Wednesday, October 30, 2019

Symbol of American Culture - Uncle Sam Essay Example | Topics and Well Written Essays - 750 words

Symbol of American Culture - Uncle Sam - Essay Example History dates the American war with England in the north to 1812. Samuel Wilson was given the tender to inspect and supply American soldiers during the war with meat. He was a renowned meat and pork packer, inspector and distributor in New York. The United States government transported the meat bearing â€Å"U.S† on the barrels since the soldiers knew that the meat was from the government but inspected by Samuel, they started to refer to the meat as Uncle Sam’s. A year later this name was adopted by the populations as the unofficial name for the United States federal government (Swosugrad09 and Miller, pg.4-6). Several other government properties that passed through Samuel for inspection were marked â€Å"U.S†, making the people in the country assume that Uncle Sam was the government. There was a need to give Uncle Sam a figure to aid in his symbolism top the American people. Designers started to create their own images of Uncle Sam for drawings, banners and news papers. Moreover, recruitment process for the American army for the First World War, created an avenue where Uncle Sam was personified. The drawing showed a man with a stern face, clad in a blue coat, white shirt and a hat with stars on it. This was a representation of the American flag which had blue, white and red with 49 stars in it. The man was drawn with a pointed finger with large captioned words beneath it, making it ‘talk’ to people. ... In the move by congress to improve the security of the country and its people, the congress sought to use cameras and computers in the resident’s houses to monitor any security threats. Newspapers columnists who were opposed to the move wrote articles and referred to the government as Uncle Sam keeping an eye on his people. This concludes all that Uncle Sam does is a symbol not to represent the people, but the government itself. Variations in government actions have led to deviation in the representation of Uncle Sam to the people. When a positive gesture is done or achieved by the government, Uncle Sam is dressed in United States symbolic colors representing his good will for citizens. When the government makes policies that the citizens feel go against their wishes, he is represented in drawings clad in plain clothes indicating it is against wishes of the American citizens. Uncle Sam also has had greater acceptance with his symbolization of patriotism. He was made famous in two periods where the American citizens were in need of a father figure. His influence during the war in 1812 and later his presence that motivated the Americans in the First World War proved his call for patriotism. Moreover, with the current changes that have undergone in the United States, Uncle Sam figure has not lacked some criticism. First, with the increase in the minority presence in the United States population, the figure is seen not to adequately represent them. Uncle Sam evolved when American was mainly made up of the white population. Additionally, with the current changes in demography and increase in minority groups in the country’s vast population, Uncle Sam may lose some of his prominence among the people. The minority population may demand the

Monday, October 28, 2019

From Production Line to Segmentation of Production Essay Example for Free

From Production Line to Segmentation of Production Essay 1. Introduction Competition has changed: Technical Innovations, globalisation of markets, cultural shifts within societies and new and efficient competitors put strain on the organisation of production within a firm. Many markets display a state of saturation that leads to a change in growth: Not quantitative growth is what firms are aiming at, but qualitative growth (Wildemann 1998:1). The improvement of the production is one way to establish qualitative growth its means are twofold (at least): First, it is possible to change the production in order to produce a better output with less cost. Second, it is possible to synchronise production and market as to enable the production to react quickly to changes in the market, i.e. the consumer behaviour. One way to reach both aims is to reorganise the production, i.e. to segment the production: With the establishment of product oriented production units a cheaper production is possible (Maier 1993: 25). Economics owe the focus on the segmentation of production with all its advantages to Wickham Skinner (1969, 1974 and 1986). With his book The Focused Factory he provided the ground for what is nowadays discussed under the headline: segmentation of production. Skinner did not develop a new insight in efficient ways to produce; he transferred to the American and European auditorium what has been practiced in Japan since the beginning of Industrialisation. This paper deals with change; with the change in the way cars are manufactured. A car manufacturers production unit until now divided into different production lines has to be transformed into segmented production. This is a big change; a change, which has to be dealt with in other words, it, is a case for change management. The scope of this paper is therefore not limited to displaying the advantages of a segmented production (which nevertheless will be done in chapter 2), but extends further to the management of the respective change. Chapter 4 is devoted to the change management: How should the new organisation of production be implemented? What problems may occur? What solutions to the problems can be provided? These and more questions will be put and answered in chapter 4. In chapter 3 a brief overview of change management within the (alleged) broader framework of project management will be given. Chapter 5 sums the results obtained in the previous chapters and evaluates the va lue of change management. 2. Efficient production with segmented production units Segmentation of production is according to Wildemann a holistic approach, aiming at a better market- and product orientation of the firm (Wildemann 1998: 31). Therefore, it is necessary to link production units to a specific product. By that, the relation to Skinner is establish, who discovered the focussed factory for the Western Economies: a companys competitive strategy at a given time places particular demands on its manufacturing function, and, conversely () the companys manufacturing posture and operations should be specifically designed to fulfil the task demanded by strategic plans (Skinner 1969: 138-139). A focussed factory means accordingly flexible reactions to market changes and the cost efficient realisation of strategic plans, e.g. the development and introduction of new products. The focused factory is not a big factory. It is rather a small one where the different production units are linked to a specific segment of the market a specific product: A factory that focuses on a narrow product mix for a particular market niche will outperform the conventional plant, which attempts a broader mission (). Its [the factorys with the narrow product mix] equipment, supporting systems, and procedures can concentrate on a limited task for one set of customers. () Such a plant can become a competitive weapon because its entire apparatus is focused to accomplish the particular manufacturing task demanded by the companys overall strategy and marketing objective (Skinner 1974: 114). Given the fact (provided it is a fact) that smaller firms or factories are compared to bigger firms or factories and with respect to costs and production better off, it is not surprising that there is a considerable trend to segmenting the production. Furthermore, transaction costs within a small or segmented firm are smaller compared to the bigger ones. A transaction is the delivery of a property or good via an interface that can be technically divided. One activity ends another starts (Williamson 1990:1). While crossing the interface a sample of costs is produced costs that can be at least in parts avoided: The aim of a segmentation of production is to disentangle production units and capacity. Large units should be divided in small units. Teamwork should be establish small teams giving the individual employee more responsibility. This should result in more autonomy of the individual employee, and boost his or her motivation, thereby increasing the quality of the work done by the employees. In Germany, it was Dietmar Tress who conceptualised for the first time smaller units as an organisational structure. Smaller Units, so his thesis, reduce the time that is needed to produce a product. The lesser time it takes to produce a good or a product, the better the competitiveness of a firm, the better its ability to deliver goods and the smaller the amount of capital needed to produce the respective good or product. While evolving his thesis Tress realised the reasons that stood against an effective production. The reasons mentioned by Tress are: division of labour, old patterns of reasoning and bureaucracy (Feser 1999: 19). Having carved out the problems, Tress submit his solution: He proposes that all necessary functions (for the production) and the aimed link between product and demand should be concentrated in a single hand and that the production flow should be kept within reasonable limits (Tress 1986: 184). According to Tress it is decisive that the production flow is c lear, understandable, and transparent. A single employee should be able to single out his or her contribution to the product (Tress 1986: 185). Segmenting the production further provides capacity utilisation and to reach that goal teamwork is needed: Small groups of employees should work in a self-responsible way within decentralized teams. Furthermore, those teams should take over different tasks. At this point the interrelation between the discussion on segmenting production and the discussion on human resource management becomes obvious. According to Baron and Kreps (1999: 3) Human Resources are the key to organizational success or failure. Human resource management including the concepts of intrinsic and extrinsic motivation may be seen as the countermovement to the alienation of the worker form the product of his work, as observed by Karl Marx in the 19th Century: Workers who contribute more broadly to a final product () are more apt to identify with a product and to reflect pride in its quality (Baron Kreps 1999: 317). Identification with a product raises the working morale, which means that the work satisfaction goes up. Worker or employees, who are content or satisfied with their work, work better. The determinants enabling this comfort are established by segmenting the production. And that is, where the problem starts: How can a segmented production be implemented? How can a factory divided in production lines become a focused factory divided in small working units or teams? The question at hand is a question of change management or project management. In the next part, the project of change will be unfolded. 