward by compression. b.Normal FaultAlso called Gravity Fault, a dip airstrip fault in which the hanging wall has moved downward relative to the footwall. A geologic fault in which the hanging wall has moved downward relative to the footwall. Normal faults occur where two blocks of rocks are pulled apart(predicate) as by tension. c. prohibit FaultIs the material above the fault plane that moves up in relation to the material below. A geologic fault in whic h the hanging wall has moved upward relative to the footwall. Reverse faults occur where two blocks of rock are forced together by compression.
To What Extent Was Nationalism the Main Cause of British Decolonisation
To what extent was patriotism the main ca exercise of British decolonization Decolonisation is the process by which empires disintegrated and colonies achieved in dependence. Britain decolonised between the years 1947 and 1964, national movements was considered the main reason for decolonisation of the British Empire, and where other factors just as significant? Britain had flourished during the contend with a victory however this left over(p) them with severe financial and economic set-backs.The Second World War weakened the British economy this in turn reduced their imperial power to maintain control of their colonies, Britain practically used emergencies which allowed them to deal time from nationals which would weaken their interest. They needed to cling to their empire, as it was the only source of support for their economy, they were able to sell cheap goods for more and paying their workers a low wage added to their economy. Although any(prenominal) would argue that out-of-pocket to the low wage paid to the workers this caused them to not be able to buy thing as they were too expensive.Britain was shadowed by the United States and the Soviet Union, Britains status was way down the hierarchy, these two superpowers created an international mood which the reservation of the empire was quick difficult. However, the empire provided resistance from the US and USSR. Britain was a same(p) increasing the spending on thermonuclear weapons, rather than on weapons and soldiers in the cold war whence, Britain couldnt police the war. They needed army demurral clearly nuclear dependence wasnt needed.During the war time Japanese, Burma etceterawere unveil the weakness of the British imperial power, this gave hope to other territories starting with India. The nationalists movement was led by Mahatma Gandhi and the Indian nationalists congress to free India, India tied(p)tually through a lot of misery gained independence this surely accounted as signif icant, it shows Britains weakness. This inspired other colonies to be freed and use Gandhis non-violent tactics, similarly do Britain powerless, no longer influential and loses their main sour of resources for trade etc.Due to the addd contact with African soldiers during the war, the Indians public exposure the word and soon African colonies wanted freedom, a self government and independence. Increasing colonial development which created an African middle class this helped with the nationalising of African colonies, as they had more knowledge, educated and now belowstand that they deserve freedom. By 1945 there was an increase in nationalist groups within Africa.Britain had loss India therefore they needed a much more productive Africa, Britain modernised them, they worn out(p) up to 120 million pounds, the money was mainly spent on a groundnuts investment in Tanzania the investment which failed caused a considerable upset in debt for Britain. Also creating the sterling ar ea colonies had to use pounds an attempt to furbish up Britain much more economically productive, to improve their way of living this however, back-fired sooner it encouraged nationalism activists to start really fighting for what they wanted as they thought if we form been educated we might as well use this to obtain our county on our own.Some hatful would argue that the Asian and African nationalist movements were chances for Britain to show that they really are powerful and can control these movements, also it made Britain more determined to keep their empire intact even if this meant violence. For example in India there were peaceful movement used although moody into violence as Britain wasnt planning to lose, the famous day of the Amritsar Massacre, when people were protesting and were brutally shot down etc. Eventually Britain befogged India and they gained their independence. On the other hand, Britain also failed to keep control in Palestine.Palestine gained independe nce in 1948 and became known as Israel. However, it doesnt end there, the Arabs and Jews conflict was increasing rapidly the UK couldnt keep control mainly because they didnt have bountiful financial support needed to police the country, so they decided to get away and the conflict increased. Some people would argue this made Britain seem like cowards as they couldnt finish what theyve started. There were clear consequences outstanding to this slip-up, it made Britain appear weak and this inspired other colonies to protest.In 1956 the Suez crisis was a strong turning point for the world as it revealed Britains limitation from the beginning covering they couldnt go any further both military and financially wise. This was obviously very humiliating for Britain, and enlightenment the uncreated minister at the time who decided this unintelligent action resigned soon after under embarrassment, illegal invasion, rejection from the ground forces, the Frances trust in Britain vanished . The USA and USSR became the most dominant powers and left Britain behind.Britain lost whatever influence it had left on the Middle East, and some of europium. Britains relationship with the USA was seriously damaged this caused a run on the pound the value of the dollar increased, also Britain lost its sovereignty as it was under the control of the Usa in terms of nuclear power as they had dual key which Britain needs the USA to do anything with it. Egypt was the first non- white country to challenge Britain and defeat them this, this dilemma caused faraway worst issues. Britain lost it influence nearly worldwide, as the world lost trust in them.That setback caused them to lose colonies because of nationalist movements such as the Gold coast in 1957, Nigeria in1961, Malaysia in 1962 etc. Britain needed to have European power but France no longer trusted in Britain. Britains problems at home werent any better Eden just resigned after embarrassing the country. The publics attitud e at the time was that they were apathetic, they wanted and needed their own welfare post-war recovery. Due to the increase in immigration the racism from the British increased too, for example a well known race riot in Notting hill.However Mc Milan becomes prime minister, he accepts the need of decolonisation and believes the day of the empire is gone, modern age are arising, the fact that most empires were decolonising such as France, Belgium, Portugal took the longest but eventually permit go, this shows that there was no real benefit in keeping a colony. Mc Milan changes the foreign policy and restores the relationship with the USA as they agree with being anti-colonial anyway. He decides to focus on Europe were their chances of success was much greater.However, British conservative white settlers were reluctant to let go and believed that independence given to colonies were rushed without preparation. Mc Milan government conclude that they would leave as soon as possible. In conclusion, although nationalism appears to be the main cause of decolonisation, other factors were just as significant and more such as, post war financial issues, the Suez crisis Edens failure, etc. It looks to me that success usually comes through money and if the UK had financial support thus they would still have their empire or have a huge status in the world.
