Tuesday, December 24, 2019

Essay on Identity Culture and Organization - 1986 Words

The primary goal for this essay is to discuss about the impacts of social media to the organizational culture in this modern business environment. The reasons to conduct this essay are firstly, the diffusion of social media have been focused specifically in relationship for organizations and the stakeholders. Secondly, the business organizations have been involving themselves to social media, for example, building its own community to their customers through Facebook and Twitter. Lastly, there are rare of proper evidences to prove the functionality and its limitation about social media to organizational culture. Therefore, in order to examine the topic comprehensively, certain relevant materials from journals, books, news and†¦show more content†¦From above, this can be identified that the ‘interaction’ is the key terms which shared by such definitions. Yet, will the organizational culture, especially the ‘interaction’, change its pattern by other factors? Indeed, not only the organization itself but its culture also had been transformed in this business world from time to time due to the globalization factor and the adoption of new technology (Kabasakal, Asugnab and Develioglu, 2006; Mills, 2010; Schein, 2010). Specially, through the emergence of technology in first generation of World Wide Web to the second generation (aka ‘Web 2.0’), the rapid development of social networking sites or social media and the Internet-based electronic commerce (aka ‘e-commerce’) had been changed the communication medium of an organization from traditional face to face style to the computer mediated communication style (Canessa and Riolo, 2003; Kabasakal et al., 2006; Harrison and Thomas, 2009; Mills, 2010). Such communication pattern not merely changes from the organization internally, but also externally, usually refers to customers. Undeniably, these led more and more organizations nowadays to adopt the use of social medias in latest forms to operate in their business routines, despite the fact that they had been tend to be costly, the effectiveness of the social medias as well as the efficiency helped the organization to deal with this cruel competitive businessShow MoreRelatedEffective Leadership Has Influenced The Organization s Culture And How Does Their Influence Shape Organisations Identity And924 Words   |  4 PagesOrganisation’s Culture and how does their influence Shape the of Organisations identity and Future? INTRODUCTION: Recently, researches have shown an increased interest in understanding the factual influence that leaders could do on the organizations. Undoubtedly, leaders play a critical role in the organization that they lead. More importantly the the changing nature of the economy that needs leaders to be aware of the dynamics that are essential for managing and leading organizations in the competitiveRead MoreCulture Can Be Both An Asset And A Liability1571 Words   |  7 PagesQuestion: Culture can be both an asset and a liability to an organisation Ravasi and Schultz (2006) wrote that Organizational culture is shared values and ideas that guide appropriate behaviour for various situations in the organization. Culture is created for people in an organization to behave consistently, which encompasses identical values, beliefs and principles of all the members (Needle 2010). Therefore, the culture in an organization can affect the ways of its members in work strategy andRead MoreLeadership Influences Organizational Culture And Employee Commitment1502 Words   |  7 Pagesunderstanding the mechanisms and processes through which leadership influences organizational culture and employee commitment, in order to develop a more complete understanding of the inner workings of leadership† (Bass, as cited by Aolio et al 2004 p.952) . Ellemers, Gilder, and Haslam (2004) agree that â€Å"additional understanding of work motivation can be gained by incorporating insights into social identity processes† (p. 459). Since motiv ational processes may be processed in group contexts, similarlyRead MoreThe Six Levers For Managing Organizational Culture1167 Words   |  5 PagesWithin organizations, large and small, there exists a sense of identity among its members that separates it from other organizations. This sense of identity is known as organizational culture. All over, managers seek to influence and change this into something that can be beneficial for the organization. In his article, â€Å"The Six Levers for Managing Organizational Culture†, Professor David W. Young defines the different elements that can influence and change the culture within the organization andRead MoreQuestions On Organizational Communication Concepts Essay1559 Words   |  7 PagesElements: According to Keyton (n.d.), organizational culture is defined as â€Å"the set of artifacts, values and assumptions that emerges from the interactions of organizational members† (p. 550). Some examples of artifacts and valu es include, norms, customs, how members should behave, and assumptions are revealed when talking about your work experiences. The culture of an organization can be simply what it feels like to be there (Keyton, n.d.). Every culture is dynamic, always changing and guides the constructionRead MoreCultural Identity In Unashamed By Lecrae741 Words   |  3 PagesLit Review Essay Cultural identity is the foundation in which identification is used to express his or her role in society. The distinction of cultural identity among a society affects a person’s role by pertaining to art and literature, as well as social organization element of culture. These examples of culture, refer to people all around the world. In the Story, Left behind, a native American student attending school is judged based on his ethnicity. In Unashamed by Lecrae, Lecrae uses musicRead MoreReading Work : In The New Workplace Centers Around Five Adult Educators1584 Words   |  7 Pagesmore important than stopping their work to do paperwork. Belfiore deduces that there were many instances when the value of documentation was not communicated to the employees. Because of these contradictions, Triple Z is a classic example of an organization in need of literacy training. Texco Texco is a multi-national company selling niche fabrics worldwide. Like Triple Z, documentation impacts everyone, and many contradictions are noted. Supervisors want the production line to reach daily quotasRead MoreToms of Maine Case Study666 Words   |  3 PagesToms of Maine Case Study Organizational culture is the basic pattern of shared assumptions that have been created by the corporation to enable the employees in the organization to have a shared norm. There are varied sources for the development of the organizational culture; they include the following-the general influence from the external environment, the factors that are specific to the organization and the influence of the values that exist in the society such as the spiritual perspectiveRead MoreSources Of Power And Functional Identity, Conflict, Self Interest, And Integration Within An Organization1184 Words   |  5 PagesSources of Power in Organization Introduction Evaluating the Organizations as Political Systems, Morgan (2006) looks at the various sources of power in organizations, his textbook lists several essential sources of power. This independent research discussion will examine the management of gender relations, and the power one already has. Particularly in the Political Systems metaphor, this review will evaluate how the two sources of power can contribute to functional identity, conflict, self-interestRead MoreWhat Makes A Successful Business?1136 Words   |  5 Pagesbusiness, one must understand the importance of bringing diversity into the workforce. To be able to obtain knowledge and strength from others individual traits shows deep facets in character. These traits show when working with individuals of many cultures and backgrounds in the workplace. A leader who has this ability can handle everyone uniquely and ethically and is in tune with what differentiates one associate from the next. Once one has a grasp on who they are then can one expect to lead a diverse