3. Projects for managing change Change is something that happens all the time and everywhere. But change within a firm or to put it more scientifically change within economics appears to be a frightening prospect. Change cannot be left to itself; it has to be planned, controlled and coordinated. Problems, rising in the pursuit of change, have to be predicted, dangers for the project have to be identified and eliminated. All this is done by change management or within the (alleged) broader scope of project management. To put it differently, change management is the trial to direct change into the right channels. Project management is the trial to direct everything new within a firm into the right channels. It appears that there is not much difference between project and change management, one can almost say, they are different words meaning the same. A project is considered to be something unique, something that will not be repeated (Schelle 1999: 11). Project management means the totality of executive functions, the techniques, and means necessary to carry out a project. Replacing project by change, change management can be addressed as the totality of executive functions, techniques, and means that are necessary to alter something old into something new. At first it is according to most authors of the utmost importance for a change or project management to establish a structure plan, in which the implementation of whatever should be changed, is scheduled according to a time table connected with goals that have to be reached at a certain point in time. The structure plan is according to Schelle (1999: 93) a simple and useful tool. The structure plan is the meta plan. Apart from the structure plan there is the running order listing sub goals and so on. Once a project is initiated the control of the project is of crucial importance. A constant control is necessary to identify deviations from the plan or goal as soon as possible and to steer against unwanted consequences (Nà ¯Ã‚ ¿Ã‚ ½chter 2003: 377). Project control in this sense means to identify problems, to solve the problems, to recalibrate the project after some deviations from the plan occurred and to rescue the goal in spite of serious problems. Problems may emerge from different sources: Externalities may cause problems: Green activists may occupy the land that is designated to host the new factory, due to a seldom species of warbler. The construction of the new building itself may cause problems: A building contractor may file for bankruptcy. A delay in constructing the new factory may lead to an explosion of the costs and so on. Apart form those externalities there are sources that nurture problems within the firm: Employees may fear for privileges, for their job or for loosing power. Resistance to the change may arise from different sources all linked to the fact, that men is unwilling to change what seems to be good and worked well until now. And to convince employees of the benefits that come along with the new way of producing one thing is needed: change management. 4. From production lines to segmented production: An example Company R wants to segment its production. Being a car manufacturer organized in different product lines the company wants to become a focussed factory by establishing two production units each producing a specific type of cars. While segment A is chosen to produce the mini from start to end, segment B should produce the sport car. At the start of the change, company R is organised as follows in part 1 of the company the car body is being build, in part 2 the car body is being varnished and in part 3 the different parts of the car are being assembled. In the future company R shall be structured as follows: in line A the car body of the mini is being build, varnished and furthermore, the mini is being assembled; in line B the car body of the sport car is being build, varnished and assembled; At the moment three interfaces exist within company R: Between the car body builder, the varnish, and the assembler. Between these three parts of the company a steady flow of material has to be ensured. Furthermore, all three parts of the company depend on different suppliers. In the past a bottleneck between car body builder and the varnish has become a rule resulting in a temporarily standstill. So the new structure of the firm should guarantee a full capacity utilisation, by reducing the logistic efforts necessary to provide each of the three parts of the company with its amount of supply to avoid a standstill of machines and employees. Moreover, the link between company R and its markets should become closer. At the moment the company produces a monthly number of cars irrespective of the demand. If the demand goes up, the employees have to work overtime to satisfy the demand. If the demand goes down, the employees do their daily stint and the cars that cannot be sold were stored causing storing-costs. And this is where the project change comes into being. 4.1. Planning the change There are a lot of variables that administer a certain influence on the project deciding whether it is going to be a success or a failure. According to Eckrich (2003) two of those variables can be dubbed as structural and cultural conditions imposed by the environment within the firm or company. Structural conditions relate to the hierarchy within the company, while cultural conditions describe the way the employees within a company treat each other. Eckrich distinguishes cultural conditions into behaviour, attitudes and values, a distinction that reminds at concepts indigenous to social psychology. While social psychologists quarrel with each other on the relation between attitudes and behaviour (some of them even asking if there is any relation between both, cf. Six 1975, Bierhoff 1993: 280-288), Eckrich holds the opinion, that the behaviour of people is influenced if not determined by their attitudes, and by knowing the attitudes one can deduce the behaviour. Consequently, he recommends a questionnaire at the beginning of the change management project to discover the attitudes of the employees concerning the change of their working environment. Company R is a rather small company, employing 803 employees. It is best described as a company with flat hierarchies, stratified in management, departmental managers and masters. While the aim of this paper is to show the problems associated with the project change (or at least those that may be associated with the project change), I assume that the employees of company R take a critical stance to the change of the production, some of them even form a sort of resistance. Especially among the masters resistance is widespread. They fear they might loose responsibilities and some of them think they might even loose their job. The core of this paper is therefore concerned with what is called by Uebel and Helmke (2003: 415) escalations caused by individuals (personenbedingte Eskalationen). Escalations caused by individuals have to be distinguished from quantitative escalations and from qualitative escalations at least according to Uebel and Helmke (2003: 416). Of particular interest for this paper are escalations caused by individuals. (One might wonder if there are escalations which can be though of as being not caused by humans.) 4.2. Controlling the change Control is a matter of plan. To evaluate the progress of the project, the project manager has to look at the structure plan. He has to compare whether what has been reached is identical with what should have been reached. According to Nà ¯Ã‚ ¿Ã‚ ½chter (2003: 395) this is crucial, since it is the only possibility to identify deviation from the plan. To serve the purpose of early warning system the structure plan must be enriched with data, with the amount of time worked on a particular (interim) goal of the plan, with the state of the art and so forth. With respect to company R these rather general advices come to life: Important for the success of the segmentation in the company is an additional qualification of the employees. Furthermore, their work after the segmentation will be varied, i.e. they will have more different tasks to fulfil. This is in accordance with the results of the human resource management saying that employees that are not tied up in their daily routines, but kept busy with a bunch of different tasks show a higher degree of motivation and in the end do a better job than employees tied up in their daily routine. Independently from the results of the human resource management the change in company R is more than some can bear. For some employees the additional qualifications they are expected to achieve are a heavy burden and for the masters it becomes clear that the new structure of the company can only be reached by taking away the responsibilities from the masters. And in the end, Angst (fear) arises, and An gst (fear) is the widespread cause for resistance. 4.3. The problems of change Angst (fear) has been identified as the main reason of those showing resistance to the project of change. Following Uebel and Helmke (2003: 424), Angst (fear) can be subdivided into fear for power and fear for subject. While those with fear for power oppose the project due to their expectation that they will loose power, which means in the first place influence within the company, those with fear for subject oppose the project due to their expectation that they will loose responsibilities. The distinction is not a sharp, but rather arbitrary one. It is not obvious that the loss of responsibilities is not accompanied by a loss of power. However, those with fear for subject are anxious that they might loose reputation, end up with a smaller budget and so on. It has to be mentioned that Angst is a rather peculiar word for what is meant by Uebel and Helmke. They describe the common place that change has its pros and its cons. While change brings some advantages, some advantages of the old times will be lost. In other words, change may become a trade-off or worse, change might mean redundancy. Therefore, it is obvious from the very beginning that change management has to deal with problems. Problems are not something that arises as a matter of bad circumstances. Problems are the natural companion of change. In company R there are problems. The change of the production modus has been scheduled for spring and that was a mistake. In spring the demand for sport cars is high and a high demand and a different work environment is too much. The employees faced with frequent delays and the necessity to work overtime is dissatisfied. Resistance rises to protest. It starts with unofficial meetings held be employees and ends up in strike. The production stands still and so does the project. Change, it seems, has stopped. Uebel and Helmke write a lot about Angst (fear) and the different shapes it may use, and the risks Angst holds for the success of the project. But, as is the fact in company R, what can one do, if the problems are that massive that the project can be