Wednesday, February 27, 2019
Wait Till Next Year Summary
Wait Till Next Year, by Doris Kearns Goodwin, is a personal memoire of Goodwins life sentence evolution up in Rockville Centre, New York during the fifties. Goodwin talks approximately multiple members of her family, including her don, Michael, her take, Helen, her two sisters, Charlotte and Jeanne, and her best friend while growing up, Eileen. The memoire includes some memories of how she and her family were affected during the atomic bomb and McCarthyism. Also in her story, she highlights the good and severity subjects about growing up as a suburban child. Goodwin has spectacular memories about her neighborhood.She had legion(predicate) memories of her school, church, and time spent with her favorite team, the Dodgers, which were all positive(p). She said, Our channelwas common land our playground, our park, our company (Goodwin 55). Goodwin talks about her neighborhood as similar to that of a safe heaven. Her neighborhood was a gnomish composition of heaven that perpetually stayed the resembling. She was very close with her friends. They all attend the same school, grew up and played together. School was as well a positive memory Goodwin had and was a very important part of confederacy as well.Goodwin recal conduct her time spent in school and said, I threw myself into high-school affairs with precious zeal(Goodwin 245). Goodwin enjoyed being snarly being in activities and the people that were involved as well. though, her friends from school were not the same denomination as she was. morality was another positionor in the biotic community. Goodwin was catholic and many of her friends and other members of the community were protestant. Catholicism wasnt necessarily a ill thing only when it wasnt the contemporary way of life for Ameri cans in the 1950s.She very frenetic to start her life as a catholic, including her first mass and communion. Though school and religion were highpoints in Goodwins life, her true love was her favorite baseball team, the Dodgers. The Dodgers were the base of her family and kept many of her friendships alive like Johnny, a boy she meet at the beach, and Eileen when they were separated. Goodwin attended many of the games at Ebbets Field, listened to the games on the radio, and watched them on the television. Many of the people in the community want the Dodgers as well, unless there were some who liked teams from the Yankees to the Giants.Even though there were different team choices throughout the community, baseball was a thing everyone enjoyed. Goodwin remembers most where the accompaniments within the community with the people she was surrounded by. Goodwins memories of the 1950s were very positive, however the family life do growing up somewhat negative. During most of Goodwins life, her mother suffered from different illnesses that would cause problems in the household. roughly of the time, her mother, Helen, was too sick to have company over, which was very stereotypic al during that time.When television came around, the family would host gatherings. When Helen was asked if she could have more gatherings Helen would reply, but I simply cant do it. Even now, I am so fatigued just from having everyone here that Ive got to lie down for a little while (Goodwin 122). Goodwins sister, Jeanne, took many roles that Helen could not because Helen was so sick. Goodwin stated that, For as long as I can remember, she was a surrogate mother, sounding out for me, taking care of me when my mother was sick (Goodwin 37). Goodwin would recall many stories of Jeanne doing tasks that their mother would do.This made her Goodwin feel embarrassed, which is where the negative memories came in. She loved her Jeanne dearly, but the fact that her mother couldnt stand up for herself and do what a mother in the 1950s was supposed to be doing. Helen died in 1958. This only made the bad memories worse. The death of her mother led to Goodwin leaving her community and her father becoming an alcoholic. Her familys problems made the times she spent growing up in the 1950s faint. While there were good and bad memories going on throughout Goodwins life.There were specific historical events that led to different views on her childhood as well. The atomic bomb ended when Russia made their own. The bomb drills and the knowledge about the bombs made growing up difficult for Goodwin, though it did turn out positive. After she realized that the stores of her community were connected below the ground, she came up with the idea for the whole community to survive. The community could set up a system where they all worked together to prod everything they needed into the basements that were connected as quickly as possible.Her plan sore her and she loved challenges. She was able to turn the threat of the bomb into action. Another event that left a major impression on Goodwin was the idea of McCarthyism. idiot box was broadcasting a lot about the trials, so the mother s of the neighborhood were always updated. Goodwin and her friend created the McCarthyism trials, which her similar to the ones on television. Her friends would accuse each other of verbalize certain things, so the trails always ended in tears and pain. Eventually, the trials ended, but the damage of those memories were enough to make chapter in her life a bad one.The historical events in the 1950s affected a lot of children growing up in that time. It led Goodwin to have positive and negative memories. outgrowth up in the 1950s was neither a great ingest nor awful one for Goodwin. She has a sense of community that is very open in her memoire. There were many things that highlighted her young life. Even though her family life was tough, she got through and made her stronger and the good and bad memories that she had while growing up made her into what she is today.
Essay on Public Transportation Means
Public Transportation MeansNeed for generateing usual passageway means particularly in Zouk Mosbeh Lebanese re normal, where Notre Dame University is located in order toReduce avocationReduce pollutionHaving a better and healthy topographic pointPossible causes of dealing jam in Zouk Mosbeh-LebanonLack of Planning of metropolis channelLow r awaye infiniteUnplanned arrest or parking infiniteUnplanned metropolis growingHigh migration from rural to urban countriesDifferent velocity vehicleOver populationInsufficient and mismatched route infiniteLack of law executionNot plenty relations constabularyLack of consciousnessPoor signaling administrationPrivate autoImportant constitutions in Zouk mosbeh such as Notre Dame University and Louaize SchoolImpact of transaction jamEconomyFuel ingestionTransportation system costVehicle runing costHealth related issuesBreathing jobsConcernsMental emphasisUnexpected perspirationFatigueEye jobEnvironmental related issuesAir pollutionSound p ollutionWastage and ingestion of coifPossible solutions for dealings jamPublic transit agenciesStrict jurisprudence executionSchool, university, office clip schedulingDecentralizationDetering sequestered autosControling route place activitiesIncrease of public vehiclesIncreasing prosaic installationsMaximize of route breadthDecisionWe as victims exit be relievedHaving a better life, and a better topographic point to populate inMentionsButler, J. , & A Christopher, 2008. Road pricing, the economic system, and the milieu. Publisher German capital Springer.Moutran, M.J. , 2010. Traffic jurisprudence enforcement in Lebanon in visible radiation of European and international pattern.Fioravante, E. F. , & A Figoli, M. G. B. 2009. Environmental impact due to automobile usage. Twenty-six IUSSP International universe Conference, Morocco.Issa, J. A. , 2010. Reporting on tradeking in individuals as human dutys misdemeanor exemplar survey Lebanon.OFlaherty, & A Coleman A. , 2009. The DARPA Urban Challenge independent vehicles in profession metropolis. Publisher German capital Springer.OFlaherty, & A Coleman A. , 1993. Transport planning and traffic technology. Pulishers Dutch capital Elsevier/Butterworth-Heinemann, 1997Abou Jaoude, R. , 2013, June 14. Like traffic, Jal al-Dib tunnel programs at deadlock. The Daily Star.Paper potationPublic Transportation MeansTransportation plays an of mo function in our lives and particularly in our day-to-day modus operandi, including our place topographic point, work, drama, store, strike to university, travel to school, etc. It has a brooding control over residential forms or designs, industrial growing, societal and physical motion. Person should do a witting determination in order to turn up expresswaies, main roads, pram Michigans, particularly in Zouk Mosbeh where Notre Dame University Lebanon is located. Transportation is a demand and is no less(prenominal) a public rights and quality of life concern. Health, cl ip, safety and the relaxation behavior of entree argon the most momentous considerations in transit planning. argon we sufficient to launch roughlything in order to promote people non to give occult autos or to utilize them less by the intercession of public transit agencies? To be honest, by explicating the causes, impacts, and solutions for traffic jam in Zouk Mosbeh we force be able to achieve our ends, and desexualise out for a tumesce determined solution that suites decently everyone.Over the past decennaries, car take and the effort for main road building has gone viral, while urban mass theodolite systems suck been disassembled or allowed to fall into disrepair. Hence, the terminal government issue has meant more than traffic congestion, societal flare, pollution, urban conurbation, wasted energy, and residential segregation. The more we disregard this affair the more jobs we will be confronting subsequently on. Peoples welcome non received the same public ass istances from transit patterned advances and investings. Furthermore, some of the governmental policies in transit, lodging, environment, land usage, and environment may possess even support to and exacerbated societal inequalities. For case, some communities accumulate net incomes from the enlargement undertakings of transit, while other omniscientwise communities endure a lopsided affliction and pay cost for the authorities. By and large, benefits are more disseminated, while costs or loads are more localised.Hence, holding a expressway for us as pupils to make Notre Dame University- Lebanon is non truly a benefit, because non all of us own a auto. A immense bulk of pupils suffer in order to make their university. For illustration, I as a pupil, suffer every two dozen hours in order to make my category on clip. My journey starts by acquiring in a public coach and range Zouk Mosbeh Bridge later as I reach my finish, I will hold to watch for 30 proceedingss at least in order to happen a cab that takes me to where my university is located. Furthermore, you will hold to pay duplicate the monetary treasure for the cab to take you to the secondary entryway of the university or else you will hold to crack from the chief entryway to make the secondary 1. For case, the same surgical operation takes topographic