Thursday, October 31, 2019

Research of Excellent Fruit Juice Co Essay Example | Topics and Well Written Essays - 3000 words

Research of Excellent Fruit Juice Co - Essay Example This business plan is comprised of company description. Company description informs the stakeholders and readers of products produced by the company and where it is situated among others. Third chapter is industry analysis, where it covers trends in the food and drink industry. Fourth chapter is a marketing plan, where it describes the target market, sales objectives, promotion activities and marketing strategy among other key areas. Fifth chapter is about operations. In this chapter, the company highlights and explains where it will source its fruits, plant and equipment as well as production process. Sixth chapter states company’s structures and the number of employees needed in each department. The last chapter; financial plan indicates the amount of money it is required to start and operate the business in the first year. It also indicates where these funds would be sourced and how it would be applied to enable the company attain its objectives 2.0 Company Description Exce llent Fruit Juice Co. (EFJC) is a public company, which produce fresh fruit juice and fruit juice. It will begin its operations in April 2013 and would be headquartered in Newcastle, North of England. Its core business is to produce both fresh fruit juice and fruit juice from a variety of fresh fruits available in the UK. Some of the key fruits to be used in the production process are oranges, lemons, melons, pineapple, mangoes and berries among others. The founder of the company Mr. Jones Cook would be chief operating officer. The company intends to produce 100% natural products, which are safe and in variety of flavors in a bid to exploit the fresh fruit market and enhance nutrition for its consumers Furthermore, the company intends to be one of the fastest growing in UK and other parts of Europe. It would acquire and build outstanding fruit juice plant to meet fruit juice and smoothie needs of the people of Newcastle and its surroundings 2.1 Managing Stakeholders Expectations Tab le 1: Stakeholders’ Mapping using company’s stakeholder interest and influence matrix Ricart (2005 p. 100) explains that managing expectations of key stakeholders involves stakeholder mapping. Therefore, the company would manage its expectations so as to reduce potential conflicts. The company uses stakeholder interest and influence matrix to map its stakeholders. Employees and Government are the most important stakeholders of the company. Employees influence the company through their action and benefit from the company by receiving salaries. On the other hand, government through legislation can influence company’s operations. The government is also interested in the health of it citizens and have increased scrutiny in food and drinks industry. Customers are interested in the products while suppliers are interested in marketing their supplies. However, they have low influence because they cannot control operations of the company because the company would easily switch to other suppliers if need arises. Donors exert control through regulation of funds to the company and are not necessarily interested in company’s outcome. Figure1: Balanced Scorecard of the company The above scorecard would help the company’s management have a fast compressive view of the companies (Phadtare 2011, P.72). 3.0 Industry Analysis Food and drink industry is critical for societal health and financial outcomes in

Tuesday, October 29, 2019

Background and conditions Essay Example for Free

Background and conditions Essay How is it possible that two people grow up together in the same family background and conditions, yet turn out to be strangers? How is it possible that two people who have lived together for many years are strangers to each other at the end? In Sonnys Blues, two brothers the narrator and Sonny, grows up together in Harlem, fall apart as they grow older, and live completely different lives. In Lullaby, Ayah feels that Chato, her husband, has remained stranger to her even when they have spend forty years together, facing all the hardships and sufferings given by life. In Sonny Blues, the narrator is the older brother who is conservative, determined, and a kind of family person. Sonny, who is his younger brother, is carefree and undecided about his future plans. It is sometimes very difficult to understand how two people coming from the same background live life completely opposite from each other. As the narrator and Sonny grow into adults, one moves towards success and the other moves towards failure. Once when their mother was dead, their lives completely changed. The narrator wants Sonny to finish his school and think about his future seriously. After knowing Sonnys plans to play jazz music, the narrator is surprised and annoyed. His conservative thinking and definition of success makes him unable to understand his brothers feelings. He fails to understand that music is Sonnys life and thats what he wants to do all his life. That makes him feel that he doesnt know his brother at all. He is like a stranger to him. The narrator, in some way or the other, wants his brother to be like himself and wants him to do whatever he thinks is safe and right for his future. So Sonny was forced to move in with his brothers fianci e, Isabel, where he has to stay until he finished high school. Sonny starts skipping school and eventually he ceases to go all together. He has been spending all his time with some musicians in a white girls apartment. He is scolded and screamed at by Isabels mother and that is what breaks him down and he runs away. After that, whenever the two brothers met they always fought awfully. It is hard to not be able to fit into society and that is why Sonny turned to drugs for a sense of belonging. Nobody was aware about this problem until it was too late. The narrator has never been a good listener to his brother. That is what I think is the greatest factor that gives him the sense of alienation towards his brother. Sonny was always kept away from his dreams. At the end of the story, the narrator for the first time listens to his brother after all these years and tries to understand him and the sufferings he has to face all his life and tries to console him. Thats when he hears him playing the piano and he ends up being proud of his brother. He becomes the important person in Sonnys life, on the way from suffering to success. They both end up happy and understanding each other much better. In Lullaby, Ayah, the old woman and her husband, Chato have lived together for forty years. Together, they have seen their three children getting apart. Ayah hates white people because she thinks that Jimmie, their eldest son, died due to them. BIA-Bureau of Indian Affairs, who consists of white people, takes away her other two children. On the other hand, Chato is always eager to learn white ways of living. He is fluent in both English and Spanish languages and works for white people in a horse farm. She hated him for teaching her to sign her name in English because thats what takes her children away from her. If she had not signed it, her children would never have departed. The white people fired Chato; he became ill after that. As Ayah describes it, That satisfied her. To see how the white man repaid years of loyalty and work. All of Chatos fine -sounding English talk didnt change things(Baldwin 127). This shows that Ayah was so rigid about her thoughts for white people that she didnt even spare her husband from criticizing. They got some money from the government that Chato spends for his wine. He was sick and drunk one evening when Ayah had to go to pick him up from the bar. That is when she feels a sense of alienation and estrangement towards Chato. She could not see him as a person so ill, drunk, and broken mentally from what he has faced after his sincere and loyal work toward white people. This feeling is very different from what the narrator in Sonnys Blues feels about his brother at some point in the story. Even if Ayah and the narrator in both the stories feel the sense of estrangement and alienation towards the people, so close to their hearts, it is different. The narrator and Sonny never stayed together for long when they grew up. They were always apart and different. Ayah and Chato were different in every way but they lived together all their life, they knew they had, and faced every suffering together. When Ayah sees Chato losing his strength to fight against the hard facts towards life, she feels this sense of estrangement. She has never seen Chato losing or giving up. She has always seen him facing the difficulties with courage and determination. She feels that they are old now. In Sonnys blues, both the brothers end up happily, but in Lullaby, the end is sad. Ayah has nothing to say about anything anymore. Her life has become memories. But the narrator and Sonny have a lot to do together in their life.

Sunday, October 27, 2019

Le Silence De La Mer Analysis

Le Silence De La Mer Analysis Analyse the depiction of Franco-German collaboration in the short story ‘Le Silence de la mer. How effective is it in contesting the imagery and ideals of collaboration? The imagery and ideals (and indeed questions on their authenticity) regarding Franco-German collaboration are perceived and presented through means of a German soldiers transition from ignorance to knowledge. At the beginning of the story Werner von Ebrennac is idealistic, almost delusional, in his perspective on the German occupation. Towards the final ‘episodes of the story, however, an austere sense of darkness and truth pervades as he undergoes a transformation in his outlook which directly results from the revelations he faces in Paris. Vercors is highly effective in illustrating the fundamental flaws in idealising such a notion because by presenting the reader with an optimistic character and one whose naivety is flagrantly exaggerated to the point of being implausible he succeeds in juxtaposing the ideal and the actuality of Franco-German collaboration, thus inviting readers to witness their stark contrast. This question cannot be answered without incorporating an analysis of one of the short storys most significant images. Ubiquitous within it is the concept of a ‘marriage between France and Germany. As von Ebrennac himself says of Briand, ‘â€Å"Il va nous unir, comme mari et femme†. France, as is usual in her traditional guise of ‘Marianne, is the feminised party; the ‘femme of the metaphor, whilst Germany is portrayed as the husband; the ‘mari. Written at a time when women could not, particularly in the context of Nazi and Vichy ideals, expect the same rights as their husband, this pervasive symbol can be interpreted as one which casts France in a role of subjugated female to Germanys dominant male rather than a collaborator on an equal footing with her invader. This device is deployed in more detail on pages 29 and 30, when von Ebrennac tacitly compares France and Germanys relationship and on a lesser scale the unfeasible liaison between himse lf and the narrators niece – to the fairytale ‘The Beauty and the Beast. On a superficial level Vercors is suggesting that the so-called ‘collaboration between the two countries exists solely in the realm of myth and legend; that the ‘polite invasion of the early years of German occupation was a fantastic smokescreen designed to disguise its true tyrannical nature. On a deeper level it becomes clear that von Ebrennacs idealisations conceal an underlying recognition of Nazi values in spite of his seemingly personable demeanour. With the fairytales protagonists evidently serving as symbols of the two countries, the soldier inverts the emotional dynamics of the story by focusing on the torment of the Beast (Germany) rather than the capture of Beauty (France), creating an unusually positive portrayal of the former. Much like Nazi propaganda, the true train of events is glossed over and undermined. Furthermore, there lies a sinister undercurrent beneath the ‘bonheur sublime that this union is supposed to give rise to, namely ‘â€Å"leu rs enfants, qui additionnent et mà ªlent les dons de leurs parents, sont les plus beaux que la terre ait portes.† In this sentence von Ebrennac, whether he realises it or not, is indirectly referring to the Nazi aspiration to create a ‘Herrenvolk, or ‘master race, of Aryan people to improve their breeding stock. Finally, the very act of translating a traditional French story into German (La Belle et la bà ªte becomes Das Tier und die Schà ¶ne) represents far more than a linguistic practicality; it is symbolic of translating French culture, society and politics into German as well. From this we can glean that Franco-German ‘collaboration isnt the ideal which the Nazi propaganda machine, and of course the German soldier in this story, would have us believe. It is by no means a symbiotic relationship, but an invasion in which only one country will prevail; that of the invader. Although the complicity of France in advocating Nazi ideology during the war years has been brought into question in decades since, Vercors French characters are unquestionably resisters. ‘Le Silence de la mer is most easily interpreted as an allegory of passive resistance; the narrator and his nieces refusal to speak to the soldier who lives in their home uninvited is an act of great self-sacrifice and patriotism; an imprisonment of the mind which serves to protect the values of the culture and country they hold so dearly. In the nieces case, her silence and failure to make eye-contact with von Ebrennac is also a complex denial of her blossoming feelings for him. She forfeits what might, in other historic circumstances, have been a happy and suitable union in order to serve the best interests of her country. An analysis of the narrators library reveals how incompatible a ‘marriage France and Nazi Germany would be. For gracing its shelves (as observed on page 28) is a long list of classic authors, mainly French, with two things in common: they all uphold the Republican emphasis on intellectualism and individualism, and most would have been banned under the occupation. Although the two characters never verbalise their beliefs, the titles contained in this library are the literary manifestation of their convictions; the value they place on civil liberties and democracy. The inclusion of great writers of other nationalities, for example Shakespeare, is no doubt intended to symbolise resistance on a wider, European level. In short, the protagonists interests lie in resistance, not collaboration. The closing line of ‘Le Silence de la mer – ‘Dehors luisait au travers de la brume un pà ¢le soleil. Il me sembla quil faisait trà ¨s froid – epitomises, through means of pathetic fallacy, the deception of the early years of the German occupation. The relationship between France and Germany is not ‘un amour partagà ©, but, as the references to Shakespearean plays Macbeth and Othello imply, a tragedy, as one seeks to erase the spirit of the other. Von Ebrennacs compatriots words expose the true nature of Franco-German collaboration: ‘â€Å"Nous ne sommes pas des fous ni des niais: nous avons loccasion de dà ©truire la France, elle le sera. Pas seulement sa puissance: son à ¢me aussi. Son à ¢me surtout. Son à ¢me est le plus grand danger.† Not a collaboration at all, but a conquest.

Friday, October 25, 2019

Literary Analysis of Joseph Hellers Catch 22 Essay -- Heller Joseph C

Literary Analysis of Joseph Heller's Catch 22 Laughing in the face of war and death, literally, is one of the things that make the novel Catch-22 by Joseph Heller such an intriguing and original story. It was written in 1961, a time when, due to the fighting of the Second World War, all war novels were written with a dark and dreary tone, while still trying to continue the pre-conceived romantic notions about war. However, Joseph Heller strips away all of the romantic pretense, and pulling heavily on his own Air Force experience during WWII, presents war in its most raw, un-censored version. It takes away thoughts of being the amazing hero, and winning medals, and replaces them with the screwed up, bureaucratic way that we fight wars. It shows the true paradoxes that arise, and shows the violence of war, in its most un-adulterated form. This book came right after WWII, a war that most American citizens saw as a just and needed war, and shocked all who read it with the truth about war. Then, as if to prove the literary genius of the author, the Vietnam War comes along. It then turns out that the novel Catch-22 was almost prophetic about the war. Almost the entire novel is shown through the eyes of the main character, Captain John Yossarian. He is an Assyrian, who is completely paranoid and always trying to convince people that there are other people out there who are doing their best to make sure he doesn’t return from each mission he flies. He then decides to make it his personal mission to return alive from every flight. Throughout the entire story, the main theme or subject is the craziness of war, and how it is not romantic as it has been previously portrayed, but actually hellish and dangerous. One of the most interesti... ...iness of war. In conclusion, the entire book, while being non-sequential and confusing throughout, still conveys its theme very well. This is mainly thanks to the author’s ability to bend the English language to his will, and the timing that it was released. It came out at a time that all war novels were heroic and romantic, yet do to Heller’s own Air Force experience he knew the truth about war, and by writing about it, he brings it to the foreground. The entire novel centers around and contributes to the theme that true war is not how it has been portrayed in the media of the day. It is actually a self-contained hell that is perpetuated by crazy leaders, death, and violence. This makes this novel one that should be required reading for all peoples in the world, so that we can better understand the truth about war, and maybe, just maybe, we will have fewer wars.