doomed to failure? Uebel and Helmke provide no answer. Instead they pronounce the value of plans for the crisis. One has to formulate worst-case scenarios within those plans (Uebel Helmke 2003: 428). Worst-case scenarios may be back or forward oriented. Backward orientation means that the problems can be solved and the goal of the project can be reached. Forward orientation means the contrary. The project is a failure and the plan has to include the plan X the withdrawal with as less causalities as possible. This provides no solution for company R. Is the change from line production to segmented production a failure? Is there a possibility to carry on? Hansel and Lomnitz (2003: 131-134) mention that there are no possibilities to reduce resistance with respect to specific goals of projects: An employee who will lose his job will not act in favour of the proposed change. To expect that, is out-of-touch. Furthermore, there are employees for whom it is dubious whether they will win or loose in the course of the project. So: resistance is natural and the only way to deal with resistance is communication and information. Transparency is the golden rule. The employees should know what change would bring, why change is necessary (Hansel Lomnitz 2003: 134-135). Maybe information can lead to a good end for company R. Rumours are the cause for concern in company R. Rumours about the real aim of the project being a job killer. Other rumours concern plans to reduce salary suspecting the hidden intention behind the plan to segment production is to cut down salaries. Those rumours may be dealt with in an agency theoretical framework: The relationship of agency is one of the oldest and commonest codified modes of social interaction. We will say that an agency relationship has arisen between two (or more) parties when one, designated as the agent, acts for the other, designated the principal, in a particular domain of decision problems (Ross 1973: 134). Starting from here it has to be considered that both sides face some information shortcuts, with the employees having no distinct knowledge of the goals pursuit by the management and the management having no accurate assessment of the behaviour of the employees during the course of the project and thereafter: In the course of the action some problems may arise due to the fact that information is not fully spread. The problems are labelled within the Agency theory as averse selection, meaning that one cannot be sure, if what the principal or the agent claims to provide is in fact what he can provide, moral hazard, which means that an agent or an principal can defect after the contract is established and hidden intention, speaking for itself (Krapp 2000). This excursion trip into the fields of agency theory results in the knowledge that Hansel and Lomnitz are right: The solutions to the problems the agency theory analysis is usually a form of information included in a contract. (Leaving the monitoring of the agent by the principal and the bonding of both to given promises aside.) So information, i.e. the spread of information may be a possible escape from the deadlock for the project change of company R. First, as a signal of confidence the project manager has been dismissed. He has proven to be unable to manage conflict. Under his rule rumour mill flourished and the actual state of the (project) art is much behind the expected state. The new project managers first act was to hold a meeting with all employees and to tell every single employee what he has to expect. In the end he succeeds in cranking the project. 4.4. The change or the end of the project In the course of the project experiences and knowledge should be collected for further or future change management, so as to learn from the errors made. The end of the project is marked by stocktaking. What has been reached is confronted with what should have been reached. Company R is nowadays a car manufacturer with a segmented production and therefore able to adapt its production in short time to the demand of the market. The segmented production started some weeks later than it has been scheduled, which is owed to the problems reported above. But the policy adapted by the new project manager has proven to function. He has succeeded in creating a common spirit and calming down the moods. The fact that work will be much more varied after the change has increased the motivation of most employees, the success of the project has become the intrinsic motivation for those employees: According to this survey, a large percentage of employees seem motivated at work by something other than the compensation received. () 72% responded that theyd continue to work even if they were already financially comfortable for the rest of their lives. Half the survey respondents agreed with an item stating that what I do at work is more important to me than the money I earn' (Baron Kreps 1999: 101). There is a specific quality inherent to work, a quality that is different from the motive to make a living. Intrinsic motivation stands for the fact that some or many or most of the workers want to do a work that is interesting, sophisticated, and provides a certain amount of reputation. Some of the employees of company R realised that a segmented production goes along with new job opportunities, with more responsibilities, with a flexible work scheme and so forth. Those employees made the change to their own project, a project they wanted to support and did support. 5. About change and its management The aim of this paper is twofold: on the one hand the subject is change management. But change management is a general concept, which one can describe in general terms as did Uebel and Helmke (2003). The problem is, that general terms despite sounding good have nothing to say about the management of change. Therefore, an example have been chosen to elucidate what change management really is. Change of a car manufacturers production from production lines to a segmented production, has been chosen as an example. The segmentation of the production is expected to be a project of change management that can often be found in reality. This is due to the advantages a segmented production provides its users with: a more flexible reaction to the demands of the market and a less costly production. Having established the example used to exemplify the change management it was necessary to describe what is known as project management. Thereby, it could be shown that the topics of project management and change management are not different as they both deal with new things that should replace old things. So it has been decided to treat them as equal. Then company R has been introduced. Company R is a medium sized company with flat hierarchies and massive problems occurring during the course of the change from production line to segmented production. The problems or escalations as some dub them are related to individuals, individuals or employees who resist for different reasons the proposed change. To deal with resistance and to provide the ground for the new organisation of the production is the task of change management. And, it appeared, that the best way to manage change is by adapting an open communication policy. This is what Hansel and Lomnitz propose and what has been derived from a brief look at the agency theory: Both sides trying to establish a deal have an information deficit on their side. Both do not know, if their counterpart is opportunistic in the sense of Williamson (1990), i.e., that he is trying to cheat. This is what the rumour mills in company R produced: the segmented production is a fake used by the management to cut down salaries, sack employees and rationalize the company. In the end, the project manager had been sacked and the segmented production had been established. The key to the solution was information and intrinsic motivation. Information had been provided by the new project manager, telling the employees that no one will be sacked and that salaries go if anywhere than up. Furthermore, the hint that a new organisation of the production provides new opportunities for qualification and new responsibilities raised the intrinsic motivation of many employees. They made the change to their project and supported it. And at the end of the paper a rule for change management can be derived: For a successful management of change it is necessary to involve the employees and to improve intrinsic motivation. 6. Literature Baron, James N. Kreps, David M., 1999: Strategic Human Resources. Frameworks for General Managers. New York a.o.: John Wiley. Beer, M., Eisenstat, R.A. and Spector, B., 1990: The Critical Path to Corporate Renewal. Boston, Massachusetts: Harvard Business School Press Bierhoff, Hans-Werner, 1993: Sozialpsychologie ein Lehrbuch. Stuttgart: Kohlhammer. Burghardt, Manfred, 2002: Projektmanagement. Leitfaden fà ¯Ã‚ ¿Ã‚ ½r die Planung und Steuerung von Entwicklungsprojekten. Erlangen: Publicis Corporate Publishing. Feser, Bjà ¯Ã‚ ¿Ã‚ ½rn, 1999: Fertigungssegmentierung. Strategiekonforme Organisationsgestaltung in Produktion und Logistik. Wiesbaden: Deutscher Università ¯Ã‚ ¿Ã‚ ½ts-Verlag. Hansel, Jà ¯Ã‚ ¿Ã‚ ½rgen Lomnitz, Gero, 2003: Projektleiter-Praxis. Optimale Kommunikation und Kooperation in der Projektarbeit. Heidelberg, Berlin, New York: Springer. Krapp, Michael, 2000: Kooperation und Konkurrenz in Prinzipal-Agent-Beziehungen. Wiesbaden: Deutscher Università ¯Ã‚ ¿Ã‚ ½ts-Verlag. Lewin, K., 1947: Frontiers in Group Dynamics: Concept, Method and Reality in Social Science; Social Equilibria and Social Change. Human Realtions, 1 (1); 5-41 Maier, Denis, 1993: Einfà ¯Ã‚ ¿Ã‚ ½hrungsstrategien fà ¯Ã‚ ¿Ã‚ ½r Fertigungssegmentierung. Eine empirische Untersuchung. Università ¯Ã‚ ¿Ã‚ ½t Mà ¯Ã‚ ¿Ã‚ ½nchen: Dissertation. Marshak, R.J., 1993. Lewin Meets Confucius: A Re-View of the OD Model of Change. Journal of Applied Behavioral Science, 29 (4): 393-415 Mintzberg, H., 1978: Patterns in Strategy Formation. Management Science, 24 (9): 934-948 Nà ¯Ã‚ ¿Ã‚ ½chter, Norbert P., 2003: Projektkontrolle. S. 375-392 in: Bernecker, Michael Eckrich, Klaus (Hrsg.): Handbuch Projektmanagement. Mà ¯Ã‚ ¿Ã‚ ½nchen, Wien: R. Oldenbourg. Nà ¯Ã‚ ¿Ã‚ ½chter, Norbert P., 2003: Projektsteuerung. S. 393-411 in: Bernecker, Michael Eckrich, Klaus (Hrsg.): Handbuch Projektmanagement. Mà ¯Ã‚ ¿Ã‚ ½nchen, Wien: R. Oldenbourg. Rinza, Peter, 1998: Projektmanagement. Planung, à ¯Ã‚ ¿Ã‚ ½berwachung und Steuerung von technischen und nichttechnischen Vorhaben. Heidelberg, Berlin, New York: Springer. Ross, Stephen A., 1973: The Economic Theory of Agency: The Principals Problem. American Economic Review 63 (2): 134-139. Schelle, Heinz, 1999: Projekte zum Erfolg fà ¯Ã‚ ¿Ã‚ ½hren. Projektmanagement systematisch und kompakt. Mà ¯Ã‚ ¿Ã‚ ½nchen: dtv. Skinner, Wickham, 1986: The Productivity Paradox. Harvard Business Review 64, 55-59. Skinner, Wickham, 1974: The Focused Factory. Harvard Business Review 52, 113-121. Skinner, Wickham, 1969: Manufacturing Missing Link in Corporate Strategy. Harvard Business Review 47, 