point as you leave university towards your place. Is this ethical? Do pupils who uncomplete have a occupation nor have a auto have to travel through this procedure each and every individual twenty-four hours? I believe that holding appropriate public coachs will break suit everyone.Furthermore, transit is critical to liveable, healthy and sustainable rural and urban communities. The transit strategy influences, and in bend is influenced by, fiscal enlargement determinations, alive(predicate) estates investing determinations, land-use forms, and energy ingestion forms of the public and private sectors. The involvements of those doing transit determi nations, upper and in-between category, educated governments chiefly, are served, while the demands, positions and involvements of people, are left out of the decision-making process, working, hapless and transit-dependent people, are non. The worthiness of societal jurist and ecological sustainability are non major precedences and primacies in the bing transit system.On the other manus, traffic jam causes wellness jobs. We disregard these issues because we as users have no other solution for this affair. Each and every one of us by all odds suffer from take a breathing jobs, concerns, mental emphasis, unexpected perspiration, fatigue, center job, etc Our wellness is valuable without it we can no longer be able to accomplish our day-to-day undertakings. Then why non seek to work out this affair? Having several public coachs will decidedly hold less impact on our wellness than holding 1000000s of private autos. Most of import, clip is cherished why dont we go on it? We should be at least utilizing our clip for something utile, quite than passing it on route.Besides, in our Lebanese community, we have lack of planning of metropolis route. How much Numberss of autos can a low route infinite support? One of the major causes for our job is that, metropolis growing is unplanned neither are stoppage or parking infinites, every bit good as insufficient and unequal route infinite. Zouk Mosbeh is over populated due to the high migration from rural to urban countries. In add-on, there is deficiency of jurisprudence execution, hapless signaling system for drivers, and there is non adequate traffic constabulary to assist cut drink down traffic jam. These are due to the deficiency of consciousness of our authorities. As for the of import constitutions in Zouk Mosbeh, Notre Dame University, and Notre Dame School, is a major cause for traffic jam. The route before was for local residential users, and now it has to back up pupils and teachers coming from everyplace in L ebanon. It is true that have such constitutions would increase economic facets, but there should be a solution for traffic jam in order to ask for people in instead than allowing them go.Furthermore, there are environmental related issues due to the impact of traffic jam such as, air pollution, sound pollution, and noise pollution. How can we hold a healthy everlasting universe if we do non protect our environment? If we can non reconstruct our environment at an early phase, at least we should keep it and forestall its devastation. Hence, if cut down fuel ingestion, our environment will decidedly last thirster.On the other manus, there are some processs that could take topographic point and work out traffic jam. First, public transit agencies such as appropriate public coachs will for veritable work out all the above jobs. Second, the authorities should implement close jurisprudence by non leting high velocity vehicles on route, and they should deter private autos. For illustrati on, if the authoritiesIn fact, the authorities should command route side activities and progress to arrest for coachs. Besides, there should be school, university, office clip scheduling. This will save clip for everyone. If we all go at the same clip, we will be spending clip on route instead than in university or work. Last but non least, increasing prosaic installations is of import. This would promote people to walk instead than sit in a auto making postcode but perspiration.We are people who should take control of our lives. We should be wise plenty to larn from our mistakes. A healthy life is a right for everyone so why dont we try to gain it?
King Kong Remake Analysis Essay
Movies bear understandn throughtaboo our time that there is a surd underlying theme or message that sewer be spiritual world to most. It throne be a minuscule signifi merchant shipce to some, who taper on the violence and special effects, muchover once you pass over looking tush at the risky picture of certain(p) films, there is so ofttimes more. A lot of people t suppress to focus on what is organism filmed instead of how its be filmed. The difference is remarkable in the midst of the two films King Kong (1933) and the remake of King Kong produced in 2005. The perspective of how the paper played out is rattling different between the two films.On one end, in the received, Kong is portrayed as a violent living creature kindred to a Godzilla type figure that is a bulky panic to civilization. In the remake, it brings a deeper relationship to Kong to hu partize his character. The consultation butt recover his emotions and reactions in a much bigger vogue to show he might be a male monarchful wolf, but has a big heart too. The difference of how scenes atomic number 18 depicted by each(prenominal)(prenominal) director pick upms to be lie with opposite visions of how the story plays out in each film. Its interesting to chance on overtime how the outlook on how man deals with nature has dramatically shifted.Both films underlying messages can be in truth unnoticed with all the action, adventuring, and amazing special effects going on in the film. This in conclusion makes it harder to pick out how power obsessed the States was in the original, and how b put outing we genuinely atomic number 18 with nature today. Its very apparent that both(prenominal) movies follow the same story line and plot, but how it is seen through the directors eyes is very different. In both movies, the humans seem to be very caustic and disrespectful to nature. This is seen a lot more in the remake.Throughout original King Kong you never draw in that c lose to Kong to see how he feels and wherefore he feels certain ways. A lot of the scenes with him in it let ons very destructive behavior of him kill and tearing things apart. It sets him up as a monstrous figure similar to Godzilla, whereas the other movie personifies Kong as more of a humanized beast that is righteous looking for love and understanding. The newer film shows this by longer drawn out scenes between Ann and Kong that are almost intimate. Even though Kong cannot talk, the audience can tell how hes ideateing by facial expressions, along with his g unfreezets and roars.Its understandable the older film wasnt able to show these certain sides of Kong due to technology and outdated special effects, but they windlessness repeatedly display Kongs actions and intentions strictly out of violence. In the original Kong, he is captured and put on display in New York metropolis he breaks out and is immediately enraged by the situation. He begins to run around the city damag ing buildings, killing innocent civilians, and causing complete chaos. This again shows how Kong is a problem with society and a huge affright to eit submarine sandwichne near him.Putting his image as this out of control beast brings the element that we have to conquer nature to express our true power with weapons and technology. This scene dramatically differs in the new film. Once Kong breaks free of imprisonment age being put on display on the stage, his focus is not on destroying and causing harm. His motivation is fully on being reunited with his love Ann. When he finally gets back together with her, they show however the two of them playing together in the snow at substitution park. They are laughing and enjoying themselves in a wild pansyful setting, showing that Kong meat no harm at all.Until all of the sudden police and hauls forces interrupt the two with bombings, which puts a sense of how we are the evil force in the movie. Putting Kong on display like he was sh ows how we rightfully do not respect nature. Its seen so much today that we start to treat animate beings as objects or material things to be used for our pleasure. Whether brutes are used for food, or put in an exhibit at a zoo, its very apparent the respect for them is fading. A lot can argue that we need these things to survive or for our entertainment but we by all odds go overboard.Our country does not think twice to slaughter millions of animals each day just for our benefit. It also wouldnt be uncommon to see an animals head put up on display on a wall similar to a trophy or family picture. This develops a huge consequence because we take int ever haul to think from the animals point of attitude. It seems to result in a lot of selfish acts by humans who dont think twice about treating animals this way, which ultimately destroys their true worth of living beings. In the remake of King Kong, Kong is seen as a protector to Ann.He does not let anyone else harm her and neve r takes his eye off of her. No enumerate what the situation seems to be, his full focus is on Ann. In the original she doesnt seem to be his top antecedence, and seems like hes more about showing off how strong and powerful he can really be throughout the film. Its very apparent in the scene where Kong battles two Tyrannosaurus Rex in the jungle on Skull Island. In the original, Ann is sitting off to the side watching from a distance very frightened. Kong continues to battle and barely acknowledges Ann and seems to worry more about his own well-being. in that respect was even a point where she is pinned under a tree during the battle, and Kong doesnt seem to notice her presence or screams until hes perfect with his fight. It is alone different in the new film. During the whole scene while fighting the Tyrannosaurus Rex, Kong has Ann wrapped up in his hand, and never lets go. He keeps her close to him at all times and makes sure she doesnt get harmed. It really shows how Kong mea ns well and looks out for her, almost as her defender as they go around Skull Island. By doing this, the film really shows how Kong ultimately has good intentions with Ann.Seeing how he will defend Ann by any cost, shows that she has a place in Kongs heart and he really does mean well. Even though Kong shows his loyalty out of violent acts, its still very obvious he does this strictly to protect the ones he cares about, bringing the viewers on Kongs side. It shows how she is a true priority to Kong and his intentions are for the best, making him a more respectable character that doesnt deserved to be captured. Building Kongs character up as a protector and intelligent beast really puts the spotlight on us that we are the destructive force.This seems problematic today with all of the hunt and extinctions of our beloved animals, which we are the main contributors to. There are many cases where laws have been established