Thursday, October 24, 2019

Research-based Reading Program Essay

The Texas Reading Initiative has outlined a fairly comprehensive statement on the value of reading and the significance of infusing the habit of literacy among the young. Besides teaching/conducting a reading program per se, the quality, depth and integrity of such teaching methodology is equally important. This is the main reason why most reading advocates have bannered the discourse of a â€Å"research based† reading program rather than the traditional teaching methodology for teaching children how to read. It works on the emerging assumption that teaching the young is delicate enough for the reading teacher to adapt a research-based method. The paper on Components of a Research-based Reading Program, part of the Red Book Series by the Texas Education Agency, outlines the fundamental attributes of the recent development of teaching reading among the young. It is composed of a deeper understanding of the recesses of a child’s mind, its formation, development and predictable growth (Hilgard, 2001). Generally, the essential attributes of these Twelve Essential Components comprise an advanced understanding of adult-child training and communication: the Teacher-Trainer, the channel and the recipient (the child). These maybe the basic attributes of ordinary communication but an analysis of the paper can reveal that the communication framework is actually the basis of this research-based program, not to mention that the concept of code interpretation and language are involved and mentioned in that paper. The two ends of this communication curve, the Teacher-trainer and the child are the live working elements of this reading program, which makes the simplest components. What is generally interesting in these Twelve Components is the channel element and how the child decodes the communication. The paper frequently discusses the concept of language and how the child perceives instruction from the teacher, which is its whole point. This is the brunt/meat of the teaching methodology, where the paper discusses â€Å"opportunities† and â€Å"strategies† to aid child development. Such things are stated on the paper as to how to exploit the nature of the language channel, where educators strategically use the oral component to understand the written language-the act of reading. According to the authors, by the oral way, the child is directed into opportunities for appreciating sounds, its differences and â€Å"referents†, a concept used by linguists. They say that children may read aloud and â€Å"understand their building blocks† (www. tea. com), which we assume as auditory building blocks. This may imply that to reinforce one’s reading, one has to learn how to speak it first, using the auditory logic of the language’s construction, thus utilizing the nature of the child’s brain to absorb these â€Å"building blocks† into communicative memory (www. childdevelopmentinfo. com). And of course, there is the written format to contend with. This is where the recipient can visually decode using some of the strategies. Decoding in this context means visually playing with the language construction (â€Å"wordplay† as the paper says) through â€Å"blending† and what they call â€Å"word families† and writing patterns. On a lighter note, there is nothing new about the research-based reading program offered by the Texas Reading Initiative. The allegedly â€Å"new† methodology works much like teaching a foreign language to students in the collegiate level, but in the child’s case, localized and specialized for a kindergarten or grade-schooler. The same opportunities and teaching strategies have existed in basic foreign language class in university, and child psychologists seem to find it effective if made easier for children. Reference: Child Development Institute. Reading Improvement. Retrieved January 27, 2008, from http://www. childdevelopmentinfo. com/store/reading-improvement. htm. Hilgard, E. R. (2001). Introduction to Psychology. New York : Harcourt Brace Jovanovich.

Tuesday, October 22, 2019

Free Essays on Gibbons vs. Ogden

Gibbons vs. Ogden In the court case Gibbons vs. Ogden, the Supreme Court reviewed the commerce power held by Congress. The Supreme Court decided that commerce was not simply defined as traffic or the mere buying or selling of goods. Justice John Marshall explains the commerce clause as, â€Å"Commerce undoubtedly is traffic, but is something more – it is intercourse. It describes the commercial intercourse between nations, and part of nations, in all its branches, and is regulated by prescribing rules for carrying on that intercourse† (McClenaghan 265). Woodrow Wilson once described the Supreme Court as a constitutional convention in a continuous session. In a constitution convention, the Constitution was written and interpreted. In the Supreme Court case Gibbons vs. Ogden, the Supreme Court uses the power of judicial review to interpret a part of the Constitution, this shows the relationship between a Supreme Court and Constitutional Convention. The laws of New York granting to Robert R. Livingston and Robert Fulton the exclusive right of navigating the waters of that State with steamboats are in collision with the acts of Congress regulating the coasting trade, which, being made in pursuance of the Constitution, are supreme, and the State laws must yield to that supremacy, even though enacted in pursuance of powers acknowledged to remain in the States. The power of regulating commerce extends to the regulation of navigation. The power to regulate commerce extends to every species of commercial intercourse between the United States and foreign nations, and among the several States. It does not stop at the external boundary of a State. But it does not extend to commerce, which is completely internal. The power to regulate commerce is general, and has no limitations but such as is prescribed in the Constitution itself. The power to regulate commerce, so far as it extends, is exclusively vested in Congress, and a State.A licens e unde... Free Essays on Gibbons vs. Ogden Free Essays on Gibbons vs. Ogden Gibbons vs. Ogden In the court case Gibbons vs. Ogden, the Supreme Court reviewed the commerce power held by Congress. The Supreme Court decided that commerce was not simply defined as traffic or the mere buying or selling of goods. Justice John Marshall explains the commerce clause as, â€Å"Commerce undoubtedly is traffic, but is something more – it is intercourse. It describes the commercial intercourse between nations, and part of nations, in all its branches, and is regulated by prescribing rules for carrying on that intercourse† (McClenaghan 265). Woodrow Wilson once described the Supreme Court as a constitutional convention in a continuous session. In a constitution convention, the Constitution was written and interpreted. In the Supreme Court case Gibbons vs. Ogden, the Supreme Court uses the power of judicial review to interpret a part of the Constitution, this shows the relationship between a Supreme Court and Constitutional Convention. The laws of New York granting to Robert R. Livingston and Robert Fulton the exclusive right of navigating the waters of that State with steamboats are in collision with the acts of Congress regulating the coasting trade, which, being made in pursuance of the Constitution, are supreme, and the State laws must yield to that supremacy, even though enacted in pursuance of powers acknowledged to remain in the States. The power of regulating commerce extends to the regulation of navigation. The power to regulate commerce extends to every species of commercial intercourse between the United States and foreign nations, and among the several States. It does not stop at the external boundary of a State. But it does not extend to commerce, which is completely internal. The power to regulate commerce is general, and has no limitations but such as is prescribed in the Constitution itself. The power to regulate commerce, so far as it extends, is exclusively vested in Congress, and a State.A licens e unde...

Monday, October 21, 2019

Strike on the Inside Corner essays

Strike on the Inside Corner essays The mantle of the best pitcher in baseball is a title that is exchanged between a number of pitchers through the course of generations. With the game ever-changing, pitchers are forced to adapt and the only way to pinpoint the elite is through private recollections of those who faced them. Players of the 70s will nominate Nolan Ryan as the best pitcher of all time; while modern-day players will draw upon personal experience in naming the gritty Roger Clemens as the best ever. However, in the 60s, despite the fleeting star of Sandy Koufax, there was no pitcher a batter wanted to face less than the St. Louis Cardinals Bob Hoot Gibson. Famed for pitching 98-mph fastballs that painted the inside corners and the briskly beating hearts of batters cringing in fear as they stepped to the plate, Gibson, also famed for his frankness, wrote his equally candid memoirs in his autobiography, Stranger to the Game. "Bob Gibson had five pitches: fastball, slider, curve, changeup and knockdown." While some claimed Gibson was a headhunter, you cant argue with the statistics. Winner of the Cy Young in 1968 and 1970, National League MVP in 1968, World Series MVP twice, Gold Glove winner nine times; the list of accolades speak for Gibsons themselves. But behind the glory and the Hall of Fame career, he was a man shaped by the racism that was so abundant in his youth. Indeed, while the autobiography seems initially to dedicate itself to the glorification, deserved or not, of Gibson, it has a deeper meaning that is stated near the beginning of the book and reiterated throughout as he recollects memories from his childhood in the slums of Omaha, Nebraska. This was a time when blacks were forced to drink from different fountains, sit in different parts of the bus, and were relegated to second-class citizens in a nation where all are supposed to be equal, wind blowing through their hair as they st ...

Sunday, October 20, 2019

Orange peel alternative Essays

Orange peel alternative Essays Orange peel alternative Paper Orange peel alternative Paper Introduction. Chapter I Seville orange, sour orange, bighead orange, or marmalade orange refers to a citrus tree (Citrus x uranium) and its fruit. It is hybrid between Citrus maxima (pommel) and Citrus reticulate (mandarin). Many varieties of bitter orange are used for their essential oil, which is used in perfume, as a flavoring and as a solvent. The Seville orange variety is used in the production of They have been the most cultivated tree fruit in the world since 1987 and sour oranges account for approximately 70% of the citrus production I chose this topic because I want to know, if orange peels and vinegar are good leaners. Also because this a good alternative home cleaner, and it is easy to make. Instead of buying highly toxic chemical Household cleaners this one is much better. This Peels make an inexpensive and powerful base for an effective all-purpose cleaner easily made in any kitchen. And is CEO friendly. Statement of the Problem Steel Cleaner aims to answer the following questions. 1 . ) Will Orange peel and vinegar, remove the stains? 2. ) Will it remove the rust of steels and make it shiny again? 3. ) Will it be enough to clean and remove stains and rust? Hypothesis of the Study . Yes, oranges and vinegars contains high acids that can remove stains 2. ) Yes, 3. ) Orange peels are much gentler when removing stains, than stain removers. But will not be enough in removing rust Significance of the Study The purpose of this Investigatory Project is to determine whether orange peels and vinegar will be proven to be enough for removing rust and stains. And Also if this research will prove that orange peels and vinegar are enough. It would be very easy to do it and use it at home, so people will have to spend less on buying cleaning products with high toxic. The experiment will show if it really works on removing stains and rust. Scope and Limitation This experiment only covers fruit extracts (Oranges). And vinegars. Plants and animals are not involved in this experiment. This experimentation will only last for a week or so this only show and prove if the two can be used as an alternative remover of dirt and rust from clothes and steels. Definition of Terms Oranges- The orange (specifically, the sweet or sour oranges) are fruit of the citrus Orange Peels- It is the skin of an orange that can transform or turn to anything convenient Vinegars- is a liquid consisting mainly of acetic acid (COACH) and water. The acetic acid is produced by the fermentation of ethanol by acetic acid bacteria. Vinegar is now mainly used as a cooking ingredient, but historically, as the most easily available mild acid, it had a great variety of industrial, medical, and domestic uses, some of which (such as a general household cleanser) are still promoted today. Jar- is a rigid, approximately cylindrical container with a wide mouth or opening. Jars are typically made of glass, ceramic, or plastic. They are used for foods, cosmetics, dedications, and chemicals that are relatively thick or viscous. They are also used for items too large to be removed from a narrow neck bottle. Water- is a chemical compound with the chemical formula H 20. A water molecule contains one oxygen and two hydrogen atoms. Steel- is an alloy of iron and other elements, including carbon. Cloth or Thread (yarn) is a flexible woven material consisting of a network of natural or artificial fibers often referred to as thread or yarn. Yarn is produced by spinning raw fibers of wool, flax, cotton, or other material to produce long strands.

Saturday, October 19, 2019

Leadership & Motivation Research Paper Example | Topics and Well Written Essays - 1250 words

Leadership & Motivation - Research Paper Example The organizations are focusing on effective leadership strategies and motivation process to retain employees. Lack of motivation and self confidence level of an employee can affect the organizational performance. Therefore, the organizations are trying to fulfill the personal needs of an employee to achieve significance work performance. Leadership Effective leadership strategy is an important tool that helps an individual to achieve organizational objectives and goals by influencing or motivating other employees (Williams, 2008). Successful leadership strategy depends upon specific situation and environment involved in those dynamics. Leaders within an organization have to follow several pathways to fulfill organizational goals. Following theory will help the readers to examine different kinds of behavior of a leader. Path Goal Theory of House Robert House stated that most important activity of a leader is to clarify the pathway of different goals of interests to the employees and s ubordinates. Effective leaders always try to develop a connection between the organizational goal and subordinate goal. Major objective of a leader within an organization is to improve the group performance through several motivation processes. ... In participative behavior, leaders generally consult with the employees and subordinates and then consider their views and options. Leaders with achievement oriented behavior support and encourage the subordinates or employees to apply superior efforts. The leaders try to strive for a superior level of goal achievement (Chance, 2009). Achievement oriented leaders believe that their subordinates can accomplish the goals. The characteristics of subordinates and several environmental aspects effectively influence the success. Moreover, these create potential opportunity for the successful leadership. Motivation The leaders and the managers of an organization try to motivate their employees through several motivational strategies in order to accomplish the organizational goal. Individuals can be motivated by several external environmental factors like supervision, pay, job perks and job benefits. This motivation process is known as extrinsic motivation. Moreover, people also can be motiv ated by the effective relationship between the job task and workers. This motivation process is known as intrinsic motivation. Following motivation theories will help the readers to understand about several aspects of human needs. Hierarchy of Needs Theory of Maslow Abraham Maslow established a theory based on five sets of human needs that are effectively arranged in a hierarchy. These are physiological, safety, social recognition, self esteem and self actualization needs. Physiological needs include needs for water, shelter, clothing, money and food. Safety needs include stability, structured environment and job security. Social recognition needs include affection, love, socialization, friendship and companionship. Self esteem needs include

Friday, October 18, 2019

Late 20th century United States history Essay Example | Topics and Well Written Essays - 500 words - 1

Late 20th century United States history - Essay Example Truman operated on the policy of containment through war by proxy. This was due to the Truman doctrine that said that the United States would supply aid and weapons to those people in nations that were being threatened by communist pressures. In addition, the Truman administration made great use of the CIA, Central Intelligence Agency. This was in order to gain intel on the enemy and combat their espionage program, the KGB. Thus, the Truman administration took a far greater stance on containment than did any other president, most notably with the failed attempt in Vietnam. The Regan administration, seeing the response and failures of his predecessor, took a different route on containment. He was more in favor of peaceful coexistence, which was achieved through diplomatic channels. Rather than aiding forces directly with American troops, the Regan doctrine allowed the United States to supply enemies of communism with weapons and economic support. Because the United States had a stronger economy, Regan built up a nuclear stockpile in which the Soviets could not keep up. Ultimately, this along with other internal failures, lead to the fall of the Soviet Union and the survival of the world’s last superpower. Between the two presidents, there was a lot learned from the differing strategies on the policy of containment. Adaptive leadership helped the United States adapt and overcome obstacles, which lead to the fall of the Soviet

Military Action Essay Example | Topics and Well Written Essays - 250 words

Military Action - Essay Example There was a universal outcry of the acts and deeds of warlord Mohamad Farrah Aidid that needed immediate intervention. Acting on United Nations sanctioned mission therefore a group of United States soldiers invaded the city of Mogadishu. Eventually also, some positive results were recorded when the military action resulted in the prevention of Islamist terrorists from taking root: despite the fact that that was not the original humanitarian mission (Nasaw, 2009). The Black Hawk Down battle in Somalia also had its own negative results. Analysts have judged the outcome of that particular military action as one of the worse to have ever hit the United States army. Within a period of 17 hours, as many as 18 United States soldiers and 500 Somalis had fallen as victims of death in the battle. To a very large extent, much blame is put on more intelligence gathering and more strategic approach as the cause of the problem (WGBH educational foundation, 2012).there are many who hold the view that the United States army reacted rather to quickly to the call to go on that battle. By and large, leadership misappropriations may be cited as the cause of the failures that were associated with the military action in Somalia in

Mechanical Engineering Graduate School Personal Statement

Mechanical Engineering Graduate School - Personal Statement Example I have taken courses in advanced mathematics as well as engineering physics classes. I have also had research experience which is a critical component in master’s programs. In particular, I have been on two research projects dealing specifically with the construction of different types of robots and looking at the future of commercial production of robots for daily household use. I have also had experience in the industry as well. I worked at H.C. Starck Inc. as an intern where I learned essential skills that were important to work there, but also give me foundational knowledge going into the masters program. In particular, I learned about maintenance and quality control of the products produced as well as data basing. My goals are very compatible with your program in mechanical engineering. My short term career goal is to receive a position on or start managing an interdisciplinary research and development team. I believe that I can successfully accomplish this by focusing on research in the master’s program by facilitating cooperation in engineering teams as well as learning how to overcome engineering obstacles in research. Eventually, I would like to teach and become a professor of robotics or human factor engineering so that I can pass down the experience and knowledge that I have learned to the next generation of engineers.