Monday, December 16, 2019

Water Level Warning by Gsm Free Essays

CHAPTER 1 INTRODUCTION Our entire project is based upon Embedded Systems. In this project we are using Microcontroller which controls all the operations in regarding the level of water in the dam. For this process we require the components such as microcontroller, GSM modem, control circuitry, power supply and three sensors. We will write a custom essay sample on Water Level Warning by Gsm or any similar topic only for you Order Now These three sensors are placed in three different threshold levels and are connected to the controller. If for suppose the level of water is being increasing in the dam, then immediately when the water level crossed the sensor at level-1, the information is passed to the controller and then the controller checks for the precaution instruction which is given a by the developer and forwards it to the GSM modem. The modem immediately sends that particular SMS to the mobiles for which it is assigned saying that â€Å"the Water level has crossed the threshold level-1†. The controlling part of the water level is also done by the controller through the instructions given by the developer. This includes the operations such as the number of gates to be opened, the number of threshold levels that are crossed. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. 1. 1 Embedded System Embedded systems are electronic devices that incorporate microprocessors with in their implementations. Embedded systems designers usually have a significant grasp of hardware technologies. They use specific programming languages and software to develop embedded systems and manipulate the equipment. Embedded systems often use a (relatively) slow processor and small memory size to minimize costs. An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few pre-defined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. . 2 GSM Technology Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the thr ee digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands. GSM (Global System for Mobile communications) is the technology that underpins most of the world’s mobile phone networks. The GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement and cooperation. GSM has become the world’s fastest growing communications technology of all time and the leading global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1. GHz bands GSM supports data transfer speeds of up to 9. 6 kbps, allowing the transmission of basic data services such as SMS. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person’s voice reaches the other person’s phone that is thousands of miles away. Even less is known about the security measures and protection b ehind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer. All the features and advancements in cell phone technology require a backbone to support it. When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. . 3 Micro controller Microcontrollers as the name suggests are small controllers. They are like single chip computers that are often embedded into other systems to function as processing/controlling unit. Microcontroller – A single chip used to control other devices. Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit. CHAPTER 2 DESCRIPTION OF PROJECT 2. 1 Block diagram and description [pic] Fig 2. 1 Block Diagram of dam level warning using GSM SMS In this block diagram we are using microcontroller, GSM modem, LCD, power supply, MAX-232, control circuitry, liquid level indicator. These all are mentioned below. Description The main aim is to send SMS when ever the water level crosses the threshold level. And necessary precautions are taken when ever the water exceeds the last level. To send an SMS to the concerned person we have certain steps to follow. In-order to work with any components basic requirement is power supply. Now the aim is to design the power supply section which converts 230V AC in to 5V DC. Since 230V AC is too high to reduce it to directly 5V DC, therefore we need a step-down transformer that reduces the line voltage to certain voltage that will help us to convert it in to a 5V DC. There are many types of power supply. Most are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices. A power supply can by broken down into a series of blocks, each of which performs a particular function. This power supply is connected to the micro controller. In a very simplistic form, a micro-controller system can be viewed as a system that reads from (monitors) inputs, performs processing and writes to (controls) outputs. Micro controllers are useful to the extent that they communicate with other devices, such as sensors, motors, switches, keypads, displays, memory and even other micro-controllers. Next input should be given to the microcontroller it is done by the level indicator. Level indicator has certain levels when the water touches the different levels of level indicator the micro controller takes the input as the level indicator is connected to the ports. This information is displayed on the LCD. When the LCD is ON the GSM (Global System for Mobile communication) gets activated by sending some commands to the microcontroller. For communication with the micro controller MAX 232 is used. This is used to convert the voltage level that is required for GSM, then the SMS is passed to the person or concerned authority using the GSM. For controlling the system we are using motors. Motors act as relays, which is an ON OFF switch. Through this relay action the motors work and controlling of the gates can be done. Hardware components 1. Power supply 2. micro controller 3. level indicator 4. MAX 232 5. GSM(Global system for Mobile communication) Modem 6. LCD(liquid crystal display) 7. control system 2. 2 Power supply The power supplies are designed to convert high voltage AC mains electricity to a suitable low voltage supply for electronics circuits and other devices. A power supply can by broken down into a series of blocks, each of which performs a particular function. A d. c power supply which maintains the output voltage constant irrespective of a. c mains fluctuations or load variations is known as â€Å"Regulated D. C Power Supply†. For example a 5V regulated power supply system as shown below: [pic] Fig 2. 2 5V regulated power supply system The regulated DC output is very smooth with no ripple. It is suitable for all electronic circuits. 2. 2. 1 Transformer Transformers convert AC electricity from one voltage to another with little loss of power. Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase voltage, step-down transformers reduce voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage (230V in UK) to a safer low voltage. Transformers waste very little power so the power out is (almost) equal to the power in. Note that as voltage is stepped down current is stepped up. 2. 2. 2 Rectifier A circuit which is used to convert a. c to dc is known as â€Å"rectifier†. The process of conversion a. c to d. is called â€Å"rectification† Types of rectifier: †¢ Half wave Rectifier †¢ Full wave rectifier 1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier. Bridge Rectifier: A bridge rectifier makes use of four diodes in a bridge arrangement to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single compone nt bridges where the diode bridge is wired internally. A bridge rectifier makes use of four diodes in a bridge arrangement as shown in fig below to achieve full-wave rectification. This is a widely used configuration, both with individual diodes wired as shown and with single component bridges where the diode bridge is wired internally. [pic] Fig 2. 2. 2 Bridge Rectifier arrangement 2. 2. 3 Filter A Filter is a device which removes the a. c component of rectifier output but allows the d. c component to reach the load. We have seen that the ripple content in the rectified output of half wave rectifier is 121% or that of full-wave or bridge rectifier or bridge rectifier is 48% such high percentages of ripples is not acceptable for most of the applications. Ripples can be removed by one of the following methods of filtering. †¢ A capacitor, in parallel to the load, provides an easier by –pass for the ripples voltage though it due to low impedance. At ripple frequency and leave the d. c. to appears the load. †¢ An inductor, in series with the load, prevents the passage of the ripple current (due to high impedance at ripple frequency) while allowing the d. c (due to low resistance to d. c) 2. 2. 4 Regulator Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass also rates them. Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current (‘overload protection’) and overheating (‘thermal protection’). Many of the fixed voltage regulator ICs has 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin. Regulator eliminates ripple by setting DC output to a fixed voltage. [pic] Fig 2. 2. 4 Regulator 2. 3 Micro controller (AT89C51) In this project work we are using AT89C51 micro-controller. This micro-controller plays a major role. Micro-controllers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well. A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above. Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit 2. 3. 1 Features 1. 8 Bit CPU optimized for control applications 2. Extensive Boolean processing (Single – bit Logic) Capabilities. 3. On – Chip Flash Program Memory 4. On – Chip Data RAM 5. Bi-directional and Individually Addressable I/O Lines 6. Multiple 16-Bit Timer/Counters . Full Duplex UART 8. Multiple Source / Vector / Priority Interrupt Structure 9. On – Chip Oscillator and Clock circuitry. 10. On – Chip EEPROM 11. One Serial communication port 2. 3. 2 Block diagram of 89C51 Fig 2. 3. 2 Block diagram of microcontroller 89C51 SERIES: 89C51 Family, TECHNOLOGY: CMOS This microcontroller had 128 bytes of RAM,4K bytes of on-chip ROM, two timers, one serial port and 4 ports(each 8-bits wide)all on single chip. At that time it was also referred to as a â€Å"system on a chip†. The 8051 is an 8-bit processor, meaning that the CPU can work on only 8-bits of data at time. Data larger than 8-bits has to be broken into 8-bit pieces to be processed by the CPU. The 8051 can have a maximum of 64K bytes of ROM, many manufacturers have put only 4Kbytes on chip. The P89C51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, two 16-bit timer/counters, five vector two-level interrupt architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. In addition, the P89C51 is designed with static logic for operation down to zero frequenc and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port and interrupt system to continue functioning. The Power-down Mode saves the RAM contents but freezes the oscillator disabling all other chip functions until the next hardware reset. 2. 3. 3 Memory organization Program Memory Figure below shows a map of the lower part of the program memory. After reset, the CPU begins execution from location 0000H. As shown in fig. , each interrupt is assigned a fixed location in program memory. The interrupt causes the CPU to jump to that location, where it executes the service routine. External Interrupt 0, for example, is assigned to location 0003H. If External Interrupt 0 is used, its service routine must begin at location 0003H. If the interrupt is not used, its service location is available as general purpose. Program memory addresses are always 16 bits wide, even though the actual amount o program memory used may be less than 64Kbytes. External program execution sacrifices two of the 8-bit ports, P0 and P2, to the function of addressing the program memory. [pic] Fig 2. 