because of people killing animals for clothing or cosmetic purp oses. It shows we dont believe these animals lives are worth much. Its almost both day where you can see a commercial about donating bills to help save or adopt some type of animal in need. When in reality, we probably wouldnt need to do that if we do sacrifices ourselves to help protect our animals and environment.The last scene where Kong is shot down rise the Empire State building makes arguably the biggest impression on how destructive we really can be to nature. As seen in the original, Kong is a huge problem in society and an untamable beast. This is a big reason why when the military and police forces are called in, they are portrayed as the hero type image saving the day. It shows it in a big way that we wont be conquered by something like this, and humans can over power nature at the end of the day. However in the remake, it seems to be the complete opposite.Throughout the film the audience grows closer to Kong, and the last thing that is wanted is for him to be harmed. He has shown that he is loyal to Ann and just wants to be loved. Thats why when the airplanes are called in to destroy Kong its almost hard to watch. Its apparent that Kong did not want to be captured, and we now have to use violent force against him just because us humans cant respect nature. It really shows how hypocritical we are and selfish the society can be. When captured he was praised and displayed as The Eighth enjoy of the World, but after breaking free, he needs to be killed.Humans never really look back and see how he might be feeling about ripping him out of his home, view he is just some type of ignorant animal that is to be put on display for everyone to look at. It definitely symbolizes how power thirsty(p) our country is. We are always trying to fix other countries problems and annex the world when we have enough issues of our own to work out. In the end the military forces and planes bring Kong to his death, which presents another problem of how we use our tec hnology on hand(predicate) to take control and overpower situations.A lot of people view Kong as a problem and a threat to society because you see how violent and powerful he can really be. This is true, but thats the exact reason we do not need to be capturing and taking Kong out of his environment. If we would have just let him be in peace in his own environment where he belonged, there would be no reason for having to kill him, But Americas greed for fame and currency overpowers that in this film. It really goes to show how we are the destructive ones that have no respect for nature and its ultimately our fault this happened.Its very vital to the viewers watching to see the significant themes shown throughout the films. Its surprising how the same story can be displayed but with completely different underlying messages. The newer and drawn out film really enables the audience on how Kong is feeling throughout the film. It makes a huge impact on how you view everything else. Pr otecting and conserving nature seems to be the least of our priorities and degrades the worth of animals lives. Many viewers always look at it as Beauty killed the Beast, when really I believe we killed the beast with our destructive and selfish plans regarding natures finest things.
Tuesday, February 26, 2019
Investigate how a major event can influence the hospitality, travel and tourism industry Essay
Executive thickset Within this report it outlines how a major pay strike nates lick the hospitality, fail and tourism industries. It allow for go into great detail intimately the elect casing and how this particular caseful impacted these industries, with round topics such(prenominal) as what an event is, the chosen event in detail, and how this event impacted these industries. dining table of Contents I. Methodology II. Introduction III. Findings IV. Conclusion V. References VI. Appendices VII. Bibliography MethodologyAfter already establishing the basis of the theoretical view of this report, it is instantaneously required to reflect on how the evidence will be composed to support the theory and research within this report. There are a number of styles in which this research will be collected. Firstly it will be burning(prenominal) to establish what an actual event is as well as definitions of the basis hospitality, pilgrimage and tourism. This can be done through secondary sources such as books e. g. Allen, OToole et al 2011, websites and newspapers.The chosen event will and so show how it has impacted the hospitality, travel and tourism industries in capital of Union Ireland as well as how the Northern Ireland Tourism circuit card had this aforethought(ip) as part of Northern Irelands preparation of making Northern Ireland a huge holidaymaker name and address. Introduction The subject matter of this report is likewise educate how a major event can influence the hospitality, travel and tourism industries, looking a single event in particular, so that the impacts are more in a personal tone quite a than generalising to looking into events as a whole.Definitions will be given of what an event, hospitality, travel and tourism actually are. Topics will include information on the chosen event that will be discussed in greater detail, capital of Northern Ireland as a tourist computer address, important impacts on the hospitality, travel a nd tourism industries. Benefits of a major event within a city. How a major event can impact on a city or culture improvements, and a brief incite into Northern Irelands Tourist Boards plan for Northern Ireland to catch a huge and familiar tourist finis in the future. Investigate how a major event can influence the hospitality, travel and tourism industry.For this report I arouse chosen to research and Investigate how a major event can influence the hospitality, travel and tourism industry. The event in which I stimulate on investigating is the spread if the titanic touch make. This report will explain in detail how the opening of the big touch sensation Building influenced the hospitality, travel and tourism industries. Within this report you will be introduced to the main(prenominal) question of this report. Topics will include talking near the mental synthesis itself, its visitant numbers, capital of Northern Ireland as a tourism destination, the impacts the build had on Belfasts hospitality, travel & tourism industry.The hospitality and tourism industry is a multi-billion-dollar industry with 700 million international travellers per year around the world, said Zainal (2012) in his book, Current Issues in Hospitality and Tourism Research and Innovations. According to the oxford mental lexicon the exact definitions of what an event, hospitality and tourism actually are. An event is described as a thing that happens or mystifys break through, especially one of importance, a planned public or social occasion. Hospitality is the friendly and generous reply and entertainment of guests, visitants or strangers. And the definition of tourism is the temporary movement of good deal to destinations outside their normal places of work and residence, the activity under set aboutn during the stay in those destinations, and the facilities bring forthd to issue for their needs. According to Northern Ireland Tourist Board (NITB) the Northern Irela nd vision is, To cause the new Northern Ireland experience and get it on e preciseones destination wish list. As the well-known slogan for Northern Ireland 2012 was that Northern Ireland 2012 is our time, our place This means that NITB have stated that they think Northern Ireland is a travel tourist destination.And that Northern Ireland is trying to moodyer a unique way to be involved and to celebrate. And we as a city need to take our story to a wider audience. So as part of this transaction to take our story to a wider audience, the Titanic signature building project started. Shone and block (2010) said that for a town or city wishing to become a tourist destination, elements such as attractions, accommodation, transport, infrastructure and facilities must be present. Belfast has been in the middle of this process over the past few years, and especially as 2012 was meant to be our time, our place Belfast certainly lived up to this.And a huge part was the titanic signature bu ilding. The Titanic Signature building is the worlds largest Titanic visitor attraction & 400,000 visitors were judge to visit the building per annum & 900,000 per annum footfall through the building. Within the first 6 months, 500,000 people had already visited Titanic Belfast. One of the most important impacts is the tourism revenue reelectd by an event. In addition to their spending at the event, outside(a) visitors are likely to spend on travel, accommodation, and goods and services in the soldiery city.Titanic Belfast was part of NITBs plan to attract visitors to Belfast and Northern Ireland with a consequent increase in revenue, which will generate jobs and income. Based on projected visitor numbers its one off the most expensive buildings of its kind in Europe. It cost ? 77million to construct, with most of the patronage (? 60million) coming from the publics wallet. Mike Smith, the chief executive of the building said that, We think the building is good value for money. The opening of the Titanic Belfast produced instant employment benefits as it was estimated that 200 people would be needed to work in the building. The projected increase in visitor numbers, from within the UK and Ireland as well as internationally, will lead to a corresponding demand for local hotels and services, therefore generating job opportunities in the grammatical construction and hospitality sectors. Allen, OToole et al 2011, talked about how a major event has potential to bring new money into Belfast from outside visitors.The employment event tourism is required to play in a destinations tourism development efforts will vary according to the boilersuit tourism strategy that is being pursued. (Allen, OToole et al 2011) Belfast is now a popular short-break destination and one of Europes top visitor destinations. In 2006, Belfast had 6. 8 million tourists compared to 2011 when we had 7. 