Thursday, October 17, 2019

The challanges of adopting a multi-channel retail approach Essay

The challanges of adopting a multi-channel retail approach - Essay Example It is evident that the digital era fuelled novel business opportunities and the continuous evolution of online business channels have made multi-channel retailing a reality, with the customer now placed at the forefront of retail strategy (Jain, 2008). In turn, this has reshaped business distribution and marketing models. To this end, it is submitted as a central proposition in this paper that consumers increasingly dictate retail strategy and therefore CRM is vital as part of an integrated retail strategy to ensure that an organization keeps pace with the multi-channel retail model. Moreover, the central consideration should be given to the movement away from the conventional economics based approach to consider the benefit of integrating effective CRM into retail strategy. For example, Weinberg at al’s 2007 report into changing consumer behaviour highlights that approximately 65-70% of consumers fall within the category of â€Å"multichannel shoppers† and they increas ingly have the highest purchasing power. (Weinberg et al, 2007). As a result, Weinberg et al posit that it is â€Å"critical that organisations effectively employ a multichannel marketing approach, as consumers in B2C contexts now expect it† (Weinberg et al, 2007, p.385). The impact of multi-channel retailing has continued to grow and Retail Solutions Online highlight that industry research indicates that approximately 40% of sales will be attributable to the multi-channel model by 2012 (2009). Additionally, the Retail Solutions’ Online research indicates that the proliferation of the multi-channel retail model will continue to grow and as a result, retail business have to embrace the model as part of integrated retail strategy to compete in the marketplace (2009). Moreover, Vollmer and Precourt argue that the underlying basis for marketing is rooted in economic principles of exchanging goods for value (2008). It is precisely this concept of â€Å"value† that ha s been at the heart of marketing strategy in persuading consumers to exchange value for goods in conventional business strategy. However, as the business models continue to evolve in line with changing consumer habits and retail channels, Vargo and Lusch point to the fact that economical basis for traditional marketing strategy has been forced to adapt to remain relevant (2004). Additionally, Vargo and Lusch further refer to the arguments of Achrol and Kotler that the: â€Å"very nature of network organisation†¦..and the potential impact on the organisation of consumption all suggest that a paradigm shift for marketing may not be far over the horizon†

How would you describe your views on sex and sexuality Essay

How would you describe your views on sex and sexuality - Essay Example The essay "How would you describe your views on sex and sexuality" focuses on the view on sexuality and sex. In American culture, sex is not necessarily to be showed to a loved one, but can be merely a way to satisfy one's physical desires. However, I do not believe that sex can merely be used to fulfill a physical desire, like scratching an itch. The practice of sex outside the realms of marriage is considered to be a sin. Sex should be an emotional experience between loving, married couples and not between two compatible physical partners to show lust. Even if one grows up and experiences a want to be sexually content, the individual should wait for the right time to get married to fulfill his needs. Here I would like to state that when it comes to such activities the most important role is played by the society. If one is raised up in a conservative environment where such activities are considered a taboo before marriage then there are good chances that an individual will wait unt il marriage. Some societies, or basically the environment, in which people are raised do not allow any individual to stay with the opposite gender alone after they’ve reached puberty in order to keep distance and to maintain purity. This is a part of my culture and hence my belief. Hence, there is no way to explore the opposite gender and safe distance was maintained. These values are majorly uprooting from the religious and culture benchmarks one belongs to. Some sects believe that sexuality is only feasible after marriage.... At times being involved in sexual activities is considered to be a source of pride and manhood for the family and tribe. Moreover, Islam promotes sexuality after marriage and I side up with this view as a sexual relationship before marriage can lead to pregnancy and hence the birth of an illegitimate child. These days a fairly different concept has emerged with the increase in gays, lesbians and homosexuals. Today where freedom is given to each and every individual hence their sexual preference is also accepted. I personally would put forward that this act is going against nature and would never help to build up a normal life with normal children. One thing that needs to be highlighted here is that one cannot force another person to involve in sexuality without their consent. Strict laws are formulated throughout the world that deals with people who force, violate the dignity of another or involve in sexual activities with minors. In American culture Sex initially was considered to b e a sin and nobody on the front foot had the courage to be involved in such an activity but nowadays values have virtually died and one feels proud to call himself a 'non virgin'. Furthermore there is immense social pressure that has resulted in the widespread of sex related activities as those who do not follow the trend of exploitation are considered to be inhuman or incapable. (Teens and sex 2013) On the other hand the Middle Eastern culture still promotes chastity as they believe that a normal life cannot be lead without purity. Initially sex within marriage is to the process of reproduction and the purpose to initiate a family and enjoy the life, but sex outside the circle of marriage has become a trend and

Wednesday, October 16, 2019

Mechanical Engineering Graduate School Personal Statement

Mechanical Engineering Graduate School - Personal Statement Example I have taken courses in advanced mathematics as well as engineering physics classes. I have also had research experience which is a critical component in master’s programs. In particular, I have been on two research projects dealing specifically with the construction of different types of robots and looking at the future of commercial production of robots for daily household use. I have also had experience in the industry as well. I worked at H.C. Starck Inc. as an intern where I learned essential skills that were important to work there, but also give me foundational knowledge going into the masters program. In particular, I learned about maintenance and quality control of the products produced as well as data basing. My goals are very compatible with your program in mechanical engineering. My short term career goal is to receive a position on or start managing an interdisciplinary research and development team. I believe that I can successfully accomplish this by focusing on research in the master’s program by facilitating cooperation in engineering teams as well as learning how to overcome engineering obstacles in research. Eventually, I would like to teach and become a professor of robotics or human factor engineering so that I can pass down the experience and knowledge that I have learned to the next generation of engineers.

Tuesday, October 15, 2019

How would you describe your views on sex and sexuality Essay

How would you describe your views on sex and sexuality - Essay Example The essay "How would you describe your views on sex and sexuality" focuses on the view on sexuality and sex. In American culture, sex is not necessarily to be showed to a loved one, but can be merely a way to satisfy one's physical desires. However, I do not believe that sex can merely be used to fulfill a physical desire, like scratching an itch. The practice of sex outside the realms of marriage is considered to be a sin. Sex should be an emotional experience between loving, married couples and not between two compatible physical partners to show lust. Even if one grows up and experiences a want to be sexually content, the individual should wait for the right time to get married to fulfill his needs. Here I would like to state that when it comes to such activities the most important role is played by the society. If one is raised up in a conservative environment where such activities are considered a taboo before marriage then there are good chances that an individual will wait unt il marriage. Some societies, or basically the environment, in which people are raised do not allow any individual to stay with the opposite gender alone after they’ve reached puberty in order to keep distance and to maintain purity. This is a part of my culture and hence my belief. Hence, there is no way to explore the opposite gender and safe distance was maintained. These values are majorly uprooting from the religious and culture benchmarks one belongs to. Some sects believe that sexuality is only feasible after marriage.... At times being involved in sexual activities is considered to be a source of pride and manhood for the family and tribe. Moreover, Islam promotes sexuality after marriage and I side up with this view as a sexual relationship before marriage can lead to pregnancy and hence the birth of an illegitimate child. These days a fairly different concept has emerged with the increase in gays, lesbians and homosexuals. Today where freedom is given to each and every individual hence their sexual preference is also accepted. I personally would put forward that this act is going against nature and would never help to build up a normal life with normal children. One thing that needs to be highlighted here is that one cannot force another person to involve in sexuality without their consent. Strict laws are formulated throughout the world that deals with people who force, violate the dignity of another or involve in sexual activities with minors. In American culture Sex initially was considered to b e a sin and nobody on the front foot had the courage to be involved in such an activity but nowadays values have virtually died and one feels proud to call himself a 'non virgin'. Furthermore there is immense social pressure that has resulted in the widespread of sex related activities as those who do not follow the trend of exploitation are considered to be inhuman or incapable. (Teens and sex 2013) On the other hand the Middle Eastern culture still promotes chastity as they believe that a normal life cannot be lead without purity. Initially sex within marriage is to the process of reproduction and the purpose to initiate a family and enjoy the life, but sex outside the circle of marriage has become a trend and

ICT Analysis Case Essay Example for Free

ICT Analysis Case Essay For my ICT Coursework I am doing a data handling project based on a newly opened restaurant. This restaurant is called Fusion and it was opened on July 7th 2007. Fusion is located in Dubai on the Sheikh Zayed Road. The Manager is Mr. Hashmi. He has asked me to help him out with the data they have collected over the past few months. The reason for doing this is that Fusion has fast become a very popular restaurant. I intend to help them handle their data in order to continue this success. Firstly I am going to help them input their customer details. I then intend to interview Mr Hashmi to establish what more information I can investigate. My reasons for doing this is that it will make their restaurant more efficient as they will now have user friendly data on the computer. The advantage of this is that they can edit the data anytime they want and it will never be lost by anyone unlike data which is written down on paper. They now have more then 300 customers and they thought it was time to get someone to help them with their customer details as there customer base is expanding everyday. They want a user friendly system so it will be easy for their staff to use. They previously had a staff of 20 (front and back of house which has now increased to 40. So with an increased customer and staff base it makes economical sense to implement this database to continue the efficient running of the school. Project Input Processing Output Restaurant Customer Details (name and address) Booking Details (date, time, number in party, table number) Table details (table number, maximum number of people) Look up customer details. Add, Edit and delete booking details. Look up booking details. Search for available tables on a particular time. Search for bookings on a particular date. Booking details on screen. Lists of daily bookings. Letters to customers advertising special promotions and events. Consulting the users of the current system Questionnaire 1. Have you ever been to the new restaurant Fusion? o Yes o No 2. Do you like the new restaurant Fusion? o Yes o No 3. Please give your age ____ 4. Would you like to make any improvements to Fusion o Yes o No 5. If yes, what would you like to improve? 6. What do you feel is the strong point of the restaurant? 7. What do you feel is a weakness of the restaurant? Thats the end of the questionnaire! Thank you for taking the time to complete it. Interview for Mr. Hashmi 1. What information do you store on your data handling system which is currently being used? We use our current data handling system to store the customer details, booking Details and table details. 2. How and where do you store your information? We just write down all these details onto a form. We then file all of this into a filing cabinet into different folders. 3. What happens when new customers come to eat at the restaurant? We right down the customer details onto a form and store it into a filing cabinet. 4. How many customers have you had till now? We have had more than 300 customers coming to the restaurant right now. 5. What problems does the current system cause? There are a lot of problems with the current systems. It is very difficult and time consuming to look up customer names. Even more so it is a very difficult when we have to edit or change data and the data can be damaged as its only being written down on a piece of paper. Also its a waste of paper. Wasting paper is also not very environmentally friendly which is something that as a business we take very seriously. 6. What experience of using a computer do you have? I personally have had a lot experience of using a computer as we have one in the restaurant. However its not used to store information. It is mostly used for sending emails. I think many of my staff would find using computers difficult so therefore by implementing an easy and efficient data handling program would be ideal I have high hopes that my staff would get used to the system quickly therefore making the running of the restaurant more efficient. 7. What kind of storing system would you and your staff prefer? I personally think the staff would prefer a data handling system on the computer as they will only have to learn it once and it would be really easy to use. 8. How much money are you willing to spend on developing a new system? We are willing to invest as much is needed to acquire the perfect data handling program as I am aware that it will ultimately benefit the running of my business. Thus improving profits in the long run. 9. What are some of the advantages of the current system you are using? Well I think the one advantage is that everyone can easily use the current system as there is no practice needed for it. 10. If there was one improvement you would make to the current system what would it be? I would like to change and make the current system easier to use for example I would like to be able to access a customers details quicker and more effectively. Describing the current system The current data handling system used in the Fusion restaurant is just a filing system and is not a digital application program on the computer. Unlike, the other restaurants where they all have a digital application program. The real end user of this system is the staff at the Fusion restaurant. They use a lot of their time organising, collecting, storing, entering, sorting and finding all the data and making sure its in order, neat and ready for the next day. They have to Look up customer details, add customer details, edit them and delete booking details from the data handling system currently being used. This information is presently being filed into filing cabinets. This information is used to keep up-to-date with all the bookings being made and to know if the restaurant is full at a time or empty. The current system has a few advantages. These are a few advantages for the current filing system. These are some of the advantages for using the current system: * The current filing system is very easy to use and everyone can use it no matter how experienced they are * The current filing system much is cheaper then having a computer application program made for the restaurant itself. * It is also very easy to produce the forms as it is just paper and questions that have been printed. This is very easy task for the restaurant but if the customer number increases higher it will be impossible for the system to work in order. * This filing system will never break down and have to go in for repairing unlike an application program, which might have to go in for repairing because of technical problems or damage. * The data wont get lost due to technical fault however through human error it can be misplaced but not every detail of the every customer will not be lost. But if the datas on the computer and it gets damaged all of Fusions information can be lost. To prevent this they will have to keep back up files. Problem Description This project will aim to solve the data-handling problems of the new restaurant called Fusion. This is a restaurant where a variety of foods are served. To do this work and provide these services customer details (name and address), booking Details and table details are collected and stored in filing cabinets. For the current system the data is collected by asking the customers their details over the phone or in person. This current system has a few disadvantages. These are some of the disadvantages for using the current system: * Its very time consuming to use. When the staff wants to find a particular file it takes them an unesccerray long time to go through all the folders and find the file they needed. This is also waste the customers time as they can become very impatient waiting for their file to be taken out. * The current system is also a waste of paper because when a new customer comes in they have to fill in a form or if a customers form is misplaced they will have to fill it in again which will cause inconvenience for the customers and the staff at the Fusion Restaurant. Making the restaurant look incompetent. * The current system also takes up a lot of storage space, which is eventually going to run out as they are going to get more and more new customers everyday. * If a customer wanted to edit their details the staff may find it really difficult to edit it and update information, as it is on paper and will have to be crossed out. This will also be very untidy and not very eye catching. * Also, if one member of staff fills up one form and another member of staff has to use it the next day it will be very hard to understand some peoples handwriting. This may cause inconvenience for the customer. * The system which is being used now can also be damaged as it is just ordinary paper and can be ruined easily by water, tea or coffee. * Another issue is if the original form which was filled previously is misplaced the customer will have to fill another form. This is very frustrating and annoying for the customers. Possible solutions There are a lot of possible solutions for all the problems. These are some of the most sensible and important solutions: * They could employ more staff as part of the staff can only organise all the files in the filing cabinet, but this has a disadvantage as it is very expensive to hire more staff and it might cause confusion among the other staff because of so many people working in one restaurant. * They can also have different filing cabinets for different customers in alphabetical order. This will make it easier for the staff to find the files as they can just go to the filing cabinet for the people whose name began with an A for example. * They can also have a different filing cabinet for bookings and reservations for the day. As this will help the staff, because they can go and check the reservations as they will know which filing cabinet the information is in. * They could also have a data handling system made as this will save their time, will be user-friendly, it will also make files a lot easier to locate and there will be no misspellings in this system. This is also saves on the storage space that would have been used previously for storing all the files. Chosen Solutions I have chosen the best chosen solution for solving the problem that Fusion is currently facing. I think the best solution for this problem is to use an application program which might not be specifically made for storing data from restaurants but can be customised to what the restaurant needs in its data handling system. Some of the advantages of this solution are: * This application program will be able to save all the data from fusion restaurant, with no misspellings and it will also save a lot of storage space. * Also the data cannot be misplaced to anywhere as it is on the computer and as long as the staff press the save button none of the data can be lost. * The data saved on the application program can be edited easily and will still be neat unlike the current system that is being used at Fusion. * The application program wont be time consuming as data can be found within approximately 45 seconds rather then the current system which might take more then 15 minutes. * The application program will also save a lot of paper and ink as the system will be fully digital and wont need to be printed onto paper. * The handwriting in the current system is very hard to read as different people fill out different forms, but with an application program everything will be typed in so this will make the writing very easy to read and understandable for all members of staff. * This might take some training for people who arent familiar with computers but in the long run it is better for the restaurant itself as it is a very modern restaurant and so should have a modern data handling system like the bigger and more established restaurants. System objectives There are a few system objectives for this application program as these will help improve the service provided by the application program. The system objectives for this application program are: * It should allow the staff at the Fusion restaurant to edit customer details as neatly as possible. * Allow me to find customer bookings quicker then the current filing system being used at Fusion. * Allow the staff at Fusion to find customers easily, so they can attend other customers. * The application program should be easy to use. * It also allows the staff to get in touch with the customers which is a positive thing for the restaurant. * The application program should be able to display information fast so it doesnt cause any inconvenience for the staff or the customer. * It should be able to quickly delete customers as when they had filing cabinets they had to find the folder which had to been thrown out. Performance criteria The performance criteria is linked to the system objective as it is just a more detailed explanation about the system objectives. The performance criteria for the application program are: * The system should allow the staff to easily change customer details without time constraints. * It should also allow me to find customer bookings without any problems in about 45 seconds. * The application program should also allow me to find customers easily without showing me other customers and customer details. * It should be easy to use so people without any ICT skills can use it easily too. * It should also allows the staff to get in touch with the customer as pictures can be added to the application program so this shows a clear picture of how the customer looks like. * It should also display information faster, in about 45 seconds for the maximum. * It should be able to quickly delete customers as when they had filing cabinets they had to find the folder which had to been thrown out. This is more efficient and environmentally friendly so therefore no paper is being wasted and also increases the speed of data being processed. Current resources Fusion has a PC even though not used for data handling it is used for emailing customers about current offers and information about Fusion. The current resources that are being used now at Fusion restaurant are: * A Flat screen which is 15 inches in size and has a Screen Resolution of 1280 x 800. * It runs on Windows XP and has the software Microsoft office 2000 right now which is quite old and doesnt have a lot features. * It is of the brand Samsung, which is quite popular for PCs. * The internet connection is DSL, which is faster than the normal internet connections available. Hardware The hardware in a computer is equipment involved in the function of a computer. Computer hardware consists of parts that can be physically handled. The functions of these components are usually divided into three main categories: input, output, and storage. Software Computer software is a general term used to describe a collection of computer programs, procedures and documentation that perform tasks on a computer system. The term includes application software such as word processors which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, and middleware which controls and co-ordinates distributed systems.