136-145. Six, Bernhard, 1975: Die Relation von Einstellung und Verhalten. Zeitschrift fà ¯Ã‚ ¿Ã‚ ½r Sozialpsychologie 6, 270-296. Tress, Dietmar W., 1986: Kleine Einheiten in der Produktion: Wer wachsen will, muss kleiner werden. Fà ¯Ã‚ ¿Ã‚ ½hrung und Organisation 55, 181-186. Uebel, Matthias F. Helmke, Stefan, 2003: Eskalationsmanagement in Projekten. S. 413-429 in: Bernecker, Michael Eckrich, Klaus (Hrsg.): Handbuch Projektmanagement. Mà ¯Ã‚ ¿Ã‚ ½nchen, Wien: R. Oldenbourg. Wildemann, Horst, 1998: Die modulare Fabrik. Kundennahe Produktion durch Fertigungssegmentierung. Mà ¯Ã‚ ¿Ã‚ ½nchen: TCW-Transfer-Centrum GmbH. Appendix 1 Theoretical Framework Phase Models of Organizational Change Any change process can be thought of as going through distinct phases or stages. The purpose of this section is to provide theoretical background information of phase models of change. Linear Models Linear models see the change process as linear, progressing from a present state, through a transition state to a future state. The implicit assumption is that the future state is more desirable than the present state. Lewin provided one of the early fundamental linear models of the change process. He observed that any living system is always in a state of change, but will tend toward a quasistationary equilibrium. (Lewin 1947: 15-16). The level of behaviour of the system at any moment is the result of two sets of forces: those striving to maintain the status quo and those pushing for change. When both sets of forces are equal, current levels of behaviour are maintained. In order to change the equilibrium, one can either increase those forces pushing for change or decrease those forces maintaining the current state. Lewin viewed the change process as consisting of three phases or stages (Lewin 1947: 34-35): 1. Unfreezing. This step involves the forces maintaining the systems behaviour at the current level. Unfreezing is accomplished by introducing information that shows discrepancies between behaviours desired by group members and those behaviours they currently exhibit. 2. Moving. This step shifts the system to a higher level of group performance. It involves developing new behaviours and attitudes through changes in structures and processes. 3. (Re-)Freezing. This step stabilizes the system at a new state of quasi-stationary equilibrium. It is accomplished through the use of supporting mechanisms that reinforce the new state, such as systems, structures and policies. The new equilibrium can thus be made relatively secure against change (Lewin 1947: 35). Circular Models While the linear models follow the European science, East Asian and Confucian traditions offer a very different theory of change. The model of change underlying Confucian philosophies was summarized by Marshak (1993). As shown in Figure 1, there is continual cyclical movement among the five elements that make up the universe. Movement is a natural process and occurs in a specific sequence. When it is out of balance or out of order, unfortunate consequences result. Thus in this model everything and everyone is interconnected and part of continuous cycles of change. Figure 1: Five agents cyclical change according to East Asian philosophy (source: Marshak 1993:399) Appendix 2 Theoretical Framework Overview of the Three Forces for Change In the literature of organizational change, there is a widespread disagreement whether change should be implemented top-down or bottom-up. Top-Down Direction Setting Top-down change is seen to have the advantage of a clear direction towards an end state, to provide the integrated perspective that only top management can provide and to promise rapid change. However, top-down change can often lead to resistance and lack of commitment from middle managers and employees who might feel that top management does not really understand the problem. With regard to the RM Division, it becomes clear that management follows a top-down approach. RM`s general managers take major decisions on new technology an workers are not included in the decision-making process. The result is a lack of commitment and machine operators use any means they could to beat the system. Bottom-Up Performance Improvement The other line of argument favours a bottom-up approach to change, as this seems to address many of the shortcomings of top-down change by actively involving employees in the change process. But also a pure bottom-up approach has its problems. It often lacks direction and a link to corporate strategy, it can lead to costly duplication of effort, it often leads to little transfer of learnings and it can be slow to get results (Beer et al. 1990: 68). The RM Division did not follow a bottom-up approach for implementing the change. It is worth mentioning at this point that the RM management missed, as a result of not actively involving the employees into the change process, to address the disadvantages of a top-down approach. In addition, the above-mentioned advantages of a bottom-up approach were not realized during the change process. Horizontal Process Redesign Recognizing the limits of the pure top-down or bottom-up approaches to change, some authors have therefore argued that the solution is to combine the two approaches (Beer et al.1990). A combination of the two approaches holds the promise of obtaining their respective benefits while minimizing their disadvantages. However, it is argued, that fundamental change requires not only top-down direction and bottom-up performance improvement, but also a third force for change: horizontal process redesign. Horizontal process redesign views organizations as made up of key processes that produce a result for the customer. It attempts to bring the benefits of process thinking to the whole organization and emphasizes the importance of redesigning a small number of core business processes that cross the traditional functional boundaries. Likewise, it can occur at three levels: across organizations, across functions and within functions (see Figure 2). Horizontal process redesign sees reengineering as a key activity at all levels of the organization. However, in order to avoid sub-optimisations, one should start at the top management by mapping out the high-level processes first. In this way, once the subprocesses are considered, their role within the higher level processes are clear. This was not being realized at the RM Division: Instead of defining and explaining the new processes to the workforce, only immediately prior to the introduction of the new technology management had explained to the workforce the basic principles behind automation, disregarding the need for understanding the new processes. Particularly a proper introduction of the new core processes across functions was neglected. These mainly included the fact that previously, operators were involved in setting and adjusting machinery and now were simply operating their machines. At the same time, the process control department was to take greater responsibilities, and to be expanded. Would management have explained the new processes properly, operators would have been clearer about their role in regard to the process control department. Instead they found themselves in a favourable position, performing wider functions than management expected of them. In addition, they could use non-optimum methods to achieve the best possible piecework rates for subsequent production and only reluctantly gave up any rights to use the controls. This all can be seen as a result of a missing explanation of the redesigned core processes to the workforce. The second major problem was that of re-establishing piecework rates on the new machinery, because operators were enjoying average earnings and resisted this move. At this point it would have been helpful to establish a detailed timeframe in which the phases of the change process are listed, in connection with the procedure of handling the piecework rates during and after each phase. The basic agreement, which was being made, did not serve this purpose.

Saturday, October 26, 2019

My Philosophy of Education Essay -- Philosophy of Education Statement

Philosophy of Education What is my philosophy of education? For hours I have tried to decide what exactly that is. However after much thought I have not been able to come up with an exact answer. After much consideration I have decided that I have no real philosophy but I have goals that one day I will achieve. Although the goals sound simple I know that they will be difficult to attain. I have almost always wanted to teach. I grew up in a single parent household and my mother was an elementary school teacher. When I was younger I didn’t really appreciate what my mom was doing for her students. I only liked what it meant for me. I was allowed to leave with my mother at lunchtime and go out to eat, and I always received special privileges like using the principal’s computer. However as years passed I began to see the impact my mother had on students. Peers in high school would always tell me that my mother was their favorite teacher or how she sparked an interest in a specific subject or how she helped to understand a difficult subject. Therefore, my mother has always been an influence on why I wanted to teach. Even today when my mother asks or when I have time to I will go help her with school functions, classroom projects, or assistance in anything else my mother might require of me. Another reason I wanted to teach is because of the teachers I had in high school. I saw how respected and approachable they were, and ho... My Philosophy of Education Essay -- Philosophy of Education Statement Philosophy of Education What is my philosophy of education? For hours I have tried to decide what exactly that is. However after much thought I have not been able to come up with an exact answer. After much consideration I have decided that I have no real philosophy but I have goals that one day I will achieve. Although the goals sound simple I know that they will be difficult to attain. I have almost always wanted to teach. I grew up in a single parent household and my mother was an elementary school teacher. When I was younger I didn’t really appreciate what my mom was doing for her students. I only liked what it meant for me. I was allowed to leave with my mother at lunchtime and go out to eat, and I always received special privileges like using the principal’s computer. However as years passed I began to see the impact my mother had on students. Peers in high school would always tell me that my mother was their favorite teacher or how she sparked an interest in a specific subject or how she helped to understand a difficult subject. Therefore, my mother has always been an influence on why I wanted to teach. Even today when my mother asks or when I have time to I will go help her with school functions, classroom projects, or assistance in anything else my mother might require of me. Another reason I wanted to teach is because of the teachers I had in high school. I saw how respected and approachable they were, and ho...