3. 3 Program Memory 2. 3. 4 Pin diagram of 89C51 [pic] Fig 2. 3. 4 Pin Diagram of AT89C51 2. . 5 Pin description Vcc Pin 40 provides supply voltage to the chip. The voltage source is +5v. Gnd Pin 20 is the ground. Ports 0, 1, 2 and 3 As shown in pin diagram the four ports P0, P1, P2, and P3 each use of 8 pins making the 8-bit ports. All the ports upon Reset are configured as input, since P0-P3 have FFH on them. Port 0 Port 0 occupies a total of 8 pins (pins 32-33). It can be used for input or ou tput. Port0 is also designated as AD0-AD7, allowing it to be used for both address and data. When connecting an 8051/31 to an external memory, port 0 provides both address and data. The 8051 multiplexes address and data through port 0 to save pins. ALE=0, it provides data D0-D7, but when ALE=1, it has address A0-A7. Therefore, ALE is used for demultiplexing address address and data with the help of a 74LS373 latch. In the 8051-based systems where there is no external memory connection, the pins of P0 must be connected externally to a 10k –ohm pull-up resistor. This is due to the fact that P0 is an Open drain, Unlike P1, P2, P3. Open drain is a term used for Mos chips in the same way that open collector is used for TTL chips. In many systems using the 8751, 89C51, or DS89C4x0 chips, we normally connect P0 to pull-up resistors. With external pull-up resistors connected to P0, it can be used as a simple I/O port, just like P1 and P2. In contrast to Port 0, ports p1, p2, and p3 do not need any pull-up resistors since they already have pull-up resistors internally. Upon reset, ports p1, p2, ad p3 are configured as input ports. Port 1 Port 1 occupies a total of 8-pins (pins1-8). It can be used as input or output. In contrast to port 0, this port does not need any pull-up resistors since it already has pull-up resistors internally. Upon reset, port1 is configured as an input port. Port 2 Port 2 occupies a total 8 pins (pins 21-28). It can be used as input or output. However, in 8031-based systems, port2 is also designatedas A8-A15, indicating its dual function. Since an 8051/31 is capable of accessing 64K bytes of external memory, it needs a path for the 16 bits of the address. While P0 provides the lower 8 bits via A0-A7, it is the job of p2 is used for the upper 8 bits of the 16-bit address, and it cannot be used for I/O. Just like P1, port 2 does not need any pull-up resistors since it already has pull-up resistors internally. Upon reset, port2 is configured as an input port. Port 3 Port 3 occupies a total of 8 pins (pins 10-17). It can be used as input or output. P3 does not need any pull-up resistors, just as P1 and P2 did not. Although Port 3 is configured as an input port upon reset, this is not the way it is most commonly used. Port 3 has the additional function of providing some extremely important signals such as interrupts. The below table provides these alternate functions of P3. This is information applies to both 8051 and 8031 chips. Port 3 also receives some control signals for Flash programming and verification. RST Reset input. A high on this pin for two machine cycles while the oscillator is running resets the device. ALE/PROG Prior to each reading from external memory, the microcontroller will set the lower address byte (A0-A7) on P0 and immediately after that activates the output ALE. Upon receiving signal from the ALE pin, the external register (74HCT373 or 74HCT375 circuit is usually embedded) memorizes the state of P0 and uses it as an address for memory chip. In the second part of the microcontroller’s machine cycle, a signal on this pin stops being emitted and P0 is used now for data transmission (Data Bus). In his way, by means of only one additional (and cheap) integrated circuit, data multiplexing from the port is performed. This port at the same time used for data and address transmission. PSEN Program Store Enable is the read strobe to external program memory. When the AT89C51 is executing code from external program memory, PSEN is activated twice each machine cycle, except that two PSEN activations are skipped during each access to external data memory. EA/VPP External Access Enable (EA). EA must be strapped to GND in order to enable the device to fetch code from external program memory locations starting at 0000H up to FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on reset. EA should be strapped to VCC for internal program executions. This pin also receives the 12-volt programming enable voltage (VPP) during Flash programming, for parts that require 12-volt VPP. XTAL1 and XTAL2 The 8051 has an on-chip oscillator but requires an external clock to run it. Most often a quartz crystal oscillator is connected to inputs XTAL1 (pin19) and XTAL2 (pin18). The quartz crystal oscillator connected to XTAL1 and XTAL2 also needs two capacitors of 30pf value. One side of each capacitor is connected to the ground. It must be noted that there are various speeds of the 8051 family. Speed refers to the maximum oscillator frequency connected to XTAL. For example, a 12-MHz chip must be connected to a crystal with 12 MHz frequency of no more than 20 MHz. When the 8051 is connected to a crystal oscillator and is powered up, we can observe the frequency on the XTAL2 pin using the oscilloscope. 2. 3. 6 Timers On-chip timing/counting facility has proved the capabilities of the microcontroller for implementing the real time application. These includes pulse counting, frequency measurement, pulse width measurement, baud rate eneration, etc,. Having sufficient number of timer/counters may be a need in a certain design application. The 8051 has two timers/counters. They can be used either as timers to generate a time delay or as counters to count events happening outside the microcontroller. Let discuss how these timers are used to generate time delays and we will also discuss how they are been used as even t counters. 2. 3. 7 Polling In polling the microcontroller continuously monitors the status of a given device; when the status condition is met, it performs the service . After that, it moves on to monitor the next device until each one is serviced. Although polling can monitor the status of several devices and serve each of them as certain condition are met. 2. 3. 8 Interrupts In the interrupts method, whenever any device needs its service, the device notifies the microcontroller by sending it an interrupts signal. Upon receiving an interrupt signal, the microcontroller interrupts whatever it is doing and serves the device. The program associated with the interrupts is called the interrupt service routine (ISR). or interrupt handler. Six Interrupts in the 8051: 1. In reality, only five interrupts are available to the user in the 8051, but many manufacturers’ data sheets state that there are six interrupts since they include reset . the six interrupts in the 8051 are allocated as above. 2. Reset. When the reset pin is activated, the 8051 jumps to address location 0000. this is the power-up reset. 3. Two interrupts are set aside for the timers: one for Timer 0 and one for Timer 1. Memory location 000BH and 001BH in the interrupt vector table belong to Timer 0 and Timer 1, respectively. 4. Two interrupts are set aside for hardware external harder interrupts. Pin number 5. 12(P3. 2) and 13(P3. 3) in port 3 are for the external hardware interrupts INT0 and INT1,respectively. These external interrupts are also referred to as EX1 and EX2. Memory location 0003H and 0013H in the interrupt vector table are assigned to INT0 and INT1, respectively. 6. Serial communication has a single interrupt that belongs to both receive and transmit. The interrupt vector table location 0023H belongs to this interrupt. 2. 3. 9 Registers In the CPU, registers are used to store information temporarily. That information could be a byte of data to be processed, or an address pointing to the data to be fetched. The vast majority of 8051 registers are 8–bit registers. In the 8051 there is only one data type: 8bits. The 8bits of a register are should in the diagram from the MSB (most significant bit) D7 to the LSB (least significant bit) D0. With an 8-bit data type, any data larger than 8bits must be broken into 8-bit chunks before it is processed. Since there are a large number of registers in the 8051, we will concentrate on some of the widely used general-purpose registers. D7 |D6 |D5 |D4 |D3 |D2 |D1 |D0 | The most widely used registers of the 8051 are A(accumulator), B, R0, R1, R2, R3, R4, R5, R6, R7, DPTR(data pointer), and PC(program counter). All of the above registers are 8-bits, except DPTR and the program counter. The accumulator, register A, is used for all arithmetic and logic instructions. 2. 3. 10 Serial communication Computers can transfer data in two ways: paralle l and serial. In parallel data transfers, often 8 or more lines (wire conductors) are used to transfer data to a device that is only a few feet away. Examples of parallel transfers are printers and hard disks; each uses cables with many wire strips. Although in such cases a lot of data can be transferred in a short amount of time by using many wires in parallel, the distance cannot be great. To transfer to a device located many meters away, the serial method is used. In serial communication, the data is sent one bit at a time, in contrast to parallel communication, in which the data is sent a byte or more at a time. Serial communication of the 8051 is the topic of this chapter. The 8051 has serial communication capability built into it, there by making possible fast data transfer using only a few wires. Serial data communication uses two methods, asynchronous and synchronous. The synchronous method transfers a block of data at a time, while the asynchronous method transfers a single byte at a time. The 8051 transfers and receives data serially at many different baud rates. The baud rate in the 8051 is programmable. This is done with the help of Timer1. The 8051 divides the crystal frequency by 12 to get the machine cycle frequency. The 8051’s serial communication UART circuitry divides the machine cycle frequency of 921. 