Monday, October 14, 2019

Paternalism To Tell Or Not To Tell Nursing Essay

Paternalism To Tell Or Not To Tell Nursing Essay Mr. White is a 70 year old male patient who has been pretty healthy throughout his whole life besides some issues with pneumonia in the past few years. He was driving along the road last Monday where he hit a patch of black ice, swerved off the road, and crashed into a tree. He lost consciousness and suffered minor abrasions to his arms, legs, and face. When he regained consciousness, he stated he felt very cold, numb, and fatigued as several paramedics hovered over him placing a collar around his neck and a spinal board underneath him. He was very confused and was told to not move as they oriented him to person, place, and time. He was taken to the emergency room where he was placed him on oxygen via face mask and D5 Â ½ normal saline 100ml/hr. He was transferred to the ICU after lung complications and a tracheotomy was inserted to open his airway and allow for oxygen exchange. Each day his family has been at the hospital supporting him and praying he will recover from this severe accident. The nurse caring for him was reviewing his medical records and saw that he is a do not resuscitate patient and that he does not want to receive any life sustaining treatments that will prolong his life. The patient has been awake, alert, and oriented and confirmed competent two days ago, which enables him to make decisions for himself. His daughter, Mrs. Black, told the nurse that she doesnt know what she would do without her dad because he is the rock that holds their family together. The rest of the family replied that these are his wishes and we will have to accept what he has requested, even though it saddens us to think we may lose him soon. During a routine test a few days ago the physician noticed that his labs were not within normal limit and ordered stat tests to determine the problem. The chest x-ray ordered confirmed he had pneumonia, but also revealed he was suffering from metastatic lung cancer. The physician informed the nurse of the cancer and stated that Mr. White is still very weak and fighting for his life. We will inform him and his family when he is more stable and able to be strong enough to take the news. Identify the Problem The nurse is informed of the confirmation that the patient indeed is suffering from cancer secondary to his car accident and pneumonia. Does she advocate for the patients right to autonomy in delivering the news to him and his family or does she follow the doctors orders and withhold the news since the physician believes that telling him will only worsen his condition and result in a loss of hope for all involved? The nurse believes that withholding information is going against the patients rights to make his own decisions. The nurse wants to do what is best for the patient and believes that keeping this information from the patient is being dishonest and is not what any practical nurse would do in this situation. However, she is unsure of the best approach in addressing the issue. Gather Relevant Facts A sound doctor-patient relationship is an essential component when carrying out decisions based on a patients care for treatment. Studies have shown a correlation between the quality (communication) of physician-patient relationship and better (healthcare) outcomes (Stewart, 1995). The doctor and the patient need to have a strong relationship with the patient that includes sound communication, fidelity, knowledge based learning, beneficence, and Nonmaleficence. There are four different styles to a doctor-patient relationship which include consumeristic, default, paternalistic, and mutuality relationships. The mutualistic approach is considered the optimal relationship to have when both the patient and the doctor bring both of their ideas and resources to the table and make a commitment to work with one another to solve disagreements in a respectful way. Paternalism involves physician focused care because the decision is based on what the physician believes is best for the patient and not necessarily what the patient wants. In the scenario, the physician believed that it would be in Mr. Whites best interest to hold off telling him the news of his cancer until he was healthier and stronger, but this might not have been what Mr. White would have decided (Roter and Hall, 2006). At the beginning of the 1960s, medical procedures were beginning to address the ethical issues with paternalism by a patients right to autonomy and informed consent. Issues with paternalism began to arise due to an increase in consumerism, the womens movement, and laws passed that allowed for the rights of patients in their health care. The patients wanted to be more involved in their care in knowing about their health, quality of life, survival, and mortality rates of their condition. As a result, a physicians violation in duty to the patient caused an increase in lawsuits. Healthcare workers began to be faced with a difficult decision in determining what pertinent information the patient needed to know about their condition (Wear, 1993; Charles, Whelan, Gafni, 1999). Legal and more paternalism were in conflict from the example used with Mr. White. Legal paternalism base decisions around following laws and regulations created by federal, state, or local level while moral paternalism base decisions using ethical principles. The physician was going against legal paternalism because truth-telling is now considered a legal matter and the competent patient is to be informed of all matters related to their health, except if the patient is deemed incompetent. The physician was trying to practice moral paternalism because he believed that withholding the information from the Mr. White was beneficial in a sense that he would not be strong enough to handle the news of his cancer and cause his condition to worsen or not improve (McCarthy and Schafermeyer, 2004). The debate today about paternalism is whether it is acceptable for doctors to make choices about patients treatments in their health care when they may believe that the patient may possibly refuse the decision if they were correctly informed. Is it justifiable for doctors to go about the treatment since they feel the long term benefits to the patient would be provided and at some point the patient would concur that the actions of the doctor were suitable? Certain situations makes it challenging to know exactly what is best for the patient, and it is hard to know when a physician is carrying out an intervention that is in the patients best interest or their own interest. Mills is a strong believer of autonomy and fights for patients rights. He believes that each individual has the ability to identify what makes them happy and that independent exercise of aspirations is a large part of their happiness. Kant also supports patients rights and believes that every human has a responsibilit y to communicate their autonomy. (McKinstry, 1992). The Patient Bills of Rights of 1973 included the physicians responsibility to inform the patient on all matters related to their condition enabling the patient to make decisions based on this knowledge. The Bill was carried out to decrease the occurrence of malpractice by reducing the dissatisfaction of patients that meet the criteria for more liability from their providers (Faden and Beauchamp, 1986). The law entails that medical information presented to the patient be in plain language that can be voluntarily comprehended and adequate in quantity. A doctor who is unsuccessful in attaining informed consent may suffer criminal offense charges. In 1998, the Consumer Bill of Rights and Responsibility Act was carried out by President Clinton to help consumers get involved in their own health care by increasing consumer confidence in the health care system, to give support in identifying the reasoning for a sound healthcare provider and a sound provider-patient relationship, and to help the consumer realize the important role they carry related to their rights and responsibilities of their heath care and recovery. The guidelines included several rights of the patient to create the best quality health outcome. (Shalala,1999). Patients are competent to give informed consent unless examined and evaluated to have mental deficits and incapacity. Informed consent must follow several steps in order to be valid which includes informing the patient on the diagnosis, the suggested intervention, major benefits, risks, the consequences or prognosis if an intervention is not carried out, and any significant options along with their risks and benefits. Informed consent will need to hold true and be carried out in all cases except when the patient is susceptible to serious harm or death if the intervention is not carried out immediately, the patient voluntarily gives up their right, and if disclosure would cause serious physical or psychological harm to the patient or another person (Wear, 1993). At UPMC hospitals such as Magee and Presbyterian hospitals patients have certain rights and responsibilities that they are given such as the right to respected and quality care from staff, the right for information in medical records to be kept confidential, the right to pain control and management, the right to know diagnosis, prevention, and treatment options and alternatives given in simple language, the right to informed consent before any procedures, the right to refuse any medications, treatments, procedures, and several more . This allows the patient to decide what information they would want to know and to carry out care based on their wishes (UPMC, 2010). Identify Methods of Ethical Justification A person who practices consequentialism believes that a morally right act is one that produces a good outcome. The doctor was practicing a consequentialitic approach in that he believed that not telling the patient that he had cancer until he was stronger would cause a better outcome for the patient in the long run. He believed that Mr. White would give up all hope and stop fighting to survive if he was informed of the news. In deontological theory, an act is right or wrong based on fulfilling a moral duty and cannot be justified by their effects. Even though the physician was trying to do the right thing by not telling the patient that he had cancer because he believed that this would help save his life, the act was against the rules and duty of the physician to inform the patient on information related to his health (Gert et al., 1997). Several principles come into play in the scenario such as beneficence, nonmaleficence, fidelity, and autonomy. The nurse will have to advocate for the patient that keeping this information from him and is family is not doing good. It may in fact cause more harm to the patient since he is unaware of his cancer. The patient may be able to determine treatments that could delay the spread of cancer, which could allow him more time to spend with his family. The competent patient has the right to autonomy in deciding what information he would want to know about his health and the doctor should not be the one to make this decision. The physician is keeping essential information from Mr. White that may result in a break in their commitment and destroy the patients trust in his healthcare provider (Cassells and Gaul, 1998). Clarify Relevant Values, Rights, Duties, of Patient, Self, and Significant Persons The patient has the right to informed consent if he is seen as competent to make decisions based on his healthcare. It is the physicians duty as well as the nurse to respect the patient and inform him of all matters concerning his healthcare and making sure the patient demonstrates understanding. If Mr. White was deemed incompetent he may have appointed a family member as a substituted surrogate decision maker to make decisions in his health care based on the patients values, beliefs, and wishes. If Mr. White did not appoint someone to be a surrogate then the best interest principle would come to play and decisions on the patients healthcare would be determined by what is the best interest for any reasonable patient in this situation. The family will need explanations on the patients status and what the future will look like for him. The family may be the ones taking care of him and they will need sound education on how to care for the patient. Identify If There Is an Ethical Dilemma The nurse faces an ethical dilemma because the alternatives are between two equally insufficient solutions which display incompatible testimonies. Does the nurse take away the patients right to autonomy in keeping Mr. Whites new diagnoses of lung cancer from the him because the physician believed it was in the his best interest or should the nurse take the issue to higher authority to advocate and make every effort to protect the health, safety, and rights of the patient (Cassells and Gaul, 1998). Identify Guidelines from Nursing and Professional Codes of Ethics The American Nurses Association code of ethics for nurses was created to help guide nurses behavior when an ethical dilemma would occur. The requirements in the code advocate the nurses commitment to their patients autonomy, while still keeping in the safety of the patient (American Nurses Association, 2001). Provision 1 states that the nurse needs to practice with compassion and respect each patient regardless of their beliefs, ethnicity, class, age, etc. The patient was a 70 year old African American who was a practicing Southern Baptist and retired bus driver. The Caucasian, Catholic nurse had to make sure she didnt treat Mr. White differently because of his skin color, the religion he practiced, or his age (American Nurses Association, 2001). Provision 2 states that the nurses devotion is to the patient and anyone associated with the patient such as family and friends. The nurse has the ability to advocate for the patient in communicating their wishes to the doctor in carrying out treatment pertaining to his care. The nurse will need to communicate with the patient and determine what information the patient will want specific friends and family to know. The nurse with her high level of skill and knowledge can help educate his family on his condition and care (American Nurses Association, 2001). Provision 3 states the nurse will need to do all she can to protect the patient from any harm or unsafe events. The nurse would make sure the patients requests were followed through while maintaining his safety, health, and prevention from any harm. If she believed that the patient was not well informed of his disease and all treatment plans possible to help delay the progression of the disease, then she would need to address this issue (American Nurses Association, 2001). Identify and Use Relevant Interdisciplinary Resources First, the nurse should go to the doctor and see if they can work something out to determine the patients rights. If the doctor doesnt agree with the nurse then the nurse should then talk to the nurse supervisor and move up the latter until the highest person is able to confront the issue. If this does not work, the nurse can also get in touch with the people who deal with ethical concerns/ dilemmas. The nurse can also talk to lawyers and get legal matters in place for the patients rights to informed consent to be granted. The nurse can also get a psychiatrist involved who would speak on behalf of the patient to confirm that the patient is competent. The nurse may want to get social workers and counselors to help the patient and family finds ways to cope with grief and also determine the best care for the patients prognosis of his such as a skilled facility, home health, or hospice care. Identify and Prioritize Alternative Actions/Options The nurse can speak directly to the patient and his family about the information that has been withheld. This should not be carried out since this is not solving the conflict between the nurse and the physician and it is going behind the physicians back. The nurse can make the decision of not informing the patient or family of the news. She could convince herself that the doctor knows what is best for the patient and bringing up the issue would only cause chaos. This is also going against the code of ethics of a nurse in her lack of being a patient advocate (ANA, 2001). The nurse could talk with the physician about the issue she has with the patients right to autonomy and try to work out their differences. Communication is essential for the nurse and the physician to have a sound relationship and work together to resolve issues. If the doctor believes this is something Mr. White does not need to know right now, then the nurse will have to take the issue to higher authority which was addressed above (nurse supervisor, the ethics committee, social workers, court system and reference hospital policy, legal, and ethical principles on the matter). The nurse can be there for moral support and help build a trusting relationship with the Mr. White when told of the new diagnosis of cancer and the betrayal from his doctor. The patient may feel hurt, confused, angry, and may have lost trust in the health care providers. The nurse can also talk to the family about the matter as well and offer all the alternative treatments that can be carried out to help the patient decide what is best for Mr. White. This can be carried out but only after the patients rights are addressed. Select a Morally Justified Action/Option from Alternatives Identified The nurse will have to make a decision as to what she feels any reasonable nurse would do in this situation and carry out the patients wishes accordingly. She will need to advocate for his rights in decision making and converse with the physician. If this doesnt get resolved then take it to higher authority. The nurse needs to address the patients wishes and needs and then the families. If Mr. White determines that he does not want to carry out any treatments, then his wishes need to be addressed. If he decides he wants to start treatments immediately for his cancer, then these wishes would need to be followed through. The nurse talked with the physician about the issue, but the problem was never resolved. As a result, nurse took the matter into her own hands and talked with the nurse supervisor who confronted her boss and the case was then taken to court. The judge along with the help of the jury determined the patient must know all information related to his health care and he was properly informed of his cancer. Mr. White understood that his cancer was terminal and that he decided that he only wanted palliative means of care. He wanted to remain comfortable and spend the rest of his time with the people he loved dearly. The family agreed on his decision because they knew this was what he wanted. He was able to make decisions based on his care and was content at being in control one thing in his life. He was given quality care by his nurse and he remained comfortable throughout his illness. Mr. White passed away peacefully 3 months later at home surrounded by his family.