Thursday, October 24, 2019

The Return: Nightfall Chapter 23

Acoldfrisson went down Elena's back, the most delicate of shivers. Damon didn'task for kisses. This wasn'tright . â€Å"No,† she whispered. â€Å"Just one.† â€Å"I'm not going to kiss you, Damon.† â€Å"Not me. Him.† Damon denoted â€Å"him† with a tilt of his head toward Matt. â€Å"A kiss between you and your former knight.† â€Å"You wantwhat ?† Matt's eyes snapped open and he got the words out explosively before Elena could open her mouth. â€Å"You'd like it,† Damon's voice had dropped to its softest, most insinuating tones. â€Å"You'd like to kiss her. And there's no one to stop you.† â€Å"Damon.† Matt struggled up out of Elena's arms. He seemed, if not entirely recovered, perhaps eighty percent of the way there, but Elena could hear his heart laboring. Elena wondered how long he'd lain feigning unconsciousness to get his strength back. â€Å"The last thing I knew you were trying to kill me. That doesn't exactly get you on my good side. Second, people just don't go around kissing girls because they're pretty or their boyfriend takes a day off.† â€Å"Don't they?† Damon hiked an eyebrow in surprise. â€Å"I do.† Matt just shook his head, dazed. He seemed to be trying to keep one idea fixed in his mind. â€Å"Will you move your car so we can leave?† he said. Elena felt as if she were watching Matt from very far away; and as if he was caged somewhere with a tiger and didn't know it. The clearing had become a very beautiful, wild, and dangerous place, and Matt didn't know that either. Besides, she thought with concern, he'smaking himself stand up. Weneed to leave – and quickly, before Damon does anything else to him. But what was the real way out? What was Damon's real agenda? â€Å"You can go,† Damon said. â€Å"As soon as she kisses you. Or you kiss her,† he added, as if making a concession. Slowly, as if he realized what it was going to mean, Matt looked at Elena and then back at Damon. Elena tried to communicate silently with him, but Matt wasn't in the mood. He looked Damon in the face and said, â€Å"No way.† Shrugging, as if to say,I did everything I could , Damon lifted the shaggy pine rod – â€Å"No,† cried Elena. â€Å"Damon, I'll do it.† Damon smiledthe smile and held it for a moment, until Elena looked away and went to Matt. His face was still pale, cool. Elena leaned her cheek against his and said almost soundlessly into his ear, â€Å"Matt, I've dealt with Damon before. And you can't just defy him. Let's play along – for now. Then maybe we can get away.† And then she made herself say, â€Å"For me? Please?† The truth was that she knew too much about stubborn males. Too much about how to manipulate them. It was a trait she'd come to hate, but right now she was too busy trying to think of ways to save Matt's life to debate the ethics of pressuring him. She wished it were Meredith or Bonnie instead of Matt. Not that she would wish such pain on anyone, but Meredith would be coming up with Plans C and D even as Elena came up with A and B. And Bonnie would already have lifted tear-filled, heart-melting brown eyes to Damon†¦. Suddenly Elena thought of the single red flash she'd seen under the Ray-Bans, and she changed her mind. She wasn't sure she wanted Bonnie around Damon now. Of all of the guys she'd known, Damon had been the only one Elena couldn't break. Oh, Matt was stubborn, and Stefan could be impossible sometimes. But they both had brightly colored buttons somewhere inside them, labeledPUSH ME , and you just had to fiddle with the mechanism a little – okay, sometimes more than a little – and eventually even the most challenging male could be mastered. Except one†¦ â€Å"All right, kiddies, enough time out.† Elena felt Matt pulled from her arms and held up – she didn't know by what, but he was standing. Something held him in place, upright, and she knew it wasn't his muscles. â€Å"So where were we?† Damon was walking back and forth, with the Virginia pine branch in his right hand, tapping it on his left palm. â€Å"Oh, that'sright † – as if making a great discovery – â€Å"the girl and the stalwart knight are going to kiss.† In Stefan's room, Bonnie said, â€Å"For the last time, Meredith, did you find a backup file for Stefan's note or not?† â€Å"No,† Meredith said in a flat voice. But just as Bonnie was about to collapse again, Meredith said, â€Å"I found a different note completely. A letter, really.† â€Å"Adifferent note? What does it say?† â€Å"Can you stand up at all? Because I think you'd better have a look at this.† Bonnie, who had only just gotten back her breath, managed to hobble over to the computer. She read the document on the screen – complete except for what seemed to be its final words, and gasped. â€Å"Damon did something to Stefan!† she said, and felt her heart plummet and all her internal organs follow it. So Elena had been wrong. Damonwas evil, through and through. By now, Stefan might even be†¦ â€Å"Dead,† Meredith said, her mind obviously following the same track that Bonnie's had taken. She lifted dark eyes to Bonnie's. Bonnie knew that her own eyes were wet. â€Å"How long,† Meredith asked, â€Å"has it been since you called Elena or Matt?† â€Å"I don't know; I don't know what time it is. But I called twice after we left Caroline's house and once at Isobel's; and when I've tried after that, I either get a message that their mailboxes are full or it won't connect at all.† â€Å"That's about exactly what I've gotten. If they went near the Old Wood – well, you know what it does to phone reception.† â€Å"And now, even if they come out of the woods, we can't leave them a message because we've filled up their voicemail – â€Å" â€Å"E-mail,† Meredith said. â€Å"Good old e-mail; we can use that to send Elena a message.† â€Å"Yes!† Bonnie punched the air. Then she deflated. She hesitated for an instant and then almost whispered, â€Å"No.† Words from Stefan's real note kept echoing in her mind:I trust Matt's instinctive protectiveness for you, Meredith's judgment, and Bonnie's intuition. Tell them to remember that. â€Å"You can't tell her what Damon's done,† she said, even as Meredith began busily typing. â€Å"She probably already knows – and if she doesn't, it'll just make more trouble. She's with Damon.† â€Å"Matt told you that?† â€Å"No. But Matt was out of his mind with pain.† â€Å"Couldn't it have been from those – bugs?† Meredith looked down at her ankle where several red welts still showed on the smooth olive flesh. â€Å"It could be, but it wasn't. It didn't feel like the trees, either. It was just†¦pure pain. And I don't know, not for certain, how I know that it's Damon doing it. I just – know.† She saw Meredith's eyes unfocus and knew that she was thinking about Stefan's words, too. â€Å"Well, my judgment tells me to trust you,† she said. â€Å"By the way, Stefan spells  ¡Ã‚ ®judgment' the preferred American way,† she added. â€Å"Damon spells it with ane . That may have been what was bothering Matt.† â€Å"As if Stefan would really leave Elena alone with everything that's been going on,† Bonnie said indignantly. â€Å"Well, Damon fooled all of us and made us think so,† Meredith pointed out. Meredith tended to point out things like that. Bonnie started suddenly. â€Å"I wonder if he stole the money?† â€Å"I doubt it, but let's see.† Meredith pulled the rocking chair away, saying, â€Å"Grab me a hanger.† Bonnie grabbed one from the closet and grabbed herself one of Elena's tops to put on at the same time. It was too big, since it was Meredith's top given to Elena, but at least it was warm. Meredith was using the hooked end of the wire hanger on all sides of the floorboard that looked most promising. Just as she managed to pry it up, there was a knock at the open door. They both jumped. â€Å"It's only me,† said the voice of Mrs. Flowers from behind a large duffel bag and a tray of bandages, mugs, sandwiches, and strong-smelling cheesecloth bags like the ones she'd used on Matt's arm. Bonnie and Meredith exchanged a glance and then Meredith said, â€Å"Come in and let us help you.† Bonnie was already taking the tray, and Mrs. Flowers was dumping the duffel bag on the floor. Meredith continued prying the board up. â€Å"Food!† Bonnie said gratefully. â€Å"Yes, turkey-and-tomato sandwiches. Help yourselves. I'm sorry I was away so long, but you can't hurry the poultice for swellings,† Mrs. Flowers said. â€Å"I remember, long ago, my younger brother always said – oh, my goodness gracious!† She was staring at the place where the floorboard had been. A good-sized hollow was filled with hundred-dollar bills, neatly wrapped in packets with bank-bands still around them. â€Å"Wow,† Bonnie said. â€Å"I never saw so much money!† â€Å"Yes.† Mrs. Flowers turned and began distributing cups of cocoa and sandwiches. Bonnie bit into a sandwich hungrily. â€Å"People used to simply put things behind the loose brick in the fireplace. But I can see that the young man needed more space.† â€Å"Thank you for the cocoa and sandwiches,† Meredith said after a few minutes spent wolfing them down while working on the computer at the same time. â€Å"But if you want to treat us for bruises and things – well, I'm afraid we just can't wait.† â€Å"Oh, come.† Mrs. Flowers took a small compress that smelled to Bonnie like tea and pressed it to Meredith's nose. â€Å"This will take the swelling down in minutes. And you, Bonnie – sniff out the one that's for that bump on your forehead.† Once again Meredith's and Bonnie's eyes met. Bonnie said, â€Å"Well, if it's only a few minutes – I don't know what we're doing next anyway.† She looked the poultices over and picked a round one that smelled of flowers and musk to put on her forehead. â€Å"Exactly right,† Mrs. Flowers said without turning around to look. â€Å"And of course, the long thin one is for Meredith's ankle.† Meredith drank the last of her cocoa, then reached down to gingerly touch one of the red marks. â€Å"That's okay – † she began, when Mrs. Flowers interrupted. â€Å"You're going to need that ankle at full capacity when we go out.† â€Å";;When we go out'?† Meredith stared at her. â€Å"Into the Old Wood,† Mrs. Flowers clarified. â€Å"To find your friends.† Meredith looked horrified. â€Å"If Elena and Matt are in the Old Wood, then I agree:we have to go look for them. Butyou can't go, Mrs. Flowers! And we don't know where they are, anyway.† Mrs. Flowers drank from the cup of cocoa in her hand, looking thoughtfully at the one window that wasn't shuttered. For a moment Meredith thought she hadn't heard or didn't mean to answer. Then she said, slowly, â€Å"I daresay you all think I'm just a batty old woman who's never around when there's trouble at hand.