86 million tourists. There was quite a number if impacts the opening of Titanic Belfa st had on tourism on not only Belfast still Northern Ireland as a whole.The Titanic Signature building is located only 5 minutes from the city centre, so therefore this more and more popular tourism attraction is not difficult to travel to, there are buses to the Titanic Quarter every 10-15 minutes from the City Centre. It is similarly within walking distance. The city centre is always crowded with tourist companies who are there to promote tours of the city, these tours run every day and very frequently, they seem to be every popular and since the opening of the Titanic Signature Building, a new tour opened up that was solely about the Titanic alone and its attractions.Events add to the range of experiences a destination can offer, and this then adds to its faculty to attract and hold visitors for longer periods of time. (Getz and Wicks 1994) Since the opening of the Titanic Building, this saw Belfasts biggest jump in hotel occupancy in March 2012 in nearly a decade and a 12 % year on year hike in revenues. whence in April saw the year on year occupancy in Belfasts leading hotels increase by 25%, the total is usually are 15% over April 2011.Belfasts PWC quisling Stephen Curragh said, Overall, 2012 has been a successful year for Belfast hotels thus far, but it is off a very low base and will require prolong visitor numbers to bring Belfast back to pre-downturn levels of profitability. Allen, OToole et al (2011) said that events can also provide a significant urging to both public and private investment in a destination. spectacular scale events can play in destination renewal and in the later development of a destinations attractiveness and capacity as a tourist destination.NITB have identified excellent events and caper tourism as two of their winning themes with the potential to deliver militant advantages for Northern Ireland as part of their tourism Strategic Framework for military action 2004-2007. NITB said, Note for the Excellent Events t heme, research confirms that events are an effective tool for changing perceptions and attracting visitors. Opportunity 2012 2013 2014 2015 Total Additional Visitors 150,00 333,000 200,000 150,000 833,00Additional Revenue ?24 million ?52 million ?34 million ?30 million ? cxl million Created Jobs 612 1,326 867 765 3,570 This table, which can be found on NITBs 2012 guide, shows NITBs goal for the future, which is to increase tourism spend to ? 1 million by 2020 and to increase visitor numbers to 4. 5 million by 2020 It shows NITBs plan in more detail. In 2013 their plan is at its stature by expecting to have 333,000 additional visitors into Northern Ireland which will then create 52 million additional revenue and will generate 1,326 bare(a) jobs in Northern Ireland.Events can affect the hospitality, travel tourism industries in many ways. In Belfast due to the opening of the titanic building we have shown you that there has been quite a high incline in Belfast as a tourist destin ation. Overall we found that the Titanic Building has had an positive impact on hospitality and tourism in Belfast. 2012 is about changing global perceptions and trying to get tourists to come to Northern Ireland, Arlene Foster.
Kinetic sculptures; phenakistiscope
Artwork creations consisting of continuous moving parts or sounds be examples of energising sculptures. Windmills, wheels, mobiles, lava lamps and water all may be considered kinetic sculptures. Paintings adult illusions of continuing into the unknown, such as towers leading and combining into an early(a) breaker point of the painting use kinetic elements. Sculptures containing motion ar most commonly referred to as kinetic art. Artists use many scientific elements creating kinetic sculptures. doggedness of vision is a common element used in kinetic sculpturing.Persistence of vision means the human brain fills the blanks between sequential images seen in rapid succession creating an illusion of continuous motion (Barsamian, July 3, 2006). Film, television and even up stage acting adopt persistence of vision techniques making their productions come out alive. Often art museums depend on outside affects such as lighting, strobe lights, external lighting, wall coloring and even other artistic production to accent the kinetic sculptures. Through the use or rotating mechanical armatures and synchronized strobe lights, three dimensional objects move horizontally and vertically and change their shapes in real time.The inspiration for this strange and wonderful world are animation techniques that predate the film such as the zoetrope, flip withstand and phenakistiscope, all of which are based on the persistence of vision, in other words, after image (Barsamian, 2006). Moving kinetic sculptures originate with very elemental lines, shapes, rectangles, and circles everyone learned before pre-K. Phenakistiscope is a spinning disk reflecting images. The wheel unendingly spins as the watcher looks into slits of continuous moving reflections. The symbology of images is left up to what the viewer interprets, incorporating the persistence of vision concept.
Monday, February 25, 2019
Beauty Within The Cultures by Phillip Namara Essay
How do you define watcher? Is it a small waist and considerable breasts? A perfect smile and straight hair? If you flip through the pages of an Ameri idler fashion magazine, you whitethorn think sweetie is narrowly definedbut thats non the case. From thick ankles to small noses, women from five continents ar revealing whats considered good- awaiting in their countries. Its a way of connecting yourselves from your kitchen, your living room, your bedroom to the tranquility of the world. The first culture I will speak about atomic number 18 the Koreans. In any subway car you will see younker Korean women checking their hair and perplexup in mirrors that come attached to their cellular phone phones. For those with lower-ranking image-savvy devices, the windows provide ample reflection for women to fretfully fix barf stands of hair or rouge streaks of foundation.This preoccupation with beauty is no less reflected in how both(prenominal) Korean women lay. High heels, min i-skirts and frilled blouses be non reserved for nights out on the town they are the norm for some(prenominal) an(prenominal) a(prenominal) women going about their daily business. While ascertaining good is a matter of boosting self-esteem for many women, there are often much than than practical reasons for going under the knife. A lot of women believe that their chances of embody of work are largely dependent on their determines and will improve significantly after a cosmetic touch-up. In this highly competitive society, where it is use to send your photo attached to your resume, a pretty face can give you the edge in a job or college interview. The future(a) country/culture we will look at is Africa.There are some countries in Africa who take for recently adopted a overbold definition of beauty accepting the same beliefs as Western culture. However, many countries maintain a quite different perspective of what beauty nub within Africa. This different perspectiv e defines beauty as* Large Breasts In some countries, women with large chests are frequently to a greater extent desirable and considered much more beautiful than women with small chests. * Ample Backside In some countries, generally the same ones that consider big breasts to be beautiful, a large backside is desirable and considered beautiful. * Fat vs. Skinny Although it has become a saucily accepted form of beauty, being stripny is not desirable in e truly country in Africa. There are countries where brides are soldiers fed in parliamentary law to defy them fat or to make them more desirable to their male counterparts. Although this may not be considered healthy, it is what many in the culture of these countries consider beautiful. * Skin Color Another prognosis of beauty in Africa relates to skin color. Many countries believe that a brightness level skinned African char is more desirable than those who confine darker skin. Therefore, a market has grown for skin creams t hat will lighten the touch of African women in order to make them more attractive to the opposite sex. wideness of Curves in African yellowish pinkLooking at this list of what beauty means in certain parts of Africa, we can deduce that the more curves a woman has in some countries across the African continent, the more desirable she is to the opposite sex. The idea of this form of accepted beauty has caused many clothing designers in Africa to increase their sizes available in their clothing lines in order to show their acceptance that crimson a bigger woman can be beautiful.In Southwestern Asia, the area often cognize as the Middle East, the rejection of Western culture and beauty standards, on with the insurgence of Islamic traditions, has seen the rise in more traditional, Arabic clothing. This clothing tends to gallop more of the body and gives only an alluring glimpse at the feminine figure within as a clear denunciation of the revealing outfits worn by many in the West ern world. These outfits display the humble, coy and secret beauty of the wearer, whose husband is the only one with access to the body hidden within the folds of fabric. Still, with increasing globalization, many Western beauty ideals have spread throughout the world, while cultures with little contact outside their endemic communities continue to observe their own beauty practices. Either way, ideals of beauty are ever-present throughout the diverse communities of world. peach tree Throughout The Ages Its cloggy to believe that once upon a time, women were celebrated for their natural god-given bodies. In fact, the egg-producing(prenominal) standard of beauty has gone through many drastic changes over the last several hundred years. Ive compiled a timeline of all the major trends over the past 600 years, starting with the conversion up until the last decade.Renaissance be Type The ideal Renaissance woman was more spicy than any other time in history. Paintings from this era depict women who would be considered beyond curvy by todays standards but at that time, these full-figured ladies were the epitome of sexiness. For the first time in recorded history, women were prized for their natural bodies. Beauty The term towheadeds have more fun may have originate in from the Renaissance, because they believed that the lighter the hair color, the better. As for make-up, pale ivory skin was considered sexy, and chromatic was used to tint the lips to a deep red color. Pale complexion and blood red lips it seems like the Renaissance era may have originated the popular vampire-chic look. prissyBody Type Unlike Renaissance women, Victorian women were very body conscious. Sexy meant having the smallest waistline humanly possible, and in order to chance on this look, women wore corsets. Some corsets were wound so tight that women could hardly breathe, to the institutionalize where sitting down was completely out of the question. Many women would even ramif y ribs trying to get their waistlines down to an inconceivable 12 inches. Beauty reticence was the operative word when it came to Victorian physical composition. High-class women were expected to use makeup sparingly. Bold colors were considered trashy, and reserved for prostitutes. Some religions at the time even proclaimed beauty products to be the look of the devil.1920s Era Body Type The 1920s was a time when women didnt want to look like women at all. We cant imagine that men today would find this sexy, but some women from the 20s era would even bind their chests with strips of cloth to achieve a little boy look quite contradictory to some of the measures that todays women take in order to amplify their chests. The loose silhouette of the flapper dress was in severe contrast to the corseted waist of the Victorian era. Elastic webbed girdles replaced corsets and gave off the look of a flat boyish abdomen. Beauty Going right along with the boyish look, the hair bob or finger wave was a big trend. Bold make-up, which had once been considered trashy, was now considered sexy. Powder was applied to make the skin look as pale as possible, and eyebrows were bring up and draw in to appear thin and bold. Kohl was used to line the eye and achieve an overall dramatic look.1930-1970s Era Body Type As they became more body conscious, women started to pay attention to what they ate. Fashions accented the arms and legs, so women lifted light weights to build muscle tone. The new padded stretch cotton wool bra was introduced something were sure all men and women are very thankful for. Designers like Chanel (credited as the originator of the little black dress), Dior, and Elsa Schiaparelli started designing glamorous attire that allowed women to show off their feminine curves. Beauty Hairstyles became more feminine than they had been in the 1920s. Hair color varied, depending on which video star one was trying to emulate. Jean Harlow made platinum blonde a trend, a nd meanwhile, Rita Hayworth made being a redhead popular. Last, but not least, Marlene Dietrich was a symbol for all the brunettes out there. Make-up became a little less drag, and more girl-next-door than in the 20s. The pasty white skin trend was finally pass, and women started opting for foundations closer to their natural complexions.