Sunday, October 13, 2019

Whos The Boss? Essay -- essays research papers fc

Who’s The Boss?   Ã‚  Ã‚  Ã‚  Ã‚  A typical relationship between an employee and an employer exists on the acknowledgment of who is in charge; an employee must accept the employer as an authority. A worker should address the employer with a certain amount of respect and professionalism. An employer should have control of their employees and make it clear that they are the boss.   Ã‚  Ã‚  Ã‚  Ã‚  In David Mamet’s play Glengarry Glen Ross, however the relationship between the employees and the employer is extremely atypical. There is no correlation to what is believed to be the norm. The language Mamet uses in the play makes the peculiar relationship believable. The arguing and resentment can be felt be the reader. The employees in this particular office have â€Å"forgotten† who the boss is; they do not speak to him with any respect or dignity. The employer accepts the way he is treated and does not stand his ground; he allows his employees to walk all over him. This office is not the kind of work place where the boss has the last word; there are numerous times throughout the play where the boss and his employees actually fight. The relationship between one of the employees, Shelly Levene, and his employer, John Williamson, reflects this abnormal relationship. Williamson is the boss, or manager of this particular branch of a real estate company, he does however have two bosses, Mitch and Murray. The play begins with Williamson making an announcement regarding the jobs of all of the employees in the office. There is a contest beginning to see who could close the most deals. Whoever won would win a car and whoever lost would be fired. In the following conversation between Williamson and Levene, the two are discussing whom the good leads are going to. Levene has told Williamson that without the good leads he will not be able to close, in which case, he will be fired. Williamson has said that he has to give the leads to the closers and that Levene has not been a closer. I pick up the conversation after many pages of arguments, Williamson agreeing to Shelly’s bribe and right when Shelly is asking for two l eads.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"WILLIAMSON. I’m not sure I have two.   Ã‚  Ã‚  Ã‚  Ã‚  LEVENE. I saw the board. You’ve got four†¦   Ã‚  Ã‚  Ã‚  Ã‚  WILLIAMSON. I’ve got Roma. Then I’ve got Moss†¦ LEVENE. Bullshit. Th... ...n’t agree with this and believes that it is Williamson giving the orders and that if Williamson were to call up Mitch or Murray they would tell him to follow whatever Levene says. Williamson is a timid man. He does not like confrontation. Whenever Shelly or anyone began to yell at him he would just walk away. Shelly is an older and somewhat outspoken man; he knows that Williamson is timid and therefore talks the way he does to him. Shelly is feeling the pressure of the younger men taking his role as the best. All of the stress and pressure in the office causes everyone to be on edge. I think that Williamson is a bit more understanding because he realizes that Shelly’s job is being threatened. All of these pressures and feelings cause Williamson and Levene to resent each other. The language used by Mamet to portray all of this really makes the reader feel the stress and tension in the office. The reader can hear the arguing and disagreeing. The extreme language helps the reader understand the lack of control in the office as well as the atypical behavior between an employee and employer. Works Cited 1. Mamet, David. Glengarry Glen Ross. New York: Samuel French, Inc., 1982. Whos The Boss? Essay -- essays research papers fc Who’s The Boss?   Ã‚  Ã‚  Ã‚  Ã‚  A typical relationship between an employee and an employer exists on the acknowledgment of who is in charge; an employee must accept the employer as an authority. A worker should address the employer with a certain amount of respect and professionalism. An employer should have control of their employees and make it clear that they are the boss.   Ã‚  Ã‚  Ã‚  Ã‚  In David Mamet’s play Glengarry Glen Ross, however the relationship between the employees and the employer is extremely atypical. There is no correlation to what is believed to be the norm. The language Mamet uses in the play makes the peculiar relationship believable. The arguing and resentment can be felt be the reader. The employees in this particular office have â€Å"forgotten† who the boss is; they do not speak to him with any respect or dignity. The employer accepts the way he is treated and does not stand his ground; he allows his employees to walk all over him. This office is not the kind of work place where the boss has the last word; there are numerous times throughout the play where the boss and his employees actually fight. The relationship between one of the employees, Shelly Levene, and his employer, John Williamson, reflects this abnormal relationship. Williamson is the boss, or manager of this particular branch of a real estate company, he does however have two bosses, Mitch and Murray. The play begins with Williamson making an announcement regarding the jobs of all of the employees in the office. There is a contest beginning to see who could close the most deals. Whoever won would win a car and whoever lost would be fired. In the following conversation between Williamson and Levene, the two are discussing whom the good leads are going to. Levene has told Williamson that without the good leads he will not be able to close, in which case, he will be fired. Williamson has said that he has to give the leads to the closers and that Levene has not been a closer. I pick up the conversation after many pages of arguments, Williamson agreeing to Shelly’s bribe and right when Shelly is asking for two l eads.   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"WILLIAMSON. I’m not sure I have two.   Ã‚  Ã‚  Ã‚  Ã‚  LEVENE. I saw the board. You’ve got four†¦   Ã‚  Ã‚  Ã‚  Ã‚  WILLIAMSON. I’ve got Roma. Then I’ve got Moss†¦ LEVENE. Bullshit. Th... ...n’t agree with this and believes that it is Williamson giving the orders and that if Williamson were to call up Mitch or Murray they would tell him to follow whatever Levene says. Williamson is a timid man. He does not like confrontation. Whenever Shelly or anyone began to yell at him he would just walk away. Shelly is an older and somewhat outspoken man; he knows that Williamson is timid and therefore talks the way he does to him. Shelly is feeling the pressure of the younger men taking his role as the best. All of the stress and pressure in the office causes everyone to be on edge. I think that Williamson is a bit more understanding because he realizes that Shelly’s job is being threatened. All of these pressures and feelings cause Williamson and Levene to resent each other. The language used by Mamet to portray all of this really makes the reader feel the stress and tension in the office. The reader can hear the arguing and disagreeing. The extreme language helps the reader understand the lack of control in the office as well as the atypical behavior between an employee and employer. Works Cited 1. Mamet, David. Glengarry Glen Ross. New York: Samuel French, Inc., 1982.

Saturday, October 12, 2019

marketing concept Essay example -- essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  The marketing concept is a managerial philosophy that an organization should try to satisfy customers’ needs through a coordinated set of activities that also allows the organization to achieve its goals. The marketing concept strives to satisfy customers by determining what buyers want and then by using that information. Businesses also have to alter, adapt, and develop new products to continue earnings profits. By being customer oriented, objectives of a business, such as, increasing profits, market sharing, sales, or a combination can be achieved. This philosophy is aimed at helping the customers, but if the customers’ objections are not met the business may not stay open very long.   Ã‚  Ã‚  Ã‚  Ã‚  The local business that I have visited is Table D’Art, which is located in Roslyn Heights on Glen Cove Road. The store sells many unique and elaborate items that could be given as gifts or for your own home. Although they are luxury items they are a good asset to a home. There were also more types of products that may appeal to customers more. I have been here before and noticed that they have many new and unique items.   Ã‚  Ã‚  Ã‚  Ã‚  The store is located in a very nice area, and the shopper’s usually have a lot of money to spend on nice things. This is what the buyer’s...