6 kHz divided by 32 once more before it is used by Timer 1 to set the Baud rate. SBUF register SBUF is an 8-bit register used solely for serial communication in the 8051. For a byte of data to be transferred via the TXD line, it must be placed in the SBUF register. Similarly, SBUF holds the byte of data when it is received by the 8051’s RXD line. SBUF can be accessed like any other register in the 8051. The moment a byte is written into SBUF, it is framed with the start and stop bits and transferred serially via the TXD pin. Similarly, when the bits are received serially via RXD, the 8051 defames it by eliminating the stop and start bits, making a byte out of the data received, and then placing it in the SBUF. SCON (serial control) register The SCON register is an 8-bit register used to program the start bit, stop bit, and data bits of data framing, among other things. Transmit In mode0 the data transmission in form of pulse train automatically starts on the pin RXD at the moment the data has been written to the SBUF register. In fact, this process starts after any instruction being performed on this register. Upon all 8 bits have been sent, the bit TI in the SCON register is automatically set. In mode1 a sequence for data transmission via serial communication is automatically started upon the data has been written to the SBUF register. End of 1 byte transmission is indicated by setting the TI bit in the SCON register. In mode2 TI (transmit interrupt) is bit D1 of the SCON register. This is an extremely important flag bit in the SCON register. When the 8051 finishes the transfer of the 8-bit character, it raises the TI flag to indicate that it is ready to transfer another byte. The TI bit is raised at the beginning of the stop bit. Receive In mode0 data receiving starts through the pin RXD once two necessary conditions are met: bit REN=1 and RI=0 (both bits reside in the SCON register). Upon 8 bits have been received, the bit RI (register SCON) is automatically set, which indicates that one byte is received. In mode1 data receiving starts as soon as the START bit (logic zero (0)) appears on the pin RXD. The condition is that bit REN=1and bit RI=0. Both of them are stored in the SCON register. The RI bit is automatically set upon receiving has been completed. In mode2 RI (receive interrupt) is the D0 of the SCON register. This is another extremely important flag bit in the SCON register. When the 8051 receives data serially via RXD, it gets rid of the start and stop bits and places the byte in the SBUF register. Then it raises the RI flag bit to indicate that a byte has been received and should be picked up before it is lost. RI is raised halfway through the stop bit. 2. 4 Level Indicator Level indicator is used to indicate the different water levels in the dams. Liquid level indicator is used to indicate the water present at what level. Here we are considering three level Low level . Medium level and High level, as the liquid level increases a message is sent to the concern person regard level of water. The main purpose of this level indicator is it checks the water level and gives the input information to micro controller. 2. 5 MAX 232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers (two) and receivers (also two), to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS-232 voltage levels (approx. 10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e. g. -12V, +5V, and +12V), but could just provide one +5V power supply, e. g. with the help of a simple 78Ãâ€"05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs. It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, and it does not provide a serial/parallel conversion. â€Å"All it does is to convert signal voltage levels†. The MAX 232(A) has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. The old MC1488/1498 combo provided four drivers and receivers. The MAX232 is a dual driver/receiver that includes a capacitive voltage generator to supply EIA-232 voltage levels from a single 5-V supply. Each receiver converts EIA-232 inputs to 5-V TTL/CMOS levels. These receivers have a typical threshold of 1. 3 V and a typical hysteresis of 0. 5 V, and can accept  ±30-V inputs. Each driver converts TTL/CMOS input levels into EIA-232 levels. The RS232 standard is not TTL compatible; therefore, it requires a line driver such as the MAX232 chip to convert RS232 voltage levels to TTL levels, and vice versa. The interfacing of 8051 with RS232 connectors via the MAX232 chip is the main topic. The 8051 has two pins that are used specifically for transferring and receiving data serially. These two pins are called TXD and RXD and a part of the port 3 group (P3. 0 and P3. 1). Pin 11 of the 8051 is assigned to TXD and pin 10 is designated as RXD. These pins are TTL compatible; therefore, they require a line driver to make them RS232 compatible. One such line driver is the MAX232 chip. [pic] Fig 2. 5 8051 connection to RS232 MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa. One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies that are common in many older systems. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. In many applications only one of each is used. 2. 6 GSM (Global system for mobile communication) Modem A modem (modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. A GSM modem is a specialized type of modem which accepts a SIM card, and operates over a subscription to a mobile operator, just like a mobile phone. From the mobile operator perspective, a GSM modem looks just like a mobile phone. A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem. Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone. This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem interface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as â€Å"concatenated SMS† or â€Å"long SMS†). This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (We’ve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models. ) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver. An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources. 2. 6. 1 Architecture of GSM network A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. Subscriber carries the Mobile Station. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface. [pic] Fig 2. 6. 1 General architecture of a GSM network Mobile Station: The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services. The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem: The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks. The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations — this information is stored in the location registers. The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AuC) is a protected database that stores a copy of the secret key stored in each subscriber’s SIM card, which is used for authentication and encryption over the radio channel. 2. 6. 2 Smart modem(GSM/GPRS) Analogic’s GSM Smart Modem is a multi-functional, ready to use, rugged and versatile modem that can be embedded or plugged into any application. The Smart Modem can be customized to various applications by using the standard AT commands. The modem is fully type-approved and can directly be integrated into your projects with any or all the features of Voice, Data, Fax, SMS, and Internet etc. Smart Modem kit contains the following items: 1. Analogic’s GSM/GPRS Smart Modem 2. SMPS based power supply adapter. 3. 3 dBi antenna with cable (optional: other types) 4. Data cable (RS232) 5. User Manual Temperature Range: Operating temperature: from -200C to +550C Storage temperature: from -250C to +700C Installing the modem: To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the modem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card [pic] Fig 2. 6. 2 Inserting/Removing the sim card into the modem Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition. Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz. The antenna may be (0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement: Connecting Modem to external devices: RS232 can be used to connect to the external device through the D-SUB/ USB (for USB model only) device that is provided in the modem. 2. 7 LCD (Liquid crystal display) Liquid crystal displays (LCDs) have materials, which combine the properties of both liquids and crystals. Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers are present in between the electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle. When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating/ highlighting the desired characters. The LCD does don’t generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark. The LCD’s have long life and a wide operating temperature range. 2. 7. 1 Pin description of LCD: [pic] VCC, VSS and VEE: While VCC and VSS provide +5V and ground respectively, VEE is used for controlling LCD contrast. The three control lines are referred to as EN, RS, and RW. EN: The EN line is called â€Å"Enable†. This control line is used to tell the LCD that you are sending it data. To send data to the LCD, your program should first set this line high (1) and then set the other two control lines and/or put data on the data bus. RS: The RS line is the â€Å"Register Select† line. When RS is low (0), the data is to be treated as a command or special instruction. When RS is high (1), the data that is sent is a text data which should be displayed on the screen. RW: The RW line is the â€Å"Read/Write† control line. When RW is low (0), the information on the data bus is being written to the LCD. When RW is high (1), the program is effectively querying (or reading) the LCD. Only one instruction (â€Å"Get LCD status†) is a read command. All others are write commands, so RW will almost be low. 2. 7. 2 LCD Interfacing Sending commands and data to LCDs with a time delay: [pic] Fig 2. 6. Interfacing of LCD to a micro controller To send any command from command list to the LCD, make pin RS=0. For data, make RS=1. Then sends a high –to-low pulse to the E pin to enable the internal latch of the LCD. 2. 8 Control System The controlling is done through the motors. Here relays acts as motors. A  relay  is an  electrically  operated  switch. Ma ny relays use an electromagnet to operate a switching mechanism, but other operating principles are also used. Relays find applications where it is necessary to control a circuit by a low-power signal, or where several circuits must be controlled by one signal. The first relays were used in long distance telegraph circuits, repeating the signal coming in from one circuit and re-transmitting it to another. Since relays are  switches, the terminology applied to switches is also applied to relays. A relay will switch one or more  poles, each of whose contacts can be  thrown by energizing the coil in one of three ways: 1. Normally-open (NO) contacts connect the circuit when the relay is activated; the circuit is disconnected when the relay is inactive. It is also called a  Form A contact or â€Å"make† contact. 2. Normally-closed (NC) contacts disconnect the circuit when the relay is activated; the circuit is connected when the relay is inactive. It is also called a  Form B contact or â€Å"break† contact. 