† â€Å"We would never think that,† Bonnie said staunchly, but thinking that they'd found out more about Mrs. Flowers in the last two days than in the entire nine months since Stefan had moved in here. Before that, all she'd ever heard were ghost stories or rumors about the crazy old lady in the boardinghouse. She'd been hearing them since she could remember. Mrs. Flowers smiled. â€Å"It's not easy having the Power and never being believed when you use it. And then, I've lived for so long – and people don't like that. It worries them. They start to make up ghost stories or rumors – â€Å" Bonnie felt her eyes go round. Mrs. Flowers just smiled again and nodded gently. â€Å"It's been a real pleasure having a polite young man in the house,† she said, taking the long poultice from the tray and wrapping it around Meredith's ankle. â€Å"Of course, I had to get over my prejudices. Dear Mamaalways said that if I kept the place, I might have to take in boarders, and to be sure not to take in foreigners. And then of course, the young man is a vampire as well – â€Å" Bonnie almost sprayed cocoa across the room. She choked, then went into a spasm of coughing. Meredith had her no-expression expression on. † – but after a while I got to understand him better and to sympathize with his problems,† Mrs. Flowers continued, ignoring Bonnie's attack of coughing. â€Å"And now, the blond girl is involved as well†¦poor young thing. I often speak to Mama† – still with the accent on the second syllable – â€Å"about it.† â€Å"How old is your mother?† Meredith asked. Her tone was one of polite inquiry, but to Bonnie's experienced eyes her expression was one of slightly morbid fascination. â€Å"Oh, she died back at the turn of the century.† There was a pause, and then Meredith rallied. â€Å"I'm so sorry,† she said. â€Å"She must have lived a long – â€Å" â€Å"I should have said, the turn of theprevious century. Back in 1901, it was.† This time it was Meredith who had the choking fit. But she was more quiet about it. Mrs. Flowers' gentle gaze had drifted back to them. â€Å"I was a medium in my day. On vaudeville, you know. So hard to achieve a trance in front of a roomful of people. But, yes, I really am a White Witch. I have the Power. And now, if you've finished your cocoa, I think it's time we went into the Old Wood to find your friends. Even though it's summertime, my dears, you'd both better dress warmly,† she added. â€Å"I have.†

Wednesday, October 23, 2019

Ece Project

SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039) KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATECertified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision. SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics andCommunication Engineering, Communication Engineering, Park College of Engineering Park College of En gineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINER CONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. 2 Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy.Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna. Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader.A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures. This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology.For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identifica tion (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver).The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVEThe aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC). This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach.SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader. Data collected from tags is then passed through co mmunication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation. PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used.Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger prin t impression is given, the camera is activated which clicks the image of the user trying to access the system. This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTSMODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem- SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use.Vi sual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations.Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system. MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems , without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers.FEATURES MikroBasic allows you to quickly develop and deploy complex applications: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. Generate commented, human-readable assembly, and standard HEX compatible with all programmers. †¢Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detai led reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DESCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes.Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocess or or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident.Without effective security, many everyday activities are compromised. Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorize d access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. Screening access to public transportation, in particular air travel. †¢ Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the a bove criteria. A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behavioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format.This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as the unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option. Based on centuries of experience and extensive research, fingerprints are at present considered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition.Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die. It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR T he Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution. This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEEZigBee is a low-cost, low-power, wireless mesh network standard. The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated radios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communicat ion at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions to learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePerip heral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A/D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for relia ble operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communicate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending a nd receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there w ill be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion and will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the op erating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positi ve half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive regulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology i t has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TE KHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software req uirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gathering information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database wher e information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. INTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so that there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Data base server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTING SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added. In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the sy stem along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactic ally similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interface about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC microcontrollers. It is designed to provide the customer with the easiest possible solution for developing applications for embedded systems, without compromising performance or control. Highly advanced IDE, broad set of hardware libraries, comprehensive documentation, and plenty of ready to run example programs should be more than enough to get you started in programming microcontrollers. FEATURESMikroBasic allows you to quickly develop and deploy complex applicatio ns: †¢Write your BASIC source code using the built-in Code Editor (Code and Parameter Assistants, Syntax Highlighting, Auto Correct, Code Templates, and more†¦) †¢Use the included mikroBasic libraries to dramatically speed up the development: data acquisition, memory, displays, conversions, communications†¦ Practically all P12, P16, and P18 chips are supported. †¢Monitor your program structure, variables, and functions in the Code Explorer. †¢Generate commented, human-readable assembly, and standard HEX compatible with all programmers. Inspect program flow and debug executable logic with the integrated Debugger. †¢Get detailed reports and graphs: RAM and ROM map, code statistics, assembly listing, calling tree, and more†¦ †¢We have provided plenty of examples for you to expand, develop, and use as building bricks in your projects. Copy them entirely if you deem fit – that’s why we included them with the compiler. HARDWARE DE SCRIPTION RFID TAGS Tags also sometimes are called â€Å"transponders†. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice.Data is stored in the IC and transmitted through the antenna to a reader. The two commonly used RFID Transponders [2] are Active (that do contain an internal battery power source that powers the tags chip) and passive (that does not have an internal power source, but are externally powered typical from the reader) RFID Transponders. RFID READER A reader (now more typically referred to as an RFID interrogator) is basically a radio frequency (RF) transmitter and receiver, controlled by a microprocessor or digital signal processor.The reader, using an attached antenna, captures data from tags, then passes the data to a computer for processing. The reader decodes the data encoded in the tag(s) integrated circuit (silicon chip) and the data is passed to the host computer for processing. WORKING OF RFID Information is sent to an d read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. FREQUENCIES OF RFID RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: †¢ Low frequency (LF) 125/134. 2 KHz. †¢ High frequency (HF) 13. 