Friday, October 11, 2019

Dtmf Remote Appliance Control System Using Mobile Phone

CHAPTER 1 INTRODUCTION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† is used to control appliances which are far away from the user using mobile phone. The aim of the proposed system is to develop a cost effective solution that will provide controlling of home appliances remotely and enable home security against intrusion in the absence of homeowner. The devices connected as home and office appliances consume electrical power and they should be controlled as well as turn on /off if required. Most of the time, it was done manually. Now it is a necessity to control devices more effectively and efficiently at anytime from anywhere. Take an instant when we are going to office and suddenly remembered that to switch off the microwave oven we fell convenient if we could switch off without going back to home, in such situations this project comes to our rescue. In this system, we are going to develop a cellular phone based home/office appliance controller for controlling arbitrary devices. This includes a mobile phone which is connected to the system via head set. To activate the mobile phone unit on the system, a call is to be made and as the call is answered (auto answer mode), in response the user would enter a password to access the system to control devices. As the caller presses the specific button on the keypad, it results in turning ON or OFF specific device and the device switching is achieved by relays. In this project, we designed a basic model and it is used to control 4 lights using a mobile phone, micro-controller and transceiver. The maximum number of devices that can be operated will be the number of buttons present on the keypad of mobile phone. . 1 Block diagram: Figure 1. 1: Block Diagram Fig 1. 1 represents the block diagram of DTMF Remote Appliance Control System using Mobile phone, used to control the appliances present at a distance. Brief Description of Hardware Modules: The DTMF Remote Appliance Control System consists of 1. Mobile Phone 2. MT8888 DTMF Transceiver 3. Philips 89C51 Micro-controller 4. Liquid Crystal Dis play 5. Power Supply Unit 6. Relay Driver 7. Relays 8. Devices 1. 2. 1 Mobile Phone: Mobile Phone is used as a media to instruct the micro controller to power ON/OFF the appliances. The mobile phone used here is Nokia 6030 as it has the required features and is interfaced with the transceiver through ear phones. 1. 2. 2 MT8888 DTMF Transceiver: The MT8888C is a monolithic DTMF transceiver with call progress filter. The transceiver consists of transmitter and receiver. The DTMF signals are transmitted through transmitter and they are received by the mobile phone and decoded using a DTMF receiver/decoder IC’s. 1. 2. 3 PHILIPS 89C51 Micro Controller: The PHILIPS 89C51 is a low cost micro-controller. It has a 40 pin configuration and contains non volatile Flash memory of 64KB which is both parallel programmable and serial in system programmable memory. 1. 2. 4 LCD display: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80 byte DD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. 1. 2. 5 Power Supply Unit: The power supply unit is used to provide a constant 5V supply to different IC’s. This is a standard circuit using external 12V DC adapter and fixed 3-pin voltage regulator. Diode is added in series to avoid reverse voltage. 1. 2. 6 Relay Driver: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance, we may use two transistors to form a darling ton pair and this pair in CC configuration provides input impedance as high as 2Mohms. 1. 2. 7 Relays: Relays are remote control electrical switches that are controlled by another switch, such as a horn switch or a computer as in a power train control module. Relays allow a small current flow circuit to control a high current circuit. 1. 2. 8 Devices: The devices can be micro-wave oven, bulbs, fans, air cooler, etc which are far away from the user. The micro-controller plays the intelligent part in controlling these devices. 1. 3 Working: This project is used to control the appliances present at a distance using a mobile phone. The first step is the user should make a call to the mobile phone, which is in auto answer mode and thus call gets connected. The user presses the digits present over the keypad of his phone for controlling the appliances present at home or office. Whenever a button is pressed a tone is generated and it is transferred to the mobile phone present in the home or office, which is interfaced with the DTMF transceiver. The DTMF receiver decodes the tone generated and it activates the controller accordingly. The controller operates the devices according to the coding set by the user. The status of the devices whether they are ON/OFF is indicated in the LCD. CHAPTER 2 MT8888 DTMF TRANSCEIVER Introduction: The MT8888C is a monolithic DTMF transceiver with call progress filter. It is fabricated using CMOS technology and it offers low power consumption and high reliability. The receiver section is based upon the industry standard MT8870 DTMF receiver, while the transmitter utilizes a switched capacitor D/A converter for low distortion, high accuracy DTMF signaling. Internal counters provide a burst mode such that tone bursts can be transmitted with precise timing. A call progress filter can be selected allowing a microprocessor to analyze call progress tones. The MT8888C utilizes an Intel micro interface, which allows the device to be connected to a number of popular microcontrollers with minimal external logic. The applications of DTMF transceiver include credit card systems, paging systems, repeater systems, interconnector dialers, mobile radio and personal computers. In our project, it is used for decoding the tone generated by the user when he presses a button of the keypad. After decoding the tone, it is given to the microcontroller for controlling the appliances. Features: The features of MT8888 DTMF transceiver include: 20 pin DIP package Central office quality DTMF transmitter/receiver Low power consumption High speed Intel micro interface Compatible with 6800 microprocessors Adjustable guard time Automatic tone burst mode Call progress tone detection up to -30dbm Microprocessor port Pin Diagram & Description: Figure 2. 1: DTMF Pin Diagram Figure 2. 1 shows the pin diagram of MT8888 and the description of the monolithic IC is as shown in the following table 2. 1. Table 2. 1: Description of Pins of DTMF Transceiver Pin NoNameDescription 1IN+Non-inverting op-amp input 2IN-Inverting op-amp input. 3GSGain Select. Gives access to output of front end differential amplifier for connection of feedback resistor. 4VrefReference Voltage output (VDD/2). VSSGround (0V). 6OSC1DTMF clock/oscillator input. Connect a 4. 7M? resistor to VSS if crystal oscillator is used. 7OSC2Oscillator output. A 3. 579545 MHz crystal connected between OSC1 and OSC2 completes the internal oscillator circuit. Leave open circuit when OSC1 is driven externally. 8TONEOutput from internal DTMF transmitter. 9WRWrite microprocessor input. TTL compatible. 10CSChip Select input. Active Low. This si gnal must be qualified externally by address latch enable (ALE) signal. 11RS0Register Select input. TTL compatible. 12RDRead microprocessor input. TTL compatible. 3IRQ/CPInterrupt Request/Call Progress (open drain) output. In interrupt mode, this output goes low when a valid DTMF tone burst has been transmitted or received. In call progress mode, this pin will output a rectangular signal representative of the input signal applied at the input op-amp. The input signal must be within the bandwidth limits of the call progress filter. 14-17D0-D3Microprocessor Data Bus. High impedance when CS=1or RD=1. TTL compatible. 18EStEarly Steering output. Presents logic high once the digital algorithm has detected a valid tone pair (signal condition). Any momentary loss of signal condition will cause ESt to return to a logic low. 19St/GTSteering Input/Guard Time output (bidirectional). A voltage greater than V ts detected at St causes the device to register the detected tone pair and updated output latch. A voltage less than V tst frees the device to accept a new tone pair. The GT output acts to reset the external steering time-constant; its state is a function of ESt and the voltage on St. 20VDDPositive power supply (5V typical). 2. 4 Functional Description: The MT8888C Integrated DTMF Transceiver consists of a high performance DTMF receiver with an internal gain setting amplifier and a DTMF generator which employs a burst counter to synthesize precise tone bursts and pauses. A call progress mode can be selected so that frequencies within the specified pass band can be detected. The Intel micro interface allows microcontrollers, such as the 8080, 80C31/51 and 8085, to access the MT8888C internal registers. The block diagram of DTMF transceiver is as shown in figure 2. 2. Figure 2. 2: Block Diagram of DTMF Transceiver 2. 5 Call Progress Filter: A call progress mode using the MT8888C can be selected allowing the detection of various tones, which identify the progress of a telephone call on the network. The call progress tone input and DTMF input are common; however call progress tones can only be detected when CP mode has been selected. DTMF signals cannot be detected if CP mode has been selected. Figure 2. 3 indicates the useful detect bandwidth of the call progress filter. Frequencies presented to the input, which are within the ‘accept’ bandwidth limits of the filter are hard limited by a high gain comparator with the IRQ/CP pin serving as the output. The square wave output obtained from the Schmitt trigger can be analyzed by a microprocessor or counter arrangement to determine the nature of the call progress tone being detected. Frequencies which are in the ‘reject’ area will not be detected and consequently the IRQ/CP pin will remain low. Figure 2. 3: Call Progress Response 2. 6 DTMF generator: The DTMF transmitter employed in the MT8888C is capable of generating all sixteen standard DTMF tone pairs with low distortion and high accuracy. All frequencies are derived from an external 3. 579545 MHz crystal. The sinusoidal waveforms for the individual tones are digitally synthesized using row and column programmable dividers and switched capacitor D/A converters. The row and column tones are mixed and filtered providing a DTMF signal with low total harmonic distortion and high accuracy. To specify a DTMF signal, data conforming to the encoding format shown in Table 2. 2 must be written to the transmit Data Register. Note that this is the same as the receiver output code. The individual tones which are generated (f LOW and f HIGH) are referred to as Low Group and High Group tones. As seen from the table, the low group frequencies are 697, 770, 852 and 941 Hz. The high group frequencies are 1209, 1336, 1477 and 1633 Hz. Typically; the high group to low group amplitude ratio (twist) is 2 dB to compensate for high group attenuation on long loops. The period of each tone consists of 32 equal time segments. The period of a tone is controlled by varying the length of these time segments. During write operations to the Transmit Data Register the 4 bit data on the bus is latched and converted to 2 of 8 coding for use by the programmable divider circuitry. This code is used to specify a time segment length, which will ultimately determine the frequency of the tone. When the divider reaches the appropriate count, as determined by the input code, a reset pulse is issued and the counter starts again. The number of time segments is fixed at 32; however, by varying the segment length as described above the frequency can also be varied. The divider output clocks another counter, which addresses the sine wave lookup ROM. Table 2. 2: DTMF Tones FLOWFHIGHDIGITD3D2D1D0 697120910001 697133620010 697147730011 770120940100 770133650101 770147760110 852120970111 52133681000 852147791001 941133601010 9411209*1011 9411477#1100 6971633A1101 7701633B1110 8521633C1111 9411633D0000 Note: 0= LOGIC LOW, 1= LOGIC HIGH The lookup table contains codes which are used by the switched capacitor D/A converter to obtain discrete and highly accurate DC voltage levels. Two identical circuits are employed to produce row and column tones, which are then mixed using a l ow noise summing amplifier. The oscillator described needs no â€Å"start-up† time as in other DTMF generators since the crystal oscillator is running continuously thus providing a high degree of tone burst accuracy. A bandwidth limiting filter is incorporated and serves to attenuate distortion products above 8 kHz. It can be seen from Figure 2. 4 that the distortion products are very low in amplitude. Figure 2. 4: Spectrum Plot 2. 7 Receiver Section: Separation of the low and high group tones is achieved by applying the DTMF signal to the inputs of two sixth-order switched capacitor band pass filters, the bandwidths of which correspond to the low and high group frequencies. These filters incorporate notches at 350 Hz and 440 Hz for exceptional dial tone rejection. Each filter output is followed by a single order switched capacitor filter section, which smoothes the signals prior to limiting. Limiting is performed by high-gain comparators which are provided with hysterics to prevent detection of unwanted low-level signals. The outputs of the comparators provide full rail logic swings at the frequencies of the incoming DTMF signals. Following the filter section is a decoder employing digital counting techniques to determine the frequencies of the incoming tones and to verify that they correspond to standard DTMF frequencies. A complex averaging algorithm protects against tone simulation by extraneous signals such as voice while providing tolerance to small frequency deviations and variations. This averaging algorithm has been developed to ensure an optimum combination of immunity to talk-off and tolerance to the presence of interfering frequencies (third tones) and noise. When the detector recognizes the presence of two valid tones (this is referred to as the â€Å"signal condition† in some industry specifications) the â€Å"Early Steering† (ESt) output will go to an active state. Any subsequent loss of signal condition will cause ESt to assume an inactive state. The DTMF keypad is as shown in figure 2. 5 Figure 2. 5: Typical DTMF Keypad 123A697 Hz 456B770 Hz 789C852 Hz *0#D941 Hz 1209 Hz1336 Hz1477 Hz1633 Hz 2. 8 Burst Mode: In certain telephony applications it is required that DTMF signals being generated are of a specific duration determined either by the particular application or by any one of the exchange transmitter specifications currently existing. Standard DTMF signal timing can be accomplished by making use of the Burst Mode. The transmitter is capable of issuing symmetric bursts/pauses of predetermined duration. This burst/pause duration is 51 ms ± 1 ms, which is a standard interval for auto dialer and central office applications. After the burst/pause has been issued, the appropriate bit is set in the Status Register indicating that the transmitter is ready for more data. The timing described above is available when DTMF mode has been selected. However, when CP mode (Call Progress mode)is selected, the burst/pause duration is doubled to 102 ms  ±2 ms. Note that when CP mode and Burst mode have been selected, DTMF tones may be transmitted only and not received. In applications where a non-standard burst/pause time is desirable, a software timing loop or external timer can be used to provide the timing pulses when the burst mode is disabled by enabling and disabling the transmitter. Microprocessor interface: The MT8888C incorporates an Intel microprocessor interface which is compatible with fast versions (16 MHz) of the 80C51. No wait cycles need to be inserted. Figure 2. 6 and Figure 2. are the timing diagrams for the Intel 8031, 8051 and 8085 (5 MHz) microcontrollers. By NANDing the address latch enable (ALE) output with the high-byte address (P2) decode output, CS is generated. Figure 2. 8 summarizes the connection of these Intel processors to the MT8888C transceiver. Figure 2. 6: 8031/8051/8085 Read Timing Diagram Figure 2. 7: 8031/8051/8085 Write Timing Diagram Figure 2. 8: MT8888C Interface Connections for Various Intel Micros The microprocessor interface provides access to five internal registers. The read-only Receive Data Register contains the decoded output of the last valid DTMF digit received. Data entered into the write-only Transmit Data Register will determine which tone pair is to be generated. Transceiver control is accomplished with two control registers (see Table 2. 3 and Table 2. 4), CRA and CRB, which have the same address. A write operation to CRB is executed by first setting the most significant bit (b3) in CRA. The following write operation to the same address will then be directed to CRB, and subsequent write cycles will be directed back to CRA. The read-only status register indicates the current transceiver state (see Table 2. 5). Table 2. 3: Control Register A Description BITNAME DESCRIPTION b0TOUTTone Output Control. Logic high enables the tone output; a logic low turns the tone output off. This bit controls all transmit tone functions. b1CP/DTMFCall Progress or DTMF Mode Select. A logic high enables the receive call progress mode; a logic low enables DTMF mode. In CP mode a rectangular wave representation of the received tone signal will be present on the IRQ/CP output pin if IRQ has been enabled (Control Register A,b2=1). In order to be detected, CP signals must be within the bandwidth specified in the AC Electrical Characteristics for Call Progress. Note: DTMF signals cannot be detected when CP mode is selected. b2IRQInterrupt Enable. A logic high enables the interrupt function; a logic low when either 1) a valid DTMF signal has been received for a valid guard time duration, or 2) the transmitter is ready for more data (burst mode only). b3RSELRegister Select. A logic high selects control register B for the next write cycle to the control register address. After writing to control register B, the following control register write cycle will be directed to control register A. Table 2. 4: Control Register B Description BITNAME DESCRIPTION b0 BURSTBurst Mode Select. Logic high de-activates burst mode; a logic low enables burst mode. When activated, the digital code representing a DTMF signal can be written to the transmit register, which will result in a transmit DTMF tone burst and pause of equal durations (typically 51msec). Following the pause, the status register will be updated (b1-Transmit Data Register Empty) and an interrupt will occur if the interrupt mode has been enabled. When CP mode (control register A, b1) is enabled the normal tone burst and pause durations are extended from a typical duration of 51msec to 102 msec. When BURST is high (de-activated) the transmit tone burst duration is determined by the TOUT bit (control register A, b0). b1TESTTest Mode Control. Logic high enables the test mode; a logic low de-activates the test mode. When TEST is enabled and DTMF mode is selected (control register A, b1=0), the signal present on the IRQ/CP pin will be analogous to the state of the delayed steering bit of the status register. 2 S/DSingle or Dual Tone Generation. Logic high selects the single tone output; a logic low selects the dual tone output. The single tone generation function registers further selection of either the row or column tones (Low or high group) through the C/R bit (control register B,b3). b3 C/RColumn or Row tone select. Logic high selects a column tone output, a logic low selects a row tone output. This function is used in conjunc tion with the S/D bit (control register B, b2). Table 2. 5: Status Register Description BITNAMESTATUS OF FLAGSTATUS FLAG CLEARED 0IRQInterrupt has occurred. Bit one (b1) or bit two (b2) is set. Interrupt is inactive. Cleared after status register is read. b1Transmit data register empty(Burst Mode only)Pause duration has terminated and transmitter is ready for new data. Cleared after Status Register is read or when in non-burst mode. b2Receive Data Register FullValid data is in the Receive Data Register. Cleared after Status Register is read. b3 Delayed SteeringSet upon the valid detection in the absence of a DTMF signal. Cleared upon the detection of a valid DTMF signal. A software reset must be included at the beginning of all programs to initialize the control registers upon power-up or power reset (see Figure 19). Refer to Tables 4-7 for bit descriptions of the two control registers. The multiplexed IRQ/CP pin can be programmed to generate an interrupt upon validation of DTMF signals or when the transmitter is ready for more data (burst mode only). Alternatively, this pin can be configured to provide a square wave output of the call progress signal. The IRQ/CP pin is an open drain output and requires an external pull-up resistor. 