3. Change-over (CO), or double-throw (DT), contacts control two circuits: one normally-open contact and one normally-closed contact with a common terminal. It is also called a  Form C  contact or â€Å"transfer† contact (â€Å"break before make†). If this type of contact utilizes â€Å"make before break† functionality, then it is called a  Form D  contact. The following designations are commonly encountered: SPST  Ã¢â‚¬â€œ Single Pole Single Throw. These have two terminals which can be connected or disconnected. Including two for the coil, such a relay has four terminals in total. It is ambiguous whether the pole is normally open or normally closed. The terminology â€Å"SPNO† and â€Å"SPNC† is sometimes used to resolve the ambiguity. SPDT  Ã¢â‚¬â€œ Single Pole Double Throw. A common terminal connects to either of two others. Including two for the coil, such a relay has five terminals in total. DPST  Ã¢â‚¬â€œ Double Pole Single Throw. These have two pairs of terminals. Equivalent to two SPST switches or relays actuated by a single coil. Including two for the coil, such a relay has six terminals in total. The poles may be Form A or Form B (or one of each). DPDT  Ã¢â‚¬â€œ Double Pole Double Throw. These have two rows of change-over terminals. Equivalent to two SPDT switches or relays actuated by a single coil. Such a relay has eight terminals, including the coil. Here in this project we are using single pole single throw. The relay has 3 pins, 1st pin is connected to the input, 2nd pin to the output and 3rd pin is connected to the ground. When input is given magnetic flux is generated and the motor starts rotating and the gate will be opened according to the development. A  motor receives power through two or more relays connected to a power source. A switch-operated logic circuit is powered by a relay power source and connects to the relays. To start the motor, the switch is pressed, causing the logic circuit to close the relays sequentially. When all the relays are closed, the motor will start. If the motor starts before the logic circuit closes all of the relays, the motor is stopped and an indication is provided that the relays that have not yet been closed have failed. Otherwise, the motor runs until the switch is pressed again, causing the logic circuit to open the relays and stop the motor. A power relay is a switch that uses an  electromagnet  to open or close a circuit. The basic design of a relay utilizes an electromagnet coil, an armature, a spring and one or more contacts. If the power relay is designed to normally be open, the circuit is not completed when in the off state. As power is applied to the power relay, generally from a battery source, the electromagnet attracts the armature, a movable arm often made of iron. The armature, which was held in place by the spring, is pulled in the direction of the coil until it reaches a contact, thus closing the circuit. If the relay is normally closed, then the coil pulls the armature away from the contact, opening the circuit. A power relay can be operated using a low amount of voltage but can also conduct a higher amount of voltage. In our project we are using a sub image able motor that is nothing but a motor. When a motor starts, the phase controller applies power to the windings so that they become magnetized with the polarity that attracts the permenant magnets on the rotor; this causes the rotor to begin rotating. As the permanent magnets on the rotor rotate past the electro-magnetic windings the phase controller reverses the polarity on the winding so that the winding repels the permanent magnets on the rotor. As the motor runs, the phase controller keeps switching windings on so that they are always attracting the permanent magnets on the rotor then repelling the permanent magnets on the rotor; this keeps it rotating. CHAPTER 3 SCHEMATIC DIAGRAM Fig 3 Schematic Diagram 3. 1 Circuit description This section gives an overview of the whole circuitry and hardware involved in the project. The required operating voltage for Microcontroller 89C51 is 5V. Hence the 5V D. C. power supply is needed by the same. This regulated 5V is generated by stepping down the voltage from 230V to 12V using step down transformer. Now the step downed a. c voltage is being rectified by the Bridge Rectifier using 1N4007 diodes. The rectified a. c voltage is now filtered using a ‘RC’ filter. Now the rectified, filtered D. C. voltage is fed to the Voltage Regulator. This voltage regulator provides/allows us to have a Regulated constant Voltage which is of +5V. The rectified; filtered and regulated voltage is again filtered for ripples using an electrolytic capacitor 100? F. Now the output from this section is fed to 40th pin of 89c51 microcontroller to supply operating voltage. The microcontroller 89C51 with Pull up resistors at Port0 and crystal oscillator of 11. 0592 MHz crystal in conjunction with couple of 30-33pf capacitors is placed at 18th 19th pins of 89c51 to make it work (execute) properly. Operating voltage for the GSM modem will depends on its type and an adaptor is provided with the GSM modem set itself. Here in this project various levels in dams are monitored and if they exceed the threshold values a SMS is sent through the concerned person. To perform all these activities first of all different levels should be monitor using liquid level indicators. These level indicators are placed in dam at different levels like level1, level2, level3 etc†¦ whenever if any level overflows automatically information is sent to the control section using GSM modem. The controlling part of the water level is also done by the controller through the instructions given by the developer. In this process the controller checks the number of threshold levels that are crossed and according to that the gates are being controlled. When modem receives the message controller will communicate with the modem through serial communication. As we can not directly give the data to the controller due to the voltage level difference between the GSM modem and the controller because GSM modem works on RS 232 logic levels whereas micro controller works on TTL logic levels and also we are using PC in this project which is also a RS 232 logic based. So to have compatibility we are using MAX 232. MAX232 converts from RS232 voltage levels to TTL voltage levels, and vice versa. One advantage of the MAX232 chip is that it uses a +5V power source which, is the same as the source voltage for the 8051. In the other words, with a single +5V power supply we can power both the 8051 and MAX232, with no need for the power supplies. The MAX232 has two sets of line drivers for transferring and receiving data. The line drivers used for TXD are called T1 and T2, while the line drivers for RXD are designated as R1 and R2. By using this to TX and RX pins we are going to communicate with the controller. CHAPTER 4 FLOW CHART TX Loop: [pic] RX Loop: [pic] CHAPTER 5 SCOPE AND FUTURE ENHANCEMENT It can be further enhanced by adding dtmf decoder to control the gate s of the dam and we send one msg to GSM amd that will be send the water level of the dam. If any unauthorized person tries to control the gate the GSM modem activate and that will pass this information to the authorized person. CHAPTER 6 CONCLUSION The project â€Å"DAM LEVEL WARNING USING GSM-SMS† has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced IC’s and with the help of growing technology the project has been successfully implemented. Finally we conclude that â€Å"DAM LEVEL WARNING USING GSM-SMS† is an emerging field and there is a huge scope for research and development. CHAPTER 7 BIBILOGRAPHY 1. WWW. MITEL. DATABOOK. COM 2. WWW. ATMEL. DATABOOK. COM 3. WWW. FRANKLIN. COM 4. WWW. KEIL. COM 5. WWW. NATIONAL. COM 6. WWW. ATMEL. COM 7. WWW. MICROSOFTSEARCH. COM 8. WWW. GEOCITIES. COM 9. 8051-MICROCONTROLLER AND EMBEDDED SYSTEM. -Mohd. Mazidi 10. The 8051 Micro controller Architecture, Programming Applications -Kenneth J. Ayala 11. Fundamentals of Micro processors and Micro computers -B. Ram 12. Micro processor Architecture, Programming Applications -Ramesh S. Gaonkar 13. Wireless Communications -Theodore 14. S. Rappaport Mobile Tele Communications -William C. Y. Lee CHAPTER 8 APPENDIX Source code Software used: Keil software for c programming About keil software: It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each Assembler source file, specifying nother list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user in terface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear. KEIL Greatly simplifies the process of creating and testing an embedded application The user of KEIL centers on â€Å"projects†. A project is a list of all the source files required to build a single application, all the tool options which specify exactly how to build the application, and – if required – how the application should be simulated. A project contains enough information to take a set of source files and generate exactly the binary code required for the application. Because of the high degree of flexibility required from the tools, there are many options that can be set to configure the tools to operate in a specific manner. It would be tedious to have to set these options up every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL can then execute each tool with the correct options. It is also possible to create new projects in KEIL. Source files are added to the project and the tool options are set as required. The project is reloaded and the simulator or debugger started, all the desired windows are opened. KEIL project files have the extension Simulator/Debugger Coding include #include #include sbit M1 = P2^0; sbit M2 = P2^1; sbit M3 = P2^2; sbit L1 = P3^5; sbit L2 = P3^6; sbit L3 = P3^7; sbit Buz = P3^4; void TxMsg(unsigned char *msg,unsigned char *mno) { Send(â€Å"AT+CMGS=†); Send(mno); Delay_high(2); Send(msg); } void main() { bit L1_flag=0,L2_flag=0,L3_flag=0; LCD_Init(); Disp_Str(† Water Level â€Å" ); LCD_Cmd(0xC0); Disp_Str(â€Å"Warning System â€Å"); M1=M2=M3=0; Buz = 1; Delay (200); SConfig(); While (1) { If (L1==0 L2==1 L3==1 L1_flag==0) { L1_flag=1; L2_flag=0; L3_flag=0; Buz = 1; M1 = 1; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** MEDIUM **†); TxMsg (â€Å"Water Level – MEDIUM†,†9951024603†³); TxMsg (â€Å"Water Level – MEDIUM†,†9848997946†³); TxMsg (â€Å"Water Level – MEDIUM†,†9966644775†³); TxMsg (â€Å"Water Level – MEDIUM†,†9299804677†³); TxMsg (â€Å"Water Level – MEDIUM†,†9849974776†³); Delay (200); } else If (L1==0 L2==0 L3==1 L2_flag==0) { L2_flag=1; L3_flag=0; L1_flag=0; Buz = 1; M1 = 1; M2 = 1; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** HIGH **†); TxMsg (â€Å"Water Level – HIGH†,†9951024603†³); TxMsg (â€Å"Water Level – HIGH†,†9848997946†); TxMsg (â€Å"Water Level – HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – HIGH†,†9849974776†³); Delay (200); } else if (L1==0 L2==0 L3==0 L3_flag==0) // Level – 3 { L3_flag=1; L2_flag = 0; L1_flag=0; Buz = 0; M1 = 1; M2 = 1; M3 = 1; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str (â€Å"** VERY HIGH **†); TxMsg (â€Å"Water Level – VERY HIGH†,†951024603†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9848997946†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9966644775†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9299804677†³); TxMsg (â€Å"Water Level – VERY HIGH†,†9849974776†³); Delay (200); }else if(L1==1 L2==1 L3==1) Buz = 1; L1_flag=0; L2_flag=0; L3_flag=0; M1 = 0; M2 = 0; M3 = 0; LCD_Cmd (0x80); Disp_Str (â€Å"Water Level â€Å"); LCD_Cmd (0xC0); Disp_Str ( "** NORMAL**†); } } } KIT PHOTOS OF DAM LEVEL WARNING USING GSM SMS [pic] Kit photo of dam level warning using GSM SMS ———————– GSM MODEM MAX-232 POWER SUPPLY CONTROL SYSTEM LCD LIQUID LEVEL INDICATOR Level-3 – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — – – – – – – Level-2- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – Level-1 – – – – â€⠀œ – – – – – — – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – — ———RESERVIOUR— MICRO CONTRO-LLER Tx Rx P0 P1 P2 P3 COUNTER INPUTS EXTERNAL INTERRUPTS CPU SERIAL PORT 4 I/O PORTS BUS CONTROL OSC TIMER 0 TIMER 1 ON CHIP RAM ON-CHIP RAM ON-CHIP FLASH INTERRUPT CONTROL RESET INTERRUPT L OCATIONS 8 bytes (0033)H 002BH 0023H 001BH 0013H 000BH 0003H 0000H How to cite Water Level Warning by Gsm, Essay examples