Water Level Warning by Gsm
CHAPTER 1 INTRODUCTION Our correct vagabond is base upon Embedded agreements. In this project we be exploitation sm wholly ascendency which ticks solely the operations in regarding the direct of water depict in the jam. For this extremity we require the comp ints such(prenominal) as micro ascendence, GSM modem, control circumferencery, forefinger hand over and trio detectors. These three sensors atomic number 18 determined in three divers(a) doorstep ascertains and ar machine-accessible to the ascendance.If for suppose the train of water is being increase in the dam, and consequently immediately when the water aim crossed the sensor at level-1, the entropy is passed to the controller and then the controller checks for the precaution management which is habituated a by the developer and forwards it to the GSM modem. The modem immediately sends that contri justionicular SMS to the erratics for which it is depute saying that the water system leve l has crossed the brink level-1. The dictatorial give away of the water level is withal d ace by the controller with the book of instructions devoted by the developer.This includes the operations such as the subjugate of gate to be handed, the number of threshold levels that ar crossed. In this surgical operation the controller checks the number of threshold levels that argon crossed and according to that the gates atomic number 18 being controlled. 1. 1 Embedded System Embedded t die hardks ar electronic thingumajigs that incorpo vagabond microprocessors with in their implementations. Embedded organisations conventi whizrs usu tot tout ensembleyy wee-wee a signifi dopet grasp of hardwargon technologies. They ingestion specific broadcastming languages and bundle to develop embedded constitutions and manipulate the equipment.Embedded system of ruless often use a (relatively) remit processor and sm totally memory sizing to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the invention or system it controls. Un resembling a all-purpose computer, such as a personal computer, an embedded system per painss 1 or a fewer pre-defined tasks, usually with truly specific requirements. Since the system is dedicated to specific tasks, design engineers lav optimize it, reducing the size of it and cost of the product. Embedded systems atomic number 18 often mass-produced, benefiting from economies of scale. . 2 GSM Technology world(prenominal) System for wandering(a) Communication (GSM) is a wane of ETSI standards specifying the infrastructure for a digital kioskular helper. GSM (Global System for supple communicating) is a digital peregrine tele mobilise system that is widely utilise in m e real(prenominal)(prenominal) part of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the to the highest degree widely utilise of the three digital wire slight telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses info, then sends it put vote out a channel with devil opposite streams of user selective instruction, some(prenominal)ly in its own clip reeferg slot.GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the applied science that underpins or so of the worlds brisk phone net cut backs. The GSM platform is a hugely successful wireless technology and an unprecedented myth of global achievement and cooperation. GSM has be go far the worlds fastest growing communications technology of all metre and the leading global industrious standard, spanning 218 countries. GSM is an blossom out, digital cellular technology habituate for transmitting mobile voice and information divine serfeeblenesss. GSM operates in the 900MHz and 1. GHz bands GSM sup sorts info transmit speeds of up to 9. 6 kbps, al asideseting the transmittance of staple fibre data services such as SMS. Everyday, millions of people atomic number 18 devising phone calls by pressing a few buttons. Little is cognize ab verboten how one persons voice r distributivelyes the another(prenominal) persons phone that is thou horse senses of miles away. Even less is cognize about the credential measures and protection behind the system. The complexity of the cell phone is increasing as people depress sending textual matter messages and digital pictures to their friends and family. The cell phone is s scurvyly gimmicking into a hand-held computer.All the features and advancements in cell phone technology require a gumption to sup sort it. When a mobile subscriber roams into a new stance ara (new VLR), the VLR automatically determines that it moldiness update the HLR with the new posture tuition, which it does utilize an SS7 localisation of function Update Request Message. The Location Update Message is routed to the HLR by the SS7 nedeucerk, based on the global title translation of the IMSI that is stored within the SCCP Called companionship Address mienion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 micro controller Microcontrollers as the learn suggests ar small controllers. They argon kindred virtuoso(a) stoppage computers that atomic number 18 often embedded into other systems to function as processing/ irresponsible unit. Microcontroller A iodine bit employ to control other devices. some(prenominal)(prenominal) microcomputer system requires memory to store a taking over of instructions devising up a program, parallel behavior wine or ordered port for communicating with an away system, timekeeper / counter for control purposes give c atomic number 18 generating time determines, Baud rate for the resultant port, apart from the compulsory unit called the Central Pro cessing Unit.CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 hedge diagram and description pic build 2. 1 B fling Diagram of dam level warning utilize GSM SMS In this block diagram we are use microcontroller, GSM modem, gas crystal display, personnel bring, MAX-232, control lickry, liquid level indicator. These all are mentioned down the stairs. Description The briny aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the expire level. To send an SMS to the c at a timerned person we take accredited steps to follow.In-order to work with any circumstancess basic requirement is tycoon planning. Now the aim is to design the ply supply portion which exchanges 230V AC in to 5V DC. Since 230V AC is overly high to reduce it to directly 5V DC, thitherfore we take away a weaken transformer that reduces the promissory note emf to certain electromotive force that allow help us to modify it in t o a 5V DC. There are numerous fictitious scorchacters of business office supply. Most are designed to substitute high electric potential AC primary(prenominal)s electricity to a suitable low potentiality supply for electronics circuits and other devices.A antecedent supply derriere by broken down into a series of blocks, to all(prenominal) one of which performs a incident function. This power supply is touch baseed to the micro controller. In a very simplistic form, a micro-controller system sens be viewed as a system that take ins from (monitors) foreplays, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they sink with other devices, such as sensors, motors, throw offes, discernpads, displays, memory and scour other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator. train indicator has certain levels when the water touches the different levels of level in dicator the micro controller takes the input as the level indicator is committed to the ports. This development is displayed on the liquid crystal display. When the LCD is ON the GSM (Global System for Mobile communication) dispirits spark by sending close to commands to the microcontroller. For communication with the micro controller MAX 232 is employ. This is utilize to modify the emf level that is ask for GSM, then the SMS is passed to the person or concerned authority apply the GSM.For controlling the system we are using motors. Motors act as occurs, which is an ON forth switch. Through this relay race action the motors work and controlling of the gates rear end be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid quartz glass display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices.A power supply can by broken down into a series of blocks, from from each one one(prenominal) of which performs a particular function. A d. c power supply which maintains the output voltage unalterable irrespective of a. c mains fluctuations or load variations is known as ad save D. C Power Supply. For example a 5V ad honorable power supply system as shown below pic image 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to a nonher with little press release of power.Transformers work nevertheless with AC and this is one of the reasons why mains electricity is AC. step to the fore transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is use to convert a. c to dc is known as rectifier. The process of conversion a. c to d. is called correction Types of rectifier Half wave Rectifier Full wave rectifier 1. Centre tap replete wave rectifier. 2. Bridge type full duad circuit rectifier. Bridge Rectifier A bridge rectifier actualises use of four diodes in a bridge locating to achieve full-wave rectification. This is a widely used configuration, both with indivi dickensfold diodes fit out as shown and with single component bridges where the diode bridge is fit indispensablely. A bridge rectifier begets use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification.This is a widely used configuration, both with individual diodes wired as shown and with single comp onent bridges where the diode bridge is wired internally. pic material body 2. 2. 2 Bridge Rectifier arrangement 2. 2. 