2. DTMF Registers and initialization: The DTMF has two control registers, one transmits register, one receives register, and one status register. Along with this there is a data buffer which is the entry point for the data for the DTMF to communicate with the microcontroller depending upon the give control signals on the DTMF control pins like rs0,r/w, and the data from the data buffer is communicated with the DTMF. The c ombination of rs0 and r/w pins will give the following result as shown in table 2. 6. Table 2. 6: DTMF Internal Registers RS0R/WFUNCTION 00Write to Transmit Data Register 1Read from Receive Data Register 10Write to Control Register 11Read from Status Register Initialization of DTMF: A software reset must be included at the beginning of all programs to initialize the control registers after power up. The initialization procedure should be implemented 100ms after power up. Description Control Data CS RS0 R/W b3 b2 b1 b0 Read status register 0 1 1 x x x Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 0 0 0 0 Write to control register 0 1 0 1 0 0 0 Write to control register 0 1 0 0 0 0 0 Read status register 0 1 1 x x x x Transmission using DTMF: The DTMF has to receive a command to transmit and then the data to send. Consider an example of sending a 50 ms tone- 50 ms pause burst. The procedure is as follows. CS RS0 R/W b3 b2 b1 b0 1. Write to Control Register A 0 1 0 1 0 0 1 (Tone out, DTMF, IRQ, Select Control Register B) 2) Write to Control Register B 0 1 0 0 0 0 0 (Burst mode) 3) Write to Transmit Data Register 0 0 0 0 1 1 1 (Send a digit 7) Reception using DTMF: Reception is carried out by checking the status of DTMF for a valid data in receive register and then receive it by a command. The procedure is as follows. 1) Read the Status Register 0 1 1 x x x x -if bit 1 is set, the Tx is ready for the next tone, in which case†¦ Write to Transmit Register 0 0 0 0 1 0 1 (Send a digit 5) -if bit 2 is set, a DTMF tone has been received, in which case†¦. Read the Receive Data Register 0 0 1 x x x -if both bits are set†¦ Read the Receive Data Register 0 0 1 x x x x Write to Transmit Data Register 0 0 0 0 1 0 1 Thus the initialization of DTMF Transceiver is done using the internal registers according to ur requirements and then it is used for decoding the tones generated by the user. CHAPTER 3 THE MICROCONTROLLER 3. 1 Introduction: Phillips 89C51 contains a non-volatile FLASH program memory that is both parallel programmable and serial in system and in application programmable. It is an 8-bit micro controller from MHS-51 Intel family with 4K bytes of flash and 128 bytes of internal RAM. It has 40-pin configuration and it takes input from the external sources and routes them to the appropriate devices as programmed in it. Features: The features of PHILIPS 89C51 include: 80C51 Central Processing Unit On-chip FLASH Program Memory Speed up to 33 MHz Fully Static Operation RAM expandable externally up to 64 Kbytes Four interrupt priority levels Six interrupt sources Four 8-bit I/O ports Full-duplex enhanced UART Framing error detection Automatic address recognition Power Control Modes Clock can be stopped and resumed Idle Mode Power down Mode Programmable clock out Second DPTR register Asynchronous Port Reset Watchdog Timer Pin Diagram & Description: VCC: Supply voltage. GND: Ground. Port 0: Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as high impedance inputs. Port 0 may also be configured to be the multiplexed low order address/data bus during accesses to external program and data memory. In this mode P0 has internal pull-ups. Port 0 also receives the code bytes during Flash programming, and outputs the code bytes during program verification. External pull-ups are required during program verification. Figure 3. 1: Pin Diagram of 89C51 Micro Controller Port 1: Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 1 also receives the low-order address bytes during Flash programming and verification. Port 2: Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs Port 2 pins that are externally being pulled low will source current (IIL) because of the internal pull-ups. Port 2 emits the high-order address byte during fetches from external program memory and during accesses to external data memory that uses 16-bit addresses (MOVX @DPTR). In this application, it uses strong internal pull-ups when emitting 1s. During accesses to external data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits the contents of the P2 Special Function Register. Port 2 also receives the high-order address bits and some control signals during Flash programming and verification. Port 3: Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins they are pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that are externally being pulled low will source current (IIL) because of the pull-ups. Port 3 also serves the functions of various special features of the AT89C51 as listed below: Port 3 also receives some control signals for Flash programming and verification. The alternate functions of Port 3 are as shown in table 3. 1. Table 3. 1: Alternate Functions of Port 3 Port PinAlternate Functions P3. 0RXD(serial input port) P3. 1TXD(serial output port) P3. 2INT0(external interrupt 0) P3. 3INT1(external interrupt 1) P3. 4T0(Timer 0 external interrupt) P3. 5T1(Timer 1 external interrupt) P3. WR(external data memory write strobe) P3. 7RD(external data memory read strobe) RST: Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG: Address Latch Enable output pulse for latching the low byte of the address during accesses to external memory. This pin is also the program pulse input (PROG) during Flash programmin g. In normal operation ALE is emitted at a constant rate of 1/6 the oscillator frequency, and may be used for external timing or clocking purposes. Note, however, that one ALE pulse is skipped during each access to external Data Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH. With the bit set, ALE is active only during a MOVX or MOVC instruction. Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller is in external execution mode. PSEN: Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP: External Access Enable. EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require12-volt VPP. XTAL1: Input to the inverting oscillator amplifier and input to the internal clock operating circuit. XTAL2: Output from the inverting oscillator amplifier. Oscillator Characteristics: XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier which can be configured for use as an on-chip oscillator, as shown in Figure 3. 2. Either a quartz crystal or ceramic resonator may be used. To drive the device from an external clock source, XTAL2 should be left unconnected while XTAL1 is driven . There are no requirements on the duty cycle of the external clock signal, since the input to the internal clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage high and low time specifications must be observed. Figure 3. 2: Crystal Oscillator Architecture of PHILIPS 89C51: The architecture of PHILIPS 89C51 is as shown in figure 3. 3 below and the modes of operation include idle mode and power down mode. Idle Mode: In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The mode is invoked by software. The content of the on-chip RAM and all the special functions registers remain unchanged during this mode. The idle mode can be terminated by any enabled interrupt or by a hardware reset. It should be noted that when idle is terminated by a hardware reset, the device normally resumes program execution, from where it left off, up to two machine cycles before the internal reset algorithm takes control. On-chip hardware inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To eliminate the possibility of an unexpected write to a port pin when Idle is terminated by reset, the instruction following the one that invokes Idle should not be one that writes to a port pin or to external memory. Figure 3. 3: Architecture of PHILIPS 89C51 Micro-controller Power-down Mode: In the power-down mode, the oscillator is stopped, and the instruction that invokes power-down is the last instruction executed. The on-chip RAM and Special Function Registers retain their values until the power-down mode is terminated. The only exit from power-down is a hardware reset. Reset redefines the SFRs but does not change the on-chip RAM. The reset should not be activated before VCC is restored to its normal operating level and must be held active long enough to allow the oscillator to restart and stabilize. Table 3. 2: Idle and power down modes ModeProgram MemoryALEPSENPORT0PORT1PORT2PORT3 IdleInternal11DataDataDataData IdleExternal11FloatDataAddressData Power downInternal00DataDataDataData Power downExternal00FloatDataDataData Timer 0 and Timer 1: The â€Å"Timer† or â€Å"Counter† function is selected by control bits C/T in the Special Function Register TMOD. These two Timer/Counters have four operating modes, which are selected by bit-pairs (M1, M0) in TMOD. Modes 0, 1, and 2 are the same for both Timers/Counters. Mode 3 is different. Memory Organization: During the runtime, micro controller uses two different types of memory: one for holding the program being executed (ROM memory), and the other for temporary storage of data and auxiliary variables (RAM memory). Depending on the particular model from 8051 family, this is usually few kilobytes of ROM and 128/256 bytes of RAM. This amount is built-in and is sufficient for common tasks performed â€Å"independently† by the MCU. However, 8051 can address up to 64KB of external memory. CHAPTER 4 SERIAL COMMUNICATION 4. 1 Introduction: When a micro processor communicates with the outside world, it provides data in byte-size chunks. In some cases, such as printers, the information is simply grabbed from the 8bit data bus of the printer. This can work only if the cable is not too long, since long cables diminish and ever distort signals. Furthermore, an 8-bit data path is expensive. For these reasons, serial communication is used for transferring data between two systems located at distances of hundreds of feet to millions of miles apart. The fact that in serial communication a single data line is used instead of the 8bit data line of parallel communication makes it not only much cheaper but also makes it possible for two computers located in two different cities to communicate over the telephone. Serial data communication uses two methods, asynchronous and synchronous. The asynchronous method transfers a block of data at a time while the synchronous data transfers a single byte at a time. It a mean possible to write software to use either of these methods, but the programs can be tedious and long. For this reason, there are special IC chips made by many manufacturers for serial data communications. This chips are commonly referred to as UART (Universal Asynchronous Receiver Transmitter) and USART (Universal Synchronous Asynchronous Receiver Transmitter). The ARM has built in UARTs. Figure 4. 1: Serial Communication 4. Asynchronous Serial Communication & Data Framing: The data coming in at the receiving end of the data line in a serial data transfer is all 0’s and 1’s; it is difficult to make sense of data unless the sender and receiver agree on a set of rules, a protocol, on how the data is packed, how many bits constitute the character, and when the data begins and ends. Start and Stop bits: Asynchronous serial data communication is widely used for character orientation transmissions. In the asynchronous method, each character is placed in between start and stop bits. This is called framing. In data framing for asynchronous communications, the data, such as ASCII characters, are packed in between a start bit and a stop bit. The start bit is always one bit but the stop bit can be one or two bits. The start bit is always a 0 and the stop bit is 1. Parity bit: In some systems in order to maintain data integrity, the parity bit of the character byte is included in the data frame. This means that for each character we have a single parity bit in addition to start bit and stop bits. The parity bit is odd or even. In case of an odd parity bit the number of data bits including parity bit is even. Data transfer rate: The rate of data transfer in serial data communication is stated in bps(bits per second). Another widely used terminology for bps in baud rate. Baud rate is defined as the number of signal changes per second. As far as the conductor wire is concerned, the baud rates as bps are the same. Data framing: Figure 4. 2: Data Framing 4. 3 RS232 Standard: To allow compatibility among the data communication equipment made by various manufacturers; an interfacing standard called RS232, was set by the Electronic Industries Association (EIA) in 1960. RS232 is the most widely used serial input-output interfacing standard. In RS232, a 1 is represented by -3 to -25v, while a 0 bit is +3 to +25v. To connect any RS232 to a micro controller, voltage converters such as MAX232 are used. Max 232 IC chips are commonly referred to as line drivers. RS232 connectors: The RS232 connector is as shown in figure 4. 3 and the working of pins is described in table 4. 1 Figure 4. 3: RS232 Connector Table 4. 1: Pin description of RS232 Connector Pin noFunction 1CD-Carrier Detector 2RxD-Receive Data 3TxD-Transmit Data DTR-Data Terminal Request 5GND-Signal Ground 6DSR-Data Set Ready 7RTS-Request To Send 8CTS-Clear To Send 9RI-Ring Indicator MAX 232: The RS 232 is not compatible with microcontroller, so a line driver converts the RS 232’s signals to TTL voltage levels. The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply TIA/EIA-232-F voltage levels from a single 5v supply. Each receiver converts TIA/EIA-232 -F inputs to 5v TTL/CMOS levels. These receivers have a typical threshold of 1. 3v, a typical hysteresis of 0. v, and can accept  ±30v inputs. Each driver converts TTL/CMOS input levels into TIA/EIA-232-F levels. Transfer between microcontroller and RS 232c: Figure 4. 4: RS232 Level to TTL Level Conversion CHAPTER 5 LIQUID CRYSTAL DISPLAY 5. 1 Introduction: The LCD unit receives character codes (8 bits per character) from a microprocessor or microcomputer, latches the codes to its display data RAM (80-byteDD RAM for storing 80 characters), transforms each character code into a 5Ãâ€"7 dot matrix character pattern, and displays the characters on its LCD screen. The LCD unit incorporates a character generator ROM which produces 160 different 5Ãâ€"7 dot-matrix character patterns. The unit also provides a character generator RAM (64 bytes) through which the user may define up to eight additional 5Ãâ€"7 dot matrix character patterns, as required by the application. To display a character, positional data is sent via the data bus from the microcontroller to the LCD unit, where it is written into the instruction register. A character code is then sent and written into the Data register. The LCD unit displays the corresponding character pattern in the specified position. The LCD unit can either increment or decrement the display position automatically after each character entry, so that only successive characters codes need to be entered to display a continuous character string. The display/cursor shift instruction allows the entry of characters in either the left-to-right or right to left direction. 5. 2 Features: The features of liquid crystal display include: Interface with either 4-bit or 8-bit microprocessor. Display data RAM. 80 x8 bits (80 characters). Character generator ROM 160 different 5 x7 dot-matrix character patterns. Character generator RAM. different user programmed 5 x7 dot-matrix patterns. Display data RAM and character generator RAM may be accessed by the microprocessor. Numerous instructions. Clear Display, Cursor Home, Display ON/OFF, Cursor. ON/OFF, Blink Character, Cursor Shift, Display Shift. Built-in reset circuit is triggered at power ON. 5. 3 Pin diagram: Figure 5. 1: LCD Pin Diagram 5. 4 Pin description: VCC, VSS and VEE: While VCC and VSS provide + 5 V on and ground, respectively, VEE is used for controlling LCD contrast. RS: register select There are two very important registers inside LCD. The RS pin is used for their selection as follows. Is RS= 0, the instruction command code register is selected, allowing the user to send a command such as clear display, Cursor at home, etc. if RS=1 the data register is selected, allowing the user to send data to be displayed on the LCD. R/W: read/write R/W input allows the user to write information to the LCD or read information from it. R/W=1 when reading; R/W=0 when writing. E: enable The LCD to latch information presented to its data pins uses the enable pin. When data is supplied to data pins, a high to low pulse must be applied to this pin in order for the LCD to latch in the data present at the data pins. This pulse must be a minimum of 450 ns wide. D0-D7: The 8-bit data pins, D0-D7, are used to send information to the LCD or read the contest of the LCD internal registers. To display letters and numbers, we send ASCII codes for the letters A-Z, a-z, and numbers 0-9 to these pins while making RS=1. We also use RS= 0to check the busy flag bit to see if the LCD ready to receive. The busy flag isD7 and can be read when R/W=1 and RS= 0, as follows: if R/w=1 and RS = 0. When D7 =1, the LCD is busy taking care of internal operations and will not accept any new information. WhenD7=0, the LCD is ready to receive new information. . 5 LCD Commands: The commands given to the LCD are as shown in table 5. 1 Table 5. 1: LCD Commands HEXREGISTER 01Clear display screen 02Return home 04Decrement cursor (shift cursor to left) 06Increment cursor (shift cursor to right) 05Shift Display right 07Shift display left 08Display off, cursor off 0ADisplay off, cursor on 0CDisplay on, cursor off 0EDisplay on, curs or blinking 0FDisplay on, cursor blinking 10Shift cursor position to left 14Shift cursor position to right 18Shift the entire display to the left 1CShift the entire display to the right 80Force cursor to beginning of 1st line C0Force cursor to beginning of 2nd line 382 lines and 5Ãâ€"7 matrix 5. 6 Power Supply Unit: The input to the circuit is applied from the regulated power supply. The a. c. input i. e. , 230V from the mains supply is step down by the transformer to 12V and is fed to a rectifier. The output obtained from the rectifier is a pulsating d. c voltage. So in order to get a pure d. c voltage, the output voltage from the rectifier is fed to a filter to remove any a. c components present even after rectification. Now, this voltage is given to a voltage regulator to obtain a pure constant dc voltage. Figure 5. : Power Supply Unit 5. 6. 1 Transformer: Usually, DC voltages are required to operate various electronic equipment and these voltages are 5V, 9V or 12V. But these voltages cannot be obtained directly. Thus the a. c input available at the mains supply i. e. , 230V is to be brought down to the required voltage level. This is done by a transformer. Thus, a step down transformer is employed to decrease the voltage to a required level. 5. 6. 2 Rectifier: The output from the transformer is fed to the rectifier. It converts A. C. into pulsating D. C. The rectifier may be a half wave or a full wave ectifier. In this project, a bridge rectifier is used because of its merits like good stability and full wave rectification. 5. 6. 3 Filter: Capacitive filter is used in this project. It removes the ripples from the output of rectifier and smoothens the D. C. Output received from this filter is constant until the mains voltage and load is maintained constant. 5. 6. 