Sunday, December 8, 2019

Greek in BCE Essay Example For Students

Greek in BCE Essay New Members There are no fees for anything whatsoever at OPPapers.com. When you become a member at OPPapers.com, you can view full papers, write reviews, post in the forums, add quotes, and post a profile. Your account will be activated immediately. Be sure to include a valid email address in the form below or your account will not be setup properly. If you have donated a paper here before, please go to our claim form. New MembersUsername: Password: Password Again: We ask for your email address for account verification purposes. Your email address will remain invisible! Only your OPPapers.com username will be visible to other visitors. Email Address: (hidden) Sex:Female Male Birthday: JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember 1st2nd3rd4th5th6th7th8th9th10th11th12th13th14th15th16th17th18th19th20th21st22nd23rd24th25th26th27th28th29th30th31st1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 State: (USA Residents: Select a state)AlabamaAlaskaArizonaArkansasCaliforniaColoradoConnecticutDelawareDistrict of ColumbiaFloridaGeorgiaHawaiiIdahoIllinoisIndianaIowaKansasKentuckyLouisianaMaineMarylandMassachusettsMichiganMinnesotaMississippiMissouriMontanaNebraskaNevadaNew HampshireNew JerseyNew MexicoNew YorkNorth CarolinaNorth DakotaOhioOklahomaOregonPennsylvaniaRhode IslandSouth CarolinaSouth DakotaTennesseeTexasUtahVermontVirginiaWashingtonWest Vi rginiaWisconsinWyoming ORNon USA ResidentsSelect a Country: (Non USA Residents)AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurmaBurundiCambodiaCameroonCanadaCape VerdeCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos (Keeling) IslandsColombiaComorosCongoCongo,Democratic Republic of theCook IslandsCosta RicaCote DivoireCroatiaCubaCyprusCzech RepublicCzechoslovakiaDemocratic Yemen (Aden)DenmarkDjiboutiDominicaDominican RepublicEast TimorEcuadorEgyptEl SalvadorEquatorial GuineaEritreaEstoniaEthiopiaFalkland Islands (Malvinas)Faroe IslandsFijiFinlandFranceFrance,MetropolitanFrench GuianaFrench PolynesiaFrench Southern TerritoriesGabonGambiaGeorgiaGerman Democratic RepublicGermanyGhan aGibraltarGreeceGreenlandGrenadaGuadeloupeGuamGuatemalaGuineaGuinea-BissauGuyanaHaitiHeard Island and McDonald IslandsHondurasHong KongHungaryIcelandIndiaIndonesiaIran,Islamic Republic ofIraqIrelandIsraelItalyJamaicaJapanJordanKazakhstanKenyaKiribatiKorea,Democratic Peoples RepublicKorea,Republic ofKuwaitKyrgyzstanLao Peoples Democratic RepublicLatviaLebanonLesothoLiberiaLibyan Arab JamahiriyaLiechtensteinLithuaniaLuxembourgMacauMacedoniaMadagascarMalawiMalaysiaMaldivesMaliMaltaMarshall IslandsMartiniqueMauritaniaMauritiusMayotteMexicoMicronesiaMoldova,Republic ofMonacoMongoliaMontserratMoroccoMozambiqueMyanmarNamibiaNauruNepalNetherlandsNetherlands AntillesNeutral ZoneNew CaledoniaNew ZealandNicaraguaNigerNigeriaNiueNorfolk IslandNorthern Mariana IslandsNorwayOmanPakistanPalauPanamaPapua New GuineaParaguayPeruPhilippinesPitcairnPolandPortugalPuerto RicoQatarReunionRomaniaRussian FederationRwandaS. Georgia and S. Sandwich IslandsSaint HelenaSaint Kitts and NevisSaint LuciaSaint Pier re and MiquelonSaint Vincent and the GrenadinesSamoaSan MarinoSao Tome and PrincipeSaudi ArabiaSenegalSeychellesSiberiaSierra LeoneSikkimSingaporeSlovakiaSloveniaSolomon IslandsSomaliaSouth AfricaSpainSri LankaSudanSurinameSvalbard and Jan MayenSwazilandSwedenSwitzerlandSyrian Arab RepublicTaiwan,Province of ChinaTajikistanTanzania,United Republic ofThailandTogoTokelauTongaTrinidad and TobagoTunisiaTurkeyTurkmenistanTurks and Caicos IslandsTuvaluU.S. Minor Outlying IslandsUgandaUkraineUnion of Soviet Socialist RepublicsUnited Arab EmiratesUnited Arab RepublicUnited KingdomUruguayUzbekistanVanuatuVatican City StateVenezuelaViet NamVirgin Islands (British)Virgin Islands (U.S.)Wallis and Futuna IslandsWestern SaharaYemenYugoslaviaZaireZambiaZimbabweOther (not listed) Paper InformationTitle: Category:American History Biographies Book Reports / Novels Business English History Other Miscellaneous Music and Movies Philosophy Psychology Religion Science Social Issues TechnologyPaper (includ e bibliography)How do I donate my paper?Words/ Pages : 404 / 24

Saturday, November 30, 2019

The Supernatural In Macbeth Essay Example For Students

The Supernatural In Macbeth Essay In Shakespeares Macbeth, specific scenes focus the readers attention to the suspense and involvement of the supernatural. The use of witches, apparitions and ghosts provide important elements in making the play interesting. Examining certain scenes of the play, it can be determined that as supernatural occurrences develop, Macbeth reflects a darker self-image. Macbeth experiences his first strange encounter of the supernatural when he meets the three witches in act one, scene one. After learning of his prophecies to become king, Macbeth states, Glamis, and Thane of Cawdor: The greatest is behind (still to come). (1. 3.117-118). Shakespeare uses foreshadowing, a literary technique, to suggest to his readers the character Macbeth will suffer a personality change. Macbeth also implies his first notions of plotting an evil scheme by this comment. We will write a custom essay on The Supernatural In Macbeth specifically for you for only $16.38 $13.9/page Order now After the prophecies of the witches revealed the fate of Macbeth, the quest of the throne will be his next victory. The witches reveal a fate for Macbeth and imply that a part of what will come to him must come, but they reveal no fate of evil-doing for him and never, even by suggestion, bind him to evil doing. , states literary critic Willard Furnham. Furnham declares the only power the witches obtain over Macbeth is the power of insinuation. By offering to Macbeth the idea of power, the witches push Macbeth to the next level of greed and evil that did not exist prior to the encounter. The murder of King Duncan initiates Macbeths second encounter with the supernatural when he witnesses a floating dagger. As Macbeth awaits the signal to make his way up the stairs, he sees the floating dagger and proclaims, Come, let me clutch thee. I have thee not, fatal vision, sensible (able to be felt) to feeling as to sight, or art thou but a dagger of the mind, a false creation, proceeding from the heat-oppressed brain? (2. 2.33-38). This apparition confuses and frightens Macbeth. He can not comprehend how he can see something and not be able to touch it. Thou leads me the way I was going; and such an instrument I was to use. And on thy blade and hilt, drops of blood which was not so before. Theres no such thing. It is bloody business which takes shape. (2.2.43-49) Here, Macbeth begins to question whether his mind is playing tricks on him. The situation seems quite coincidental considering he is minutes from murdering a man with a similar weapon. He states the apparition takes place due to the bloody business about to occur. The dagger symbolizes the point of no return for Macbeth. If he chooses the path in which the dagger leads, there will be no turning back. Macbeth fears Banquo due to his prophecy to father kings, so Macbeth proceeds to plot the murder of his once friend, which spurs yet another brush with the supernatural. Macbeth attends a banquet at which he witnesses the ghost of his dead friend. (3.4.37-145) The fortunes of the three witches sparked Macbeths desire to murder Banquo and caused him to dig himself into a deeper hole. Macbeths guilt and fear combined drive him to darker and more evil actions in an attempt to cover his past misdeeds. What man dare, I dare. Approach though like the rugged Russian bear, the armed rhinoceros, or th Hyrcan tiger; Take any shape but that (Banquo) and my firm nerves shall never tremble. (3. 4.100-104) Macbeth feels frightened at the sight of the bloody ghost haunting him and is angered that the ghost revealed it self to him. His guilt causes him to proclaim he could take on a rhino, tiger or any other wild animal, but not Banquos ghost. After his encounter with the ghost, Macbeth proceeds to visit the witches one last time to insure his security. .u0b73bd49196ac724f3718a05b1e1c5f9 , .u0b73bd49196ac724f3718a05b1e1c5f9 .postImageUrl , .u0b73bd49196ac724f3718a05b1e1c5f9 .centered-text-area { min-height: 80px; position: relative; } .u0b73bd49196ac724f3718a05b1e1c5f9 , .u0b73bd49196ac724f3718a05b1e1c5f9:hover , .u0b73bd49196ac724f3718a05b1e1c5f9:visited , .u0b73bd49196ac724f3718a05b1e1c5f9:active { border:0!important; } .u0b73bd49196ac724f3718a05b1e1c5f9 .clearfix:after { content: ""; display: table; clear: both; } .u0b73bd49196ac724f3718a05b1e1c5f9 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u0b73bd49196ac724f3718a05b1e1c5f9:active , .u0b73bd49196ac724f3718a05b1e1c5f9:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u0b73bd49196ac724f3718a05b1e1c5f9 .centered-text-area { width: 100%; position: relative ; } .u0b73bd49196ac724f3718a05b1e1c5f9 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u0b73bd49196ac724f3718a05b1e1c5f9 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u0b73bd49196ac724f3718a05b1e1c5f9 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u0b73bd49196ac724f3718a05b1e1c5f9:hover .ctaButton { background-color: #34495E!important; } .u0b73bd49196ac724f3718a05b1e1c5f9 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u0b73bd49196ac724f3718a05b1e1c5f9 .u0b73bd49196ac724f3718a05b1e1c5f9-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u0b73bd49196ac724f3718a05b1e1c5f9:after { content: ""; display: block; clear: both; } READ: Most everyone thinks a veterinarian is just someon Essay After this last visit, Macbeth becomes overconfident and a tyrant, which cause his downfall. The use of supernatural in Macbeth, provides the suspenseful nature of his work. Without the witches, apparitions and the ghost, Macbeth could not have reached his downfall. The use of supernatural in Macbeth caused Macbeth to become a darker and more evil person with each paranormal encounter. BibliographyFarnham,Willard. The Witches. 20th Century Interpretations of Macbeth Ed. Terence Hawkes. New Jersey: Prentice Hall Inc., 1982 p.61-62