56 MHz. †¢ Ultra high frequency (UHF) (including 869 and 915 MHz). †¢ Microwave (at 2450 MHz, a band familiar to ISPs).A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember t hat not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted. BLOCK DIAGRAM BIOMETRIC SYSTEM In today’s world, the need for effective security is evident. Without effective security, many everyday activities are compromised.Specific security concerns include: †¢Protecting computer systems, PDAs, mobile phones, Internet appliances and similar devices from unauthorized access or use †¢Protecting motor vehicles and other valuable items from unauthorized access or use preventing theft and fraud in financial transactions, in particular electronic transactions, including credit card payments and payments via the Internet. †¢ Restricting access to workplaces, warehouses and secures areas, such as military installations, to authorized personnel. †¢ Screening access to public transportation, in particular air travel. Authenticating the identity of an individual in drivers’ licenses, health cards, ID cards, and similar administrative documents. A major factor in ensuring security is the unique identification of individuals, or the authentication that a person is who he or she claims to be. This must be done reliably, rapidly, non-intrusively and at reasonable cost. In the past, this has been done by methods such as security tokens (passports, badges, etc. ), secure knowledge (passwords PIN codes, signature, etc. ) or recognition by a guardian (doorkeeper). These traditional approaches are all limited with respect to the above criteria.A promising approach for the future is biometrics. Biometrics offers a convenient, reliable and low-cost means of identifying or authenticating individuals, and can be implemented in unsupervised and remote situations. Biometrics seeks to identify individuals uniquely by measuring certain physical and behav ioural characteristics and extracting a sample (also called a sampled template or live template) from these measurements in a standard data format. This sample is compared with a template (also called an enrolled template or signature), based on the same characteristics, that has been established as he unique identity of that individual and stored in the security system. A close match between sample and template confirms the identity of the individual. Attention has been focused on a small number of physical characteristics that can identify individuals uniquely, notably voice, gait, face, iris and retina patterns, palm prints and fingerprints. (DNA is excluded from this list because DNA sampling is intrusive and slow. ) Work is proceeding to develop electronic recognition systems based on all of these. This article focuses on fingerprints as the most advanced, mature and well-developed option.Based on centuries of experience and extensive research, fingerprints are at present consi dered to be the most reliable biometric for uniquely identifying an individual. In spite of some recent legal challenges in the USA, they are still regarded as giving proof of identity beyond reasonable doubt in almost all cases. The majority of the biometric-based security systems in operation today are based on fingerprint recognition. Thumb Impression FINGERCHIP TECHNOLOGY Finger Chip IC for fingerprint image capture combines detection and data conversion circuitry in a single rectangular CMOS die.It captures the image of a fingerprint as the finger is swept vertically over the sensor window. It requires no external heat, light or radio source. FINGERCHIP SENSOR The Finger Chip sensor comprises an array of 8 rows by 280 columns, giving 2240 temperature-sensitive pixels. An additional dummy column is used for calibration and frame identification. The pixel pitch of 50 _m by 50 _m provides a resolution of 500 dpi over an image zone of 0. 4 mm by 14 mm. This is adequate to capture a frame of the central portion of a fingerprint at an acceptable image resolution.This resolution also complies with the Image Quality Specification (IQS) from the IAFIS (Integrated Automated Fingerprint Identification System) of the U. S. Federal Bureau of Investigation (FBI). The pixel clock is programmable at up to 2 MHz, giving an output of 1780 frames per second. This is more than adequate for a typical sweeping velocity. An image of the entire fingerprint is re-constructed from successive frames using software provided. Biometric sensor ZIGBEE ZigBee is a low-cost, low-power, wireless mesh network standard.The low cost allows the technology to be widely deployed in wireless control and monitoring applications. Low power-usage allows longer life with smaller batteries. Mesh networking provides high reliability and more extensive range. The technology is intended to be simpler and less expensive than other WPANs such as Bluetooth. ZigBee chip vendors typically sell integrated rad ios and microcontrollers with between 60 KB and 256 KB flash memory. ZigBee operates in the industrial, scientific and medical (ISM) radio bands; 868 MHz in Europe, 915 MHz in the USA and Australia, and 2. GHz in most jurisdictions worldwide. Data transmission rates vary from 20 to 250 kilobits/second. The ZigBee network layer natively supports both star and tree typical networks, and generic mesh networks. Every network must have one coordinator device, tasked with its creation, the control of its parameters and basic maintenance. Within star networks, the coordinator must be the central node. Both trees and meshes allow the use of ZigBee routers to extend communication at the network level. ZIGBEE STACK ZigBee builds upon the physical layer and medium access control defined in IEEE standard 802. 5. 4 (2003 version) for low-rate WPAN's. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDO's) and manufacturer-defined application objects which allow for customization and favour total integration. Besides adding two high-level network layers to the underlying structure, the most significant improvement is the introduction of ZDO's. These are responsible for a number of tasks, which include keeping of device roles, management of requests to join a network, device discovery and security.ZigBee is not intended to support power line networking but to interface with it at least for smart metering and smart appliance purposes. Because ZigBee nodes can go from sleep to active mode in 30msec or less, the latency can be low and devices can be responsive, particularly compared to Bluetooth wake-up delays, which are typically around three seconds. Because ZigBee nodes can sleep most of the time, average power consumption can be low, resulting in long battery life. PIC MICRO CONTROLLER FEATURES OF PIC (16F877A) †¢High-performance RISC CPU †¢Only 35 single word instructions t o learn Direct, indirect and relative addressing modes †¢Power-on Reset (POR) †¢Power-up Timer (PWRT) and †¢Oscillator Start-up Timer (OST) †¢Programmable code-protection †¢Low-power, high-speed CMOS FLASH/EEPROM technology †¢In-Circuit Debugging via two pins †¢Single 5V In-Circuit Serial Programming capability †¢Wide operating voltage range: 2. 0V to 5. 5V †¢Commercial and Industrial temperature ranges †¢Low-power consumption. PIC micro controller-16F877A High-performance RISC CPU: †¢Only 35 single–word instruction to learn Operating speed: †¢DC-20MHz clock input †¢DC-200ns instruction cyclePeripheral features: †¢Universal synchronous asynchronous receiver transmitter (USAT/SCI) with 9-bit address deduction. †¢Parallel slave port (PSP)-8 bits wide with external RD, WR and CS controls. PIN DETAIL FOR MICROCONTROLLER Analog features: †¢10-bit, up to 8-channel analog –to- digital converter (A /D) †¢Analog Comparator module with two analog comparators †¢Programmable on – chip voltage reference (VREF) module †¢Programmable input multiplexing from device inputs and internal voltage reference †¢Comparator outputs are externally accessible Special Micro controller Features: 100,000 erase/write cycle Enhanced Flash program memory typical †¢1,000,000 erase/write cycle Data EEPROM memory typical †¢Data EEPROM Retention > 40 years †¢Self-reprogram able under software control †¢Single-supply 5v In-Circuit Serial Programming Tm (ICSPTm) Via two pins †¢Watching Timer (WDT) with its own on-chip RC oscillator for reliable operation †¢Programmable code protection †¢Power saving Sleep mode †¢Selectable oscillator options In-Circuit Debug (ICD) via two pins CMOS Technology: †¢Low power, high-speed Flash/EEPROM technology †¢Wide operating voltage range (2. 0v to 5. 5v) RS 232PC in general cannot directly communic ate with peripherals that are available. The reason behind this is the difference in their working logic. PC generally works in positive logic. The microcontroller that actually acts as the peripheral here works in negative logic. It becomes important to change the logic between them when they communicate with each other. RS232 is very important for standard serial interfacing with PC where change of logic is achieved. PC communicates with peripherals through serial com1 or com2, which communicates the data in terms of pulse form as follows. GSM MODULERFID security system is based on GSM network technology for transmission of SMS from sender to receiver. SMS sending and receiving is used for ubiquitous access of information and allowing breach control at secured area. The system provide a sub-systems which gives us a control subsystem that enables the user to control area security remotely whereas the security alert subsystem provides the remote security monitoring. The main aspect of the security alert is to achieve detection on intrusion in the system and allow an automatic generation of SMS thus alerting the user against security risk.PC: This unit contains the software components such as the server and security System through which the area security can be controlled and monitored. GSM Modem: It is a hardware component that allows the capability to send and receive SMS to and from the system. The communication with the system takes place via RS232 serial port. Cell phone can be attached at the place of GSM hardware but it limits the hardware functionality such as sending or receiving of SMS. Mobile Device: Cellular phone containing SIM card has a specific number through which communication takes place.The device communicates with the GSM Modem via radio frequency. Mobile user transmits SMS using GSM technology. GSM Modem: GSM modem is a plug and play device and is attached to the PC which then communicates with the PC via RS232 port. GSM modem is a bridge responsible for enabling/ disabling of SMS capability. Cell Phone: Mobile device communicates with the GSM Modem via radio waves. The mode of communication is wireless and mechanism works on the GSM technology. Cell phone has a SIM card and a GSM subscription. This cell phone number is configured on the system.User transmits instructions via SMS and the system takes action against those instructions. WORKING OF GSM MODULE GSM hardware tests are run in order to check the hardware support. The system will call GSM modem and it will get activated. After activation the Modem will check for hardware support. If the hardware is missing or some other hardware problem there will be error, resulting in communication failure and the application will be terminated. If hardware responds then the serial port will be opened for communication and GSM hardware will allow transmission of SMS.The system will then connect and after connection establishment the system will be able to detect intrusion a nd will alert user about the breach and similarly the system will update status of appliances by receiving SMS from the pre-defined cell number. SMS will be silently ignored if cell number is unauthorized. The system uses GSM technology thus providing ubiquitous access to the system for security and automated appliance control. Therefore this paper proposes a system that allows user to be control and provide security on detection of intrusion via SMS using GSM technology.POWER SUPPLY Power supply is the basic unit that provides corresponding operating voltage to each circuit. In this 12V power supply is used in the project. 