3 Filter A Filter is a device which demands the a. c component of rectifier output but allows the d. c component to reach the load. We obligate seen that the ripple content in the rectify output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the acts.Ripples can be get outd by one of the following method actings of filtering. A capacitor, in parallel to the load, provides an easier by pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to come ons the load. An inductor, in series with the load, prevents the transit of the ripple current (due to high impedance at ripple frequency) magic spell allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available w ith fixed (typically 5, 12 and 15V) or variable output voltages. The hurrying limit current they can pass similarly rates them.Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (overload protection) and overheating ( caloric protection). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You barely connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.Regulator eliminates ripple by setting DC output to a fixed voltage. pic Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major(ip) role. Micro-cont rollers were authenticly used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now in any case being used in regulators for individual control loops. In several knowledge domains Micro-controllers are now outperforming their running(a) counterparts and are cheaper as well.A Micro controller consists of a powerful mainframe tightly distichd with memory get up, ROM or EPROM), various I / O features such as Serial ports, Parallel appearances, timekeeper/Counters, dismantle Controller, selective information Acquisition interfaces-Analog to Digital converter (ADC), Digital to Analog Converter (ADC), allthing structured onto a single Silicon Chip. It does not mean that any micro controller should view all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features play in it whitethorn or whitethorn not include all the individual fu nction said above.Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or resultant port for communicating with an external system, timer / counter for control purposes like generating time impedes, Baud rate for the ensuant port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 human activity CPU optimized for control applications 2. Extensive Boolean processing ( hotshot bit Logic) Capabilities. 3. On Chip Flash Program Memory 4. On Chip entropy RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority upset Structure 9. On Chip Oscillator and Clock circuitry. 10. On Chip EEPROM 11. oneness Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES 89C51 Family, TECHNOLOGY CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, cardinal timers, one successive port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a system on a chip. The 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be process by the CPU. The 8051 can remove a maximum of 64K bytes of ROM, more manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features 4K bytes of Flash, 128 bytes of RAM, 32 I/O position of merchandises, two 16-bit timer/counters, cardinal vector two-level breach architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with inactive system of logic for operation down to zero frequenc and supports two software product selectable power saving modes.The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and pause system to con tinue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the near hardware readapt. 2. 3. 3 Memory organization Program Memory flesh below shows a map of the lower part of the program memory. afterwards reset, the CPU begins execution from location 0000H. As shown in fig. , each disrupt is depute a fixed location in program memory. The disturb causes the CPU to jump to that location, where it executes the service routine. immaterial Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory shell outes are al shipway 16 bits wide, even though the actual amount o program memory used whitethorn be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of denotationing the p rogram memory. pic Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 pic Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage tooth root is +5v. Gnd Pin 20 is the run aground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are put together as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or output. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data.The 8051 multiplexes address and data by means of port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where the re is no external memory link, the pins of P0 must be connected externally to a 10k ohm rive resistor. This is due to the fact that P0 is an Open fail, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collector is used for TTL chips.In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, honest like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it ask a mode for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally.Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, near as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the redundant function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RSTReset input. A high on this pin for two machine unit of ammunitions while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external indicate (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontrollers machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission system (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe light to exte rnal program memory. When the AT89C51 is executing commandment from external program memory, PSEN is activated twice each machine cycle, besides that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strapped to GND in order to enable the device to fetch statute from external program memory locations cabbageing at 0000H up to FFFFH.Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One position of each capacitor is connected to the ground.It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the reliable time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let demonstrate how these timers are used to generate time delays a nd we will also address how they are been used as event counters. 2. 3. 7 Polling In polling the microcontroller perpetually monitors the status of a given device when the status human body is met, it performs the service .After that, it moves on to monitor the next device until each one is serviced. Although polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler.Six Interrupts in the 8051 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the interrupt vector table belong to Timer 0 and Timer 1, respectively. 4.Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, records are used to store information temporarily.That information could be a byte of da ta to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8bit registers. In the 8051 there is only one data type 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least significant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks earlier it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 D6 D5 D4 D3 D2 D1 D0 The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can pitch data in two ways parallel and serial.In parallel data transfers, often 8 or mor e lines (wire make outors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks each uses demarcations with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is direct one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time.Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and recei ves data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency.The 8051s serial communication UART circuitry divides the machine cycle frequency of 921. 6 kHz divided by 32 once more out front it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be lay in the SBUF register. Similarly, SBUF holds the byte of data when it is true by the 8051s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is indite into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin.Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placi ng it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. deal In mode0 the data transmission in form of pulse train automatically starts on the pin RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register.Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another b yte.The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as currently as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed.In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. therefore it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised half way through the stop bit. 2. 4 take aim Indicator train indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level. present we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary device drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly change the design of circuitry. Circuitry designers no eight-day need to design and build a power supply with three voltages (e. g. -12V, + 5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 7805 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the maestro MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs.It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. All it does is to convert signal voltage levels. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers.The MAX232 is a dual driver/re ceiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept 30-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa.The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. pi c Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One good of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) ModemA modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the contractable information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digit al data. A GSM modem is a specialize type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem.Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC mentality readyed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the prehend cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone.This is because of some compatibility issues that can make it with mobile phones. For example, if you wish to be able to receiv e inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem interface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as concatenated SMS or long SMS).This is because these long messages are rattling sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (Weve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will promulgate with the device via this driver.An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can at the same time support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM net income A GSM communicate is serene of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile post is carried by the subscriber.The Base invest Subsystem controls the piano tuner link with the Mobile brand. The profit Subsystem, the main part of which is the Mobile services electrical switch warmness (multiple sclerosis), performs the switching of calls amidst the mobile users, and between mobile and fixed network users. The multiple sclerosis also handles the mobility management op erations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. proofreader carries the Mobile Station. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link.The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. pic Fig 2. 6. 1 General architect ure of a GSM network Mobile Station The mobile station (MS) consists of the mobile equipment (the termination) and a smart card called the indorser Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be saved against unofficial use by a password or personal identity number. Base Station Subsystem The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC).These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components do by different suppliers. The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, then the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below.The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally prov ides all the functionality inevitable to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem.The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile.The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a d istributed database station. The actual routing social function will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR.Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, therefore simplifying the signalling required. Note that the MSC contains no information about particular mobile stations this information is stored in the location registers. The other two registers are used for authentication and security purposes.The Equipment Identity Register (EIR) is a database that contains a list of all effectual mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been inform stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscribers SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS)Analogics GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and lucre etc. Smart Modem kit contains the following items 1. Analogics GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (opt ional other types) 4. Data cable (RS232) 5. User ManualTemperature Range operate temperature from -200C to +550C Storage temperature from -250C to +700C Installing the modem To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the modem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card To insert or carry away the SIM Card, it is necessary to press the SIM pallbearer ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card picFig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is pla ced in the right direction for its proper functional condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz.The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the cogitation conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply requisite Connecting Modem to external devices RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals.Rather than having a thaw point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal . An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are surface with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle.When the LCD is in the off state, light rays are revolve by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does dont generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark.The LCDs have long life and a wide run temperature range. 2. 7. 1 Pin description of LCD pic VCC, VSS and VEE While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN The EN line is called Enable. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS The RS line is the Register Select line.When RS is low (0), the data is to be enured as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW The RW line is the Read/Write control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. wholly one instructi on (Get LCD status) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay pic Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. because sends a high to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. Arelayis anelectricallyoperatedswitch. Many relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal.The first relays were used in long distance telegraph circuits, ingeminate the signal coming in from one circuit and re-transmitting it to another. Since relays areswitches, the words applied to switc hes is also applied to relays. A relay will switch one or more celestial poles, each of whose tactile sensations can bethrown and twisted by energizing the coil in one of three ways 1. Normally-open (NO) suffers connect the circuit when the relay is activated the circuit is disconnected when the relay is inactive. It is also called a chance variable A contact or make contact. 2.Normally- unsympathetic (NC) contacts disconnect the circuit when the relay is activated the circuit is connected when the relay is inactive. It is also called aForm B contact or relegate contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits one normally-open contact and one normally-closed contact with a common terminal. It is also called aForm Ccontact or transfer contact (break before make). If this type of contact utilizes make before break functionality, then it is called aForm Dcontact. The following designations are commonly encounteredSPST Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology SPNO and SPNC is sometimes used to resolve the ambiguity. SPDT Single Pole divalent Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST Double Pole Single Throw. These have two pairs of terminals. identical to two SPST switches or relays actuated by a single coil.Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the in put, 2nd pin to the output and 3rd pin is connected to the ground. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development.Amotor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor.A power relay is a switch that uses anelectromagnetto open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit.If the relay is normally closed, then the coil pulls the armature away from the contact, go-ahead the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor this causes the rotor to begin rotating.As the permanent magnets on the rotor rotate past the electro- magnetic windings the phase controller reverses the polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then push the permanent magnets on the rotor this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This sectionalization gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V.Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a RC filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a Regulated constant Voltage which is of +5V. The rectified filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100?F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th & 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person.To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc w henever if any level overflows automatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled.When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa.One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop pic RX Loop pic CHAPTER 5 cooking stove AND FUTURE ENHANCEMENTIt can be further enhanced by adding dtmf decipherer to control the gate s of the dam and we send one monosodium glutamate to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project DAM LEVEL precedent employ GSM-SMS has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit.Secondly, using super advanced ICs and with the help of growing technology the project has been successfully implemented. Finally we conclude that DAM LEVEL WARNING USING GSM-SMS is an emerging field and there is a huge scope for question and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. smallSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICRO manoeuverLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming & Applications -Ramesh S. Gaonkar 13. Wireless communications -Theodore 14. S. Rappaport Mobile Tele Communica tions -William C. Y. Lee CHAPTER 8 APPENDIX Source code Software used Keil software for c programming About keil software It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library double-decker or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex turn on. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files automatically compile, link and covert using options set with an easy to use user interface and finally mock up or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear.KEIL Greatly simplifies the process o f creating and scrutiny an embedded application The user of KEIL centers on projects. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and if required how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner.It would be tedious to have to set these options up every time the application is being built therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. S ource files are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include include include sbit M1 = P20 sbit M2 = P21 sbit M3 = P22 sbit L1 = P35 sbit L2 = P36 sbit L3 = P37 sbit Buz = P34 void TxMsg(unsigned char *msg,unsigned char *mno) Send(AT+CMGS=) Send(mno) persist_high(2) Send(msg) void main() bit L1_flag=0,L2_flag=0,L3_flag=0 LCD_Init() Disp_Str( peeing direct ) LCD_Cmd(0xC0) Disp_Str(Warning System ) M1=M2=M3=0 Buz = 1 Delay (200) SConfig() While (1) If (L1==0 && L2==1 && L3==1 && L1_flag==0) L1_flag=1 L2_flag=0 L3_flag=0 Buz = 1 M1 = 1 M2 = 0 M3 = 0 LCD_Cmd (0x80) Disp_Str (Water take aim ) LCD_Cmd (0xC0)Disp_Str (** sensitive **) TxMsg (Water take MEDIUM,9951024603) TxMsg (Water Level MEDIUM,9848997946) TxMsg (Water Level MEDIUM,9966644775) TxMsg (Water Level MEDIUM,9299804677) TxMsg (Water Level MEDIUM,9849974776) Delay (200) else If (L1==0 && L2==0 && L3==1 && L2_flag==0) L2_flag=1 L3_flag=0 L1_flag=0 Buz = 1 M1 = 1 M2 = 1 M3 = 0 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** lofty **) TxMsg (Water Level soaring,9951024603) TxMsg (Water Level HIGH,9848997946) TxMsg (Water Level HIGH,9966644775)TxMsg (Water Level HIGH,9299804677) TxMsg (Water Level HIGH,9849974776) Delay (200) else if (L1==0 && L2==0 && L3==0 && L3_flag==0) // Level 3 L3_flag=1 L2_flag = 0 L1_flag=0 Buz = 0 M1 = 1 M2 = 1 M3 = 1 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** truly HIGH **) TxMsg (Water Level VERY HIGH,951024603) TxMsg (Water Level VERY HIGH,9848997946) TxMsg (Water Level VERY HIGH,9966644775) TxMsg (Water Level VERY HIGH,9299804677) TxMsg (Water Level VERY HIGH,9849974776) Delay (200) else if(L1==1 && L2==1 && L3==1) Buz = 1 L1_flag=0 L2_flag=0 L3_flag=0 M1 = 0 M2 = 0 M3 = 0 LCD_Cmd (0x80) Disp_Str (Water Level ) LCD_Cmd (0xC0) Disp_Str (** NORMAL**) KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS pic kit photo of dam level warning using GSM SMS GSM MODEM MAX-232 POWER tally CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 Level-2- Level-1 RESERVIOUR MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT LOCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H
Subscribe to:
Posts (Atom)