Tuesday, November 26, 2019

Read The Instructions In The Uploaded Picture Example

Read The Instructions In The Uploaded Picture Example Read The Instructions In The Uploaded Picture – Admission/Application Essay Example Creating a Reliable Database for Small Business Enterprises – Information Technology Information technology refers to the transfer and access of data through the use of computers. Small business enterprises need to create and design reliable databases for better services and loss minimization. For instance, if a small business man runs a chain of hotels or has a cafà © offering both take in and take away foods, it is prudent for them to design a database for his products (Reid 13). The logical database design will rely on different entities depending on what the cafà © provides most to its clients. The database should put into consideration customer preferences, price list; door delivery if available and a mode of ordering by the clients from the comfort of their homes. For effectiveness, the database should indicate details of the customers, those who buy takeaway, take in and those who prefer to order from their homes. Database will play a significant role for the business by creating a strong customer base and increase their loyalty in case the business person decides to give offers in times of special occasions for his clients. The database should contain all the sales of the day, enable a tracking functionality; this helps in reducing loss and theft from employees. The database should also contain all the details of every single employee working in the hotel/cafà © for easier reference (Reid 13). A reliable database for any single small business enterprise will change the dynamics of the venture, and increase customers hence increased profits. It’s a challenging aspect of the information technology, but every business person should be encouraged to implement it for the benefit of their businesses.Work Cited Reid, Gavin, Small Business Enterprise: An Economic Analysis, Routledge, 2002, Pg 13, Print.

Friday, November 22, 2019

Expository Essay

Expository Essay Expository Essay Expository Essay Expository essay writing should follow this simple structure: introduction, main text and conclusion. Writing expository essay you need to discuss topic and explain your point of view presenting illustrative material. In the introduction give background information on essay topic, to set the foundation for your main text. Expository essay should have a clear essay title and brief introduction.   Do not overload introduction with unnecessary information. You will have an opportunity to write all you want in the main body of your expository essay. Body of expository essay should be as detailed as possible.   However, you should not go beyond the narrowly defined topic as well as you should meet the specific word limit.   Writing an essay, start new paragraph with new idea; however, it should be linked to the previous one. Expository Essay Writing Writing an expository essay avoid using personal pronoun 'I' and passive voice. The final things you need to do before turning in an expository essay are proofreading and revision. Make sure that your expository essay does not fall out of the assigned topic.   If your expository essay is about nature, do not write about humanity.   You may mention the role of humans, but you should not focus is on humanity.   It can be used to support your main points, as an example; however, it should not be the focus of your expository essay. Custom Expository Essay We would like to offer you professional custom expository essay writing service.   Our writers are working hard to ensure high quality of every piece of writing.   Expository essay written by our writer will definitely meet academic requirements of your teacher.  We strive not to be late and assign a writer to help you within a very short period of time (less than 30 minutes).   Why to choose .com? We are honest and reliable, we are responsible and diligent.   Your questions are not left unanswered; your expository essays are not plagiarized.   We are young but educated and devoted writers. You may contact us 24/7 to get an answer on any question you may have.

Wednesday, November 20, 2019

How to Change the Oil in Your Car Essay Example | Topics and Well Written Essays - 1000 words

How to Change the Oil in Your Car - Essay Example Don't be scared, you don't need any high tech gadgets or tools to get the job done. Aside from the oil wrench, you probably already have all the other tools lying around in your garage. Just like with any other task, getting the right tools together is the first step towards successfully completing the job. The tools you will need (Memmer How to Change Your Oil...) include a combination wrench set (closed and open-ended), oil filter wrench, oil catch basin, a zip lock bag and a funnel. For the oil change itself you will need, a new oil filter and 4-5 quarts of oil (refer to your car manual for for grade and number of quarts). Any commercial oil such as Valvoline and Castrol will do the job. Since this work will require you to get down and dirty, you should wear pre-soiled work clothes in case any oil dropping come down on you. Surgical gloves on your hands for better grip on the oil plug and old oil filter are advised for safety reasons but not really necessary. As a further safety p recaution, have a jack and 4 jack stands handy. After getting all of the necessary tools and materials together, you are now ready to begin the change oil process. Now remember, hot oil will drain faster out of your car (eHow How to Change Your Motor Oil). ... Instead, you should jack up the car and place a stand underneath each of the 4 vital weight points (refer to car manual) in order to secure the car above you. Carefully position yourself under the car, making sure to protect yourself against any accidental oil drippings. Now you are ready to locate the oil drain plug. Carefully place the oil catch basin under the drain plug before unscrewing in order to insure that the old oil will not drain into the street or be absorbed into the soil. Now would be the best time to wear the surgical gloves if you want to because the first rush of oil out of that pan is going to be scalding hot. Remember to clean the drain plug then set it aside to replug the hole after the drain is complete. Check the plug for any sign of wear and tear. Replace the drain plug if necessary then replug the oil drain hole. Replugging the drain hole is best done by hand in order to insure that cross threading does not occur. Be sure not to over tighten the plug once you use the wrench to tighten it. Now take a breath, we are almost done. We've got only 3 more important steps to go. In order to fully drain the old oil from the car, you will have to remove and replace the old oil filter located somewhere underneath the car. It is usually positioned somewhere on the side of the engine. You will need the oil wrench to loosen and remove the old filter. Expect the remaining old oil to spurt out from this area so make sure that the oil catch basin is properly positioned to catch the oil. Since an incorrectly attached oil filter can lead to costlier repairs later on, make sure to inspect this area of the motor thoroughly. Using an old but clean

Tuesday, November 19, 2019

Project Management Issue Report Essay Example | Topics and Well Written Essays - 1250 words

Project Management Issue Report - Essay Example As the report declares SRP is related to the rightful promotion of human rights in companies. These rights include – child labor, union management, health and safety of employees, compensation concerns and employee exploitation. It is expected that companies follow a SRP programme maintain a strict and realistic approach to human rights standards. This paper stresses that SRP clearly enlists the need for elimination all types of employee discrimination at the work place. Any kind of unfair treatment needs to be strictly controlled and equal opportunity standards should be maintained. Quality employment techniques and practice cultures offered by the management reveals a strong dedication to socially responsible procurement programs. SRP promotes the necessary condition on companies and organizations to behave responsibly and in shared favor of the society. An effective corporate governance structure smooths the process of fair trading, transparency in company and shareholders laws, observance with appropriate laws and regulations. SRP promotes the initiatives by companies to enhance the variety of suppliers. This pertains to giving contracts to less privileged, underrepresented groups, women owned small and medium scale businesses and services, retired, disabled and minority communities. This in turn assist in creating jobs fo r this underprivileged section of the society and subsequently create a uniform levels of living standards to some extent in the society.