7805 represents the IC which works on the operating voltage of +5V. 7905 represents the IC works on the operating voltage of -5V. 7812 represents the IC which works on the operating voltage of +12V. 7912 represents the IC works on the operating voltage of -12V. BLOCK DIAGRAM Power supply unit consists of following units i) Step down transformer ii) Rectifier unit iii) Input filter iv) Regulator unit v) Output filter STEPDOWN TRANSFORMERUsing step down uses it to step down the main supply voltage transformer. It consists of primary and secondary coils. The output from the Secondary coil is also AC waveforms we have to convert AC voltage into DC voltage by using Rectifier Unit. RECTIFIER UNIT We have to convert AC voltage into DC voltage by using rectifier. Bridge Rectifier is used to convert into DC voltage. This output voltage of the rectifier is in rippled forms we have to remove the ripples from DC voltage. INPUT FILTER Capacitor acts as filter. The principle of the capacitor is charging and discharging.It charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This filter is fixed before the regulator. REGULATOR UNIT Regulator regulates the output voltage constant depends upon the regulator. it classifieds as follows i) Positive reg ulator 1—> input pin 2—> ground pin 3—> output pin It regulates the positive voltage. ii) Negative regulator 1—> ground pin 2—> input pin 3—> output pin It regulates the negative voltage. OUTPUT FILTER Capacitor acts as filter.The principle of the capacitor is charging and Discharging. it charges in positive half cycle of the AC voltage and it will Discharge in negative half cycles, it allows only AC voltage and doesn’t allow the DC voltage. This fiter is fixed after the regulator. MERITS It is an advanced technology used for security purpose The main advantage is that its easy to use Comparing to all other technology it has high memory capacity The size of the RFID is small, therefore its compact CONCLUSION AND FUTURE IMPLEMENTATION RFID is one of the best technology used for barcode system , tags and transfer information.RFID adorns the management with a new idea and usher for a bright future. In the near future the RFID tag system will be replaced with NFC(near field communication) because of its high sensitivity Due to its customizable feature and continuing improvement the library communities are beginning to get involved in its development REFERENCES www. microchip. com www. dallas. com www. gsmfavorites. com http://www. shepherdcentre. com. au/ www. myprojects. com SECURITY SYSTEM USING RFID A PROJECT REPORT Submitted by ANISH ANTONY (080107117005) JISU JOHN ISAC (080107117039)KRISHNA PRABHA R(080107117055) KUNAL BHARDWAJ (080107117056) In partial fulfilment for the award of the degree of BACHELOR OF ENGINEERING in ELECTRONICS AND COMMUNICATION ENGINEERING PARK COLLEGE OF ENGINEERING AND TEKHNOLOGY, KANIYUR, COIMBATORE-641659. ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE 641 047 APRIL 2012 ANNA UNIVERSITY OF TECHNOLOGY COIMBATORE-641047 BONAFIDE CERTIFICATE Certified that this project report â€Å"SECURITY SYSTEM USING RFID† is the bonafide work of â€Å"ANISH ANTONY, JISU JOHN ISAC, KRISHNA PRABHA R, KUNAL BHARDWAJ† who carried out the project work under my supervision.SIGNATURESIGNATURE Mr. MARIA ANTONY M. E Mrs. K. MUTHULAKSHMI. M. E. (PhD) SUPERVISOR HEAD OF THE DEPARTMENT Department of Electronics and Department of Electronics and Communication Engineering, Communication Engineering, Park College of Engineering Park College of Engineering and Technology, and Technology, Coimbatore – 641659. Coimbatore – 641659. INTERNAL EXAMINER EXTERNAL EXAMINERCONTENTS CHAPTER TITLE PAGE NO ABSTRACT 1. INTRODUCTION 2. OBJECTIVE 3. SYSTEM ANALYSIS 3. 1 Existing System 3. 2 Proposed System 4. SYSTEM SPECIFICATION 4. 1Hardware requirements 4. 2 Software requirements 5. SYSTEM DESCRIPTION 5. 1 Software description 5. Hardware description 6. BLOCK DIAGRAM 6. 1 block diagram description 7. MERITS 8. CONCLUSION 9. REFERENCES ABSTRACT RFID (Radio Frequency Identification) is the quintessential pervasive computing technology. The heart of the utility is that RFID makes gatherin g information about physical objects easy. Information about RFID tagged objects can be read through physical barriers, and from a distance. Our project utilized these RFID tags to improve the security system of a building by introducing a system that could read the RFID tagged smart cards that are placed in proximity to an antenna.Our project comes with option of finger print system, GSM system and camera system attached with the main RFID system. This help in making the security full proof and reduce the possibility of breaches. RFID devices have three primary elements: a chip, an antenna, and a reader. A fourth important part of any RFID system is the database where information about tagged smart card is stored. For wireless data transmission and networking between sensor nodes, the project uses ZigBee modules. The modules require minimal power and provide reliable delivery of data between devices with efficient security measures.This project is implemented in real time system. I NTRODUCTION The major problem faced by organizations in security breach is related with doors without proper security system on them for their protection. Our project is going to solve these problems by using RFID technology. For wireless data transmission between tag and sensor nodes, the project uses ZigBee modules. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders.So the RFID is a wireless identification. Normally the RFID system comprises of two main parts: RFID Reader and RFID Tag. RFID Reader is an integrated or passive network which is used to interrogate information from RFID tag (contains antennas to enable them to receive and respond to radiofrequency queries from an RFID transceiver). The RFID Reader may consist of antenna, filters, modulator, demodulator, coupler and a micro processor. We try to enhance the security up to a very effective level so tha t there are minimum possibilities in the security breach.For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. The system also creates a log containing check-in and check-out of each user along with basic information of user. OBJECTIVE The aim of the project is to design a system that have a small coverage area and can be use for authentication or identification purposes. â€Å"Security System Using RFID† is a system that uses RFID technology to maintain the security of the different rooms in same structure which can be monitored on real-time bases using the Database server (PC).This system prevents unauthorized entry in rooms. For this purpose we are introducing a multilevel security system which consists of finger print impression, camera and GSM module along with RFID system. This ensures the reliability of the system and makes it difficult to breach. SYSTEM ANALYSIS EXISTIN G SYSTEM In the existing system, Information is sent to and read from RFID tags by a reader using radio waves. In passive systems, which are the most common, an RFID reader transmits an energy field that â€Å"wakes up† the tag and provides the power for the tag to respond to the reader.Data collected from tags is then passed through communication interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action. The drawback in this system is the lack of security option available for the user. One can easily use others RFID tag to gain access in the desired place without their prior knowledge. This breach cannot be easily accounted as there is no record other then the RFID tag used which can mislead to undesirable situation.PROPOSED SYSTEM This system is of new kind in which finger print recognition system along with GSM and camera is newly added . In this system RFID along with ZigBee, microcontroller, biometric system, GSM, amplifier circuit, power supply, camera and database server (PC) is used. Different circuits work together to form an unreachable system so that the security can be enhanced to the maximum level possible. When RFID tag is sensed by the RFID receiver and finger print impression is given, the camera is activated which clicks the image of the user trying to access the system.This information is stored in the database along with time and date when the system was accessed and the GSM technology used in the system make sure that the concerned authority is notified about the activation of the system along with result. SYSTEM SPECIFICATION HARDWARE REQUIREMENTS MODULESCOMPONENTNAME OF THE IC Power supplyVoltage RegulatorsLM7805, L7812, MC7912 Miscellaneous componentRS23225 PIN PORT CameraUSB Type Biometric scanner Optical Processing unitPIC ControllerPIC16F877A Data TransmissionDual Driver/ReceiverMAX 232 RFID Zigbee TransceiverX-BEE GSM Modem-SOFTWARE REQUIREMENTS Visual basics 6. 0 (Front end Design) Mikro basic SOFTWARE DESCRIPTION Visual Basic (VB) is the third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model. Visual Basic is relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects.Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Visual basic is used to provide a simple interfa ce about the program between user and system software. This is also used for storing the data and act as database for the system.MIKRO BASIC MikroBasic is a powerful, feature rich development tool for PIC m