4 Voltage Regulator: As the name itself implies, it regulates the input applied to it. A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. In this project, power supply of 5V and 12V are required. In order to obtain these voltage levels, 7805 and 7812 voltage regulators are to be used. The first number 78 represents positive supply and the numbers 05, 12 represent the required output voltage levels. Three-Terminal Voltage Regulator: Fig 5. 3 shows the basic connection of a three-terminal voltage regulator IC to a load. The fixed voltage regulator has an unregulated dc input voltage, Vi, applied to one input terminal, a regulated output dc voltage, Vo, from a second terminal, with the third terminal connected to ground. For a selected regulator, IC device specifications list a voltage range over which the input voltage can vary to maintain a regulated output voltage over a range of load current. The specifications also list the amount of output voltage change resulting from a change in load current (load regulation) or in input voltage (line regulation). GND4 Figure 5. 3: Fixed Positive Voltage Regulator CHAPTER 6 RELAY DRIVER, RELAYS & DEVICES 6. 1 Introduction: The ULN2003 is a high-voltage, high-current darling ton driver comprising of seven NPN darling ton pairs. For high input impedance we may use two ransistors to form a Darlington pair. This pair in CC configuration provides input impedance as high as 2Mohms. The input signal varies with the base current of the first transistor this produces variation in the collector current in the first transistor. The emitter load of the first stage is the input resistance of the second stage. The emitter current of the first transistor is the base current of the second transistor. The IC is as shown in figure 6. 1. . Figure 6. 1: ULN2003 Relay driver 6. 2 Features: The features of ULN2003 relay driver are: Output current (single output) 500mA MAX High sustaining voltage output 50v MIN Output clamp diodes Input compatible with various types of logic 6. 3 Pin Diagram & Description: Fig 6. 2: Pin diagram of ULN 2003 The IC is of 16-pin and is a monolithic linear IC. It has 7darlington pairs internally of 7 inputs and 7 outputs i. e. 1 to 7 are inputs of Darlington pairs and 10 to 16 are the outputs, 8-pin is ground and 9-pin is common freewheeling diode. Applications: The ULN 2003 driver is used in Relays Hammer Lamps Display (LED) drivers 6. 4 Relays: 6. 4. 1 Introduction: The relay is a device that acts upon the same fundamental principle as the solenoid. The difference between a relay and a solenoid is that a relay does not have a movable core (plunger) while the solenoid does. Where multiple relays are used, several circuits may be controlled once. Relays are electrically operated control switches, and are classified according to their use as POWER RELAYS or CONTROL RELAYS. Power relays are called CONTACTORS, control relays are usually known simply as relays. The function of a contactor is to use a relatively small amount of electrical power to control the switching of a large amount of power. Control relays are frequently used in the control of low power circuits. . 4. 2 Electromagnetic Relay: Relays in which the relative movements of their mechanical components produce preset responses under the effect of the current in the input circuit are called electromagnetic relays. The relay used in this project is electromagnetic relay which is shown in figure 6. 4. 2. Figure 6. 3: Electromagnetic Relay 6. 4. 3 Operation: OperationAndWhen a certain voltage or current is applied to both ends of the coil of an electromagnetic relay, the magnetic flux passes through the magnetic circuit composed of iron core, yoke iron, armature iron and the magnetic circuit operation air gap. Under the influence of magnetic field, armature iron is attracted to iron core pole face thus propelling normally closed contact to open and normally open contact to close, when the applied voltage or current at both ends of the coil is lower than a certain value and mechanical reactance is greater than electromagnetic attraction, armature iron is restored to the original state and normally open contact opens and normally closed contact closes. 6. 4. 4 Components of Electromagnetic Relay: Electromagnetic relay is composed of magnetic circuit system, contact system and return mechanism. Magnetic circuit system is made up of such parts as iron core, yoke iron, armature iron and coil. Contact system is composed of such parts as static contact spring, movable contact spring and contact seat. Return mechanism is made up of return springs of draw springs. Figure 6. 4: Components of Electromagnetic Relay 6. 5 Devices: The devices include microwave oven, electric bulbs, fans, motors, coolers, etc. Any of the devices can be operated from anywhere by interfacing them to the microcontroller. CHAPTER 7 COMPONENTS INTERFACING WITH MICROCONTROLLER 7. MT8888C Interfacing With Microcontroller: The MT8888 DTMF transceiver is interfaced to the microcontroller port P2. The data pins of transceiver are interfaced with P2. 0-P2. 3 and the control pins are connected to P2. 4-P2. 7 as shown in figure 7. 1. PHILIPS 89C51MT8888 Figure 7. 1: Interfacing MT8888 with the microcontroller 7. 2 LCD Interfacing with the Microcontroller: Depending on how many lines are used for connection to the m icrocontroller, there are 8bit and 4bit LCD modes. The appropriate mode is determined at the beginning of the process in a phase called â€Å"initialization†. In the first case, the data are transferred through outputs D0-D7 as it has been already explained. In case of 4-bit LED mode, for the sake of saving valuable I/O pins of the microcontroller, there are only 4 higher bits (D4-D7) used for communication, while other may be left unconnected. Consequently, each data is sent to LCD in two steps: four higher bits are sent first (that normally would be sent through lines D4-D7), four lower bits are sent afterwards. With the help of initialization, LCD will correctly connect and interpret each data received. Besides, with regards to the fact that data are rarely read from LCD (data mainly are transferred from microcontroller to LCD) one more I/O pin may be saved by simple connecting R/W pin to the Ground. Such saving has its price. Even though message displaying will be normally performed, it will not be possible to read from busy flag since it is not possible to read from display. Here we used 8 bit LCD. The LCD is interfaced with microcontroller port P0. The data pins of LCD are interfaced with the Port 0 pins P0. 0-P0. 7 and the control pins of LCD are interfaced with Port 1 pins P1. -P1. 7 as shown in figure 7. 2. PHILIPS 89C51 LCD Figure 7. 2: Interfacing LCD to the Microcontroller Algorithm to send data to LCD: 1. Make R/W low 2. Make RS=0; if data byte is command RS=1; if data byte is data (ASCII value) 3. Place data byte on data register 4. Pulse E (HIGH to LOW) 5. Repeat the steps to send another data byte 7. 3 Interfacing devices with the microcontroller: The devices that are t o be controlled are interfaced with port 1 of microcontroller. Here we used four devices and they are interfaced to P1. 0-P1. 3 as shown in figure 7. 3. Figure 7. 3: Interfacing devices with the microcontroller CHAPTER 8 SOFTWARE DETAILS 8. 1 Keil  µVision 4: Keil was founded in 1986 to market the add-on products for development tools provided by many of the silicon vendors. Keil implemented the first C compiler designed from the ground up specifically for 8051 microcontroller. Keil provides broad range of development tools like ANSI C Compiler, macro assembler, debuggers and simulators, linkers, IDE library managers, real time operating system & evaluation boards for 8051 & ARM families. It is used to write programs for an application. The programs can be written in embedded C or in assembly language. 8. 1. 1 Evaluation of Keil Software: Start the  µVision Program Select new  µVision Project from the project menu Give the project name: prjname and save it with extension*. uvproj as shown in fig 8. 1. 1a After saving another window will be displayed to select the target device. In that select LPC 2478 from NXP (founded by Philips) from the data base given Select it and click OK a new project with target file will be created. Select the new†¦ from the file menu Type your c file Select save†¦ from file menu. The first time you save the program a dialog box will pop-up and allow you to name your file and file type. Save program with file name: xxxx. c The file type mentioned at last (. c) means embedded c language. Right click on source group and click add files to source group. This will add files to project as shown in figure 8. 1. 1(b) Right click on source group and select build all target files. This will create HEX file needed for ARM. Figure 8. 1: Starting a New Project in KEIL Figure 8. 1 indicates how to start a new project in KEIL software to develop a program. Select the name of the project ant save it as . v2, then a new project is created as shown in figure. Figure 8. 2: Adding Files to the Source Group Figure 8. 2 shows how we should add files to the source group after we created a new project using KEIL micro vision. Figure 8. 3: Program written in the File added to the Source Group Figure 8. 3 shows the picture after the program file is being added to the source group so t hat an ASM file is created for the source file where code is written. 8. 1. 2 Using the Keil dscope Debugger: Select start /stop debug session from debug menu The debug program will start a new session as shown in figure 8. 1. 1(d) Select File, load object file from the program menu. Change the file type to HEX Select your hex file, e. g. xxxx. Hex Click OK You should now see the source code of the file typed in earlier Select Peripherals, GPIO Fast Interface, Ports required from the program menu. So that you can see the how output varies on ports. Select Port 0, Port 1, Port 2, Port 3 and port 4. Select Peripherals, UART, UARTs required from the program menu. So that you can see the how output varies on UARTs. Select UART0, UART1, UART2 and UART3. Click on go to see the real time update of the I/O ports. Click on stop when you are finished. You can also single step through you program or set break points at locations that you want the debugger to stop at. To set a breakpoint, double click on the line. Figure 8. 4: Debugging the code using Start/Stop Debug Session Figure 8. 4 shows that after the ASM file is created, it should be debugged using Start/Stop Debug Session. The program debuuging starts when we press the start and it can be ended using stop. Figure 8. 5: After Debugging, the value of the registers 8. 2 Flash Magic Software: The flash magic software is one of the best known microcontroller programs dumping software. It has the compatibility with the KEIL software. The HEX file generated by the KEIL is used by the FLASH MAGIC to program the microcontroller. The software uses the computer serial port to transmit data into microcontroller. It has many options like appending the code, erasing the memory, reading from the microcontroller etc to dump the code program first the FLASH MAGIC has to be provided with necessary information about the target, the band rate supported, the clock frequency,etc. ,then the software checks for the device connected to the computer serial port. If the target is not connected, an error is generated. The software then checks for the available memory and the size of file to be dumped. Then it checks whether the target (microcontroller) is in ISP (In –system programming) mode or not. If everything is fine then, it starts writing into the microcontroller using the serial data transfer pins Txd and Rxd pins on the microcontroller. After the code is loaded into the microcontroller, even the power goes off , the code will not be lost as it is stored in the EEPROM which is not volatile. Giving the RESET will restart the program execution from the beginning. We have seen that using a high level language improves the readability of the program, makes the programming process more efficient, and makes it possible to write portable code. The compiler generates the assembly code and therefore places a large role in determining the actual CPU operation. Because compilers are not as smart as programmers are, the machine code generated by compiler if typically larger and less efficient than the machine code generated from assembly source code. This may be disconcerting to some programmers, but it is not a good enough reason to avoid high level languages. Instead, it means that you must know yourcompiler and know how the different parts of your C code will be implemented. Figure 8. 2: Flash Magic for dumping the code into the microcontroller Flow Chart: NO YES YESYES NO YES YES NO YESYES NO YESYES NO 8. 4 Source Code: /***DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE***/ /*****************************BATCH – A2***********************************/ /********DTMF INITIALISATION********/ Dtmf_data equ p2 Dtmf_wr equ p2. 7 Dtmf_cs equ p2. 6 Dtmf_rs0 equ p2. 4 Dtmf_rd equ p2. 5 /********LCD INITIALISATION*********/ Lcddata equ p0 Lcd_rs equ p1. 5 Lcd_rw equ p1. 6 Lcd_en equ p1. 7 /*******DEVICES INITIALISATION********/ dev1 equ p1. 0 dev2 equ p1. 1 dev3 equ p1. 2 dev4 equ p1. 3 psswrd bit 21 org 00h mov p1,#0f0h mov r0,#50h call Dtmf_init call Lcd_init /*call DispLine1 mov dptr,#Proj_name call Disp_string call delay call DispLine2 mov dptr,#Proj_name1 call Disp_string call delay call DispLine3 mov dptr,#Proj_name2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#College_name call Disp_string call delay call Clr_Display call DispLine2 mov dptr,#College_location call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#TEAM call Disp_string call DispLine2 ov dptr,#NAME1 call Disp_string call DispLine3 mov dptr,#NAME2 call Disp_string call delay call Clr_Display call DispLine1 mov dptr,#NAME3 call Disp_string call DispLine2 mov dptr,#NAME4 call Disp_string call DispLine3 mov dptr,#NAME5 call Disp_string call DispLine4 mov dptr,#NAME6 call Disp_string call delay call Clr_Display */ main: call Clr_Display mov dptr, #myname call Disp_string clr psswrd Rx_tone: mov a,#8fh call Lcd_cmnd mov r0,#50h mov r7,#00h store_tone: call delay50ms clr a call read_sta_reg jnb acc. 2,store_tone call read_rx_data_reg anl a,#0fh jb psswrd,compare mov @r0,a mov a,#†*† call Lcd_data_out inc r0 inc r7 jne r7,#04,store_tone mov r0,#50h mov a,@r0 cjne a,#1,invalid_Tone inc r0 mov a,@r0 cjne a,#2,invalid_Tone inc r0 mov a,@r0 cjne a,#3,invalid_Tone inc r0 mov a,@r0 cjne a,#4,invalid_Tone call Clr_Display mov dptr,#yesOk call Disp_string setb psswrd jmp store_tone invalid_Tone: call Clr_Display mov dptr,#NotOk call Disp_string clr psswrd call delay50ms call delay50ms jmp main /***********************************************/ compare: cjne a,#01,label1 setb dev1 call Clr_Display call DispLine1 mov dptr,#labela call Disp_string setb psswrd jmp store_tone label1:cjne a,#02,label2 setb dev2 call Clr_Display call DispLine2 mov dptr,#labelb all Disp_string setb psswrd jmp store_tone label2:cjne a,#03,label3 setb dev3 call Clr_Display call DispLine3 mov dptr,#labelc call Disp_string setb psswrd jmp store_tone label3:cjne a,#04,label4 setb dev4 call Clr_Display call DispLine4 mov dptr,#labeld call Disp_string setb psswrd jmp store_tone label4:cjne a,#05,label5 clr dev1 call Clr_Display call DispLine1 mov dptr,#labele call Disp_string setb psswrd jmp store_tone label5:cjne a,#06,label6 clr dev2 call Clr_Display call DispLine2 mov dptr,#labelf call Disp_string setb psswrd jmp store_tone label6:cjne a,#07,label7 clr dev3 call Clr_Display call DispLine3 mov dptr,#labelg all Disp_string setb psswrd jmp store_tone label7:cjne a,#08,label8 clr dev4 call Clr_Display call DispLine4 mov dptr,#labelh call Disp_string setb psswrd label8: jmp store_tone /*————-Dtmf_init———————-*/ Dtmf_init: call read_sta_reg mov a,#00h call write_cnt_reg mov a,#00h call write_cnt_reg mov a,#08h call write_cnt_reg mov a,#00h call write_cnt_reg ca ll read_sta_reg ret read_sta_reg: mov Dtmf_data,#0ffh setb Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret write_cnt_reg: mov Dtmf_data,a setb Dtmf_rd clr Dtmf_wr setb Dtmf_rs0 clr Dtmf_cs nop nop etb Dtmf_cs setb Dtmf_wr ret read_rx_data_reg: mov Dtmf_data,#0ffh clr Dtmf_rs0 setb Dtmf_wr clr Dtmf_rd clr Dtmf_cs nop nop mov a,Dtmf_data setb Dtmf_cs setb Dtmf_rd ret /***********Lcd Display*******************/ Lcd_init: mov a,#30h call Lcd_cmnd mov a,#38h call Lcd_cmnd mov a,#06h call Lcd_cmnd mov a,#0ch call Lcd_cmnd mov a,#01h call Lcd_cmnd ret Lcd_cmnd: call delay_50ms mov Lcddata,a clr Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Lcd_data_out: call delay_50ms mov Lcddata,a setb Lcd_rs clr Lcd_rw setb Lcd_en nop nop clr Lcd_en ret Disp_string: clr a movc a,@a+dptr jz exit call delay_50ms call Lcd_data_out nc dptr jmp Disp_string exit:ret /*****************************************************/ /***************************** ************************/ ;routine for clearing display Clr_Display: mov a,#01h call lcd_cmnd ret /****************************************************/ /****************************************************/ ;this routine is for display in different lines DispLine1: mov a,#80h call LCD_Cmnd ret DispLine2: mov a,#0C0h call LCD_Cmnd ret DispLine3: mov a,#94h call LCD_Cmnd ret DispLine4: mov a,#0D4h call LCD_Cmnd ret /*****************************************************/ delay: call Delay50ms call Delay50ms all Delay50ms call Delay50ms call Delay50ms ret delay50ms: mov r2,#5 back2:mov r1,#200 back1:mov r5,#250 back:djnz r5,back djnz r1,back1 djnz r2,back2 ret delay_50ms: mov r4,#20 back4:mov r3,#250 back3:djnz r3,back3 djnz r4,back4 ret /*————————————-*/ ;Display String data Proj_name: DB â€Å"DTMF REMOTE APPLIANCE â€Å",0 Proj_name1: DBâ€Å"CONTROL SYSTEM†, 0 Proj_name2:DB†USING MOBI LE PHONE†, 0 College_name:DB â€Å"MIC COLLEGE OF TECHNOLOGY â€Å", 0 College_location: DB † KANCHIKACHERLA â€Å", 0 TEAM:DB † DEVELOPED â€Å", 0 NAME1: DB † BY â€Å", 0 NAME2: DB † A2 BATCH â€Å", 0 NAME3: DB † LAVANYA â€Å", 0 NAME4: DB † SIRISHA â€Å", 0 NAME5: DB † PAVAN KUMAR â€Å", 0 NAME6: DB † KISHORE â€Å", 0 myname: DB â€Å"ENTER PASSWORD:†,0h yesOk: DB â€Å"VALID PASSWORD†,0h NotOk: DB â€Å"INVALID PASSWORD†, 0h labela:db † DEVICE1 ON â€Å",0 labelb:db † DEVICE2 ON â€Å",0 labelc:db † DEVICE3 ON â€Å",0 labeld:db † DEVICE4 ON â€Å",0 labele:db † DEVICE1 OFF â€Å",0 labelf:db † DEVICE2 OFF â€Å",0 labelg:db † DEVICE3 OFF â€Å",0 labelh:db † DEVICE4 OFF â€Å",0 end CHAPTER 9 ADVANTAGES & APPLICATIONS 9. 1 Advantages: Increased productivity Low cost Reduces power consumption Virtual control of appliances High security 9. Disadvantages: No acknowledgement Switch-device pair should be known Network failure 9. 3 Applications: Other applications of this circuit include Agriculture Industry Colleges Schools Future Enhancement: Acknowledgement of the deviceâ⠂¬â„¢s initial condition through SMS. This system can be expanded to provide control over the GPRS. CONCLUSION This project â€Å"DTMF REMOTE APPLIANCE CONTROL SYSTEM USING MOBILE PHONE† overcomes the limitations of Wireless Domestic Automation which uses a transmitter and receiver to control the home appliances. It resembles a virtual human controlling the remote appliances using a control unit and a mobile phone. It mainly uses DTMF transceiver for decoding the tones generated by the mobile phone, which is given to the micro-controller to control the appliances. The remote appliances control system using mobile phone will one day become a reality and it may revolutionize our way of living. The wide areas of application include controlling the appliances like microwave oven, lighting fans, lights, etc. Another major application is industrial automation as it reduces the power consumption and is of low cost. As this system is implemented using in 2G communication network, the video data cannot be obtained. Future work includes research on the robot control system in 3G communication networks which facilitates controlling the remote robot using DTMF of mobile phone, with video data from the remote mobile robot’s camera. The Future enhancement also includes control of GPRS system using this system. REFERENCES Text Books: The 8051 Micro Controller architecture and embedded systems by Mazidi and Mazidi. Other References: www. atmel. com www. alldatasheets. com www. electronicshub. com www. philips. com International Journal of Electrical & Computer Sciences IJECS Vol: 9 No: 10