Saturday, November 16, 2019

Cambridge Engineering Selector Essay Example for Free

Cambridge Engineering Selector Essay Apparatus Computer Cambridge Engineering Selector database program Theory The Problem Below is a brief description of the theory regarding this lab: Oars are light, stiff beams. They must also have reasonable fracture toughness (KIC) and acceptable price per unit mass (Cm). The performance index for a light, stiff beam is: M1 = E1/2/? Where E is the Youngs modulus and ? is the density. To select the best materials, perform two selection stages: (i) In stage 1, select materials with M1 7 (GPa) /(Mg/m) (ii) In stage 2, select materials with KIC 1 MPa. m and Cm 100 GBP/kg. CES Selector Materials for Oars: The solution The performance index for a light, stiff beam (M1) is plotted in stage 1. Density is plotted on the x-axis and Youngs Modulus on the y-axis. A selection line of gradient 2, through the point (1.0, 49) is plotted. The constraints on adequate fracture toughness and price are plotted in stage 2. Fracture Toughness is plotted on the x axis and Density on the y axis. A selection box whose upper left corner is at (1.0, 100) is defined. In stage 1, the line representing the performance index is moved up until only a small subset of records remains in the selection. Magnified views of the two selection charts are shown in figures M5.3.1 and M5.3.2 (results intersection and hide failed records on), and the materials passing both stages are shown in figure M5.3.3. Oars for competitive rowing are made from Spruce, or (better) Carbon Fibre Reinforced Polymer (CFRP). Low Tech oars have been made for centuries out of bamboo. Boron Carbide might be acceptable, but it would be too brittle, despite its moderate fracture toughness. Selection Stages The selection methodology behind CES Selector is described in section 1 of the online book CES In Depth Background on Selection Systems. The application of this selection methodology to a specific area (e.g. the selection of the optimum material for an engineering component) is dealt with in the section of CES In Depth for the relevant data module. Before any selection can be performed, the user must specify which of the data tables will be the Selection Table (e.g. Materials, Process etc). This is done in the Project Settings dialog box (or on the Welcome screen when CES is first opened). Only one table can be used for selection in a given project. The filter and form for each data table must also be specified. The recommended filter and form combination for each type of selection is listed below. Selecting records with Selector involves performing a series of independent selection stages. On each stage, the user selects a subset of records. Every record in the current filter for the Selection Table is considered during each stage, and the program automatically keeps track of all the results. One way to perform a selection is to use a Selection Chart. The two axes of a selection chart specify record attributes. The user selects the area of the chart that fulfils the selection criteria. One selection chart is used for each selection stage. A second way to perform a selection is to use a Limit stage, in which numerical limits for one or more attributes are entered in a table. Limit stages can be combined with graphical stages (using selection charts). A single functional requirement (e.g. the strength/density ratio of a material) can be represented by one stage in Selector. In many design situations it is necessary to identify records that satisfy several functional requirements simultaneously, for example high strength/density, high stiffness and low cost/kg for a material. In these cases Selector can perform several selection stages and the program will store the results of each stage automatically. The selection stages can be modified at any time if necessary. At the end of the selection (or at any other time), the user can find out which records passed all, or some of the selection stages. It is important to realise that in this strategy, all records contained in the selection table with applicable data entries are considered in every selection stage (and are plotted on the charts). Therefore each stage is independent of the others. This means that records are never discarded from the selection process, even though they may fail a particular selection stage. So it is possible to find out how every entity performed on each of the stages. The ones that pass all stages will probably be the best choices. Selector can also generate plots of user-defined attributes, which are mathematical combinations of the attributes in the database. Examples are the specific strength el / (el is the elastic limit and is the density), and the performance index for a light stiff beam E / (E is the Youngs Modulus). This facility greatly expands the versatility of the selection process and enables two complex performance requirements to be compared on one selection chart. CALCULATION OF THE GRADIENT FOR BOTH GRAPHS The gradient of the lines in both graphs were calculated using the performance index for the bending of rods, the formula used was: E/P = Youngs Modulus / Density In order to get the above equation into the correct term for a gradient or a curve (y=m x + c) both sides of the equation had to be logged: LOG E LOG ? = LOG C Transpose for LOG E LOG E = LOG ? + LOG C The equation for a straight line is y = mx + c From the above it is fair to mention that: Y = LOG E X = LOG ? M = 1 The performance used in this lab was E 1/2 / P = C If you take log on both sides of the equation above: 1/2 LOG E LOG ? = LOG C Transpose for 1/2 LOG E: LOG C + LOG ? = 1/2 LOG E Multiply both sides by 2 to get LOG E LOG E = 2 LOG ? + 2 LOG C From the above it can be assumed that: Y = LOG E M = 2 X = LOG ? C = 2 LOG C M (The gradient) = 2 The gradient in the first graph of Density Vs. Youngs Modulus is 2. If another performance index is used: K IC / p = c The log of both sides of the equation gives: 2/3 LOG K ic = LOG ? + LOG C Multiply both sides 3/2 gives: LOG K ic = 3/2 log ? + 3/2 log c Y = LOG K ic M = 3/2 X = LOG ? C = 3/2 LOG C M = 3/2 = 1.5 The gradient of the line in the second graph of Fracture Toughness Vs. Density is 1.5 Method The Cambridge engineering selector was the program that was used in order to get the desired materials. The main two properties that the chosen material requires are strength and toughness. In order to get the right material two graphs had to be plotted. The first graph was Youngs Modulus vs. Density and the second graph was Fracture toughness vs. Density. The first thing that had to be done was to select the right units, which are SI units. This was done by going onto Tools, selecting options and then the correct units and currency which was GB Pounds. Select New Project from the File menu Choose the New Graphical Stage command from the Project menu. The Graph Stage Wizard will appear, ready to define the x and y axis of your chart. The procedure for selecting attributes for plotting on the selection chart axes is the same for both axes (and whichever selection table). The steps are as follows: The X-Axis page is presented first. To specify a single attribute, click once on the down arrow to display the drop down list box. Select one attribute, Density. (The Advanced function could be used to create a combination of attributes for one axis.) The title can be changed by the user by typing in the Title field if desired. Let the settings for the axis Scale remain as the default, Logarithmic and Autoscale. You can change the scales to linear and back again, by clicking one of the radio buttons marked Logarithmic and Linear. To switch to the Y-Axis page click once on the other tab. Select the attribute Youngs Modulus from the drop down list box and let the scale be Logarithmic and Autoscale. Click once on OK to exit the dialog. The graph will then be created. Follow the same steps to create the other graph except this time, the y-axis is going to be Fracture toughness. Once both graphs are created, the gradient, which was worked out earlier, has to be put in. In the graph showing Youngs Modulus vs. Density the gradient is 2 and for the graph showing Fracture toughness vs. Density it is 1.5. To put in a gradient line, simply click on the icon on the toolbar which has a picture of a gradient on it. Then a box will appear asking you to enter a value for the gradient. Once the value of the gradient is entered, the gradient will appear on the graph. The line can be moved up and down the graph depending on what kinds of materials are needed. In order to narrow down the number of materials to a few, the line has to be moved carefully upwards until only a few materials are shown in the box. This has to be done for both graphs until only 4 or 5 materials appear in the box showing both stages. Results Engineering Materials Lab All Stages Name Identity Epoxy/HS Carbon Fibre, UD Composite, 0à ¯Ã‚ ¿Ã‚ ½ Lamina MXP_CFTSEPHCUD001 Low Density Wood (Longitudinal) (0.22-0.45) MNW_L_LD Medium Density Wood (Longitudinal) (0.45-0.85) MNW_L_MD PEEK/IM Carbon Fibre, UD Composite, 0à ¯Ã‚ ¿Ã‚ ½ Lamina MXP_CFTPPEICUD001 Conclusion After looking and analysing the results taken from the two graphs, the materials chosen were Epoxy SMC (carbon fibre), low density wood, and medium density wood. ). But in the economical end of manufacturing rowing boat oars, both the wood materials would be selected, as they are reasonably cheap to buy, whereas carbon fibre is more expensive. Costs of materials are not the only concern, as the usage of each material is just as important. Questions could be asked; such as, how often is the boat going to be used? Is it going to be used on a regular basis? All of these questions should be taken into consideration before a decision is made. If an average person who is not a professional rower was going to consume a rowing boat ore, he/she would be better off opting for the one made from low density wood as the wooden ore is a great deal cheaper. On the other hand if the same question was asked to a professional rower, then the rower would pick the ore made of carbon fibre since the price does not come at the top of the list of concern and winning the race is the major objective. Basically, there is a good point and a bad point on each material. This largely depends on the object of buying the ore. If it is to win a race then money is not an option and the consumer would be better off buying the one made from carbon fibre but if the object is to just go rowing for a weekend then the best option would be to go for the oar made from wood simply